Hide Strings Using NDK / JNI from Reverse Engineering
![]() |
| Related: How To Hide Your API Key |
On this blog post you will know about how to reverse engineer an Android applications. It is very easy to extract hardcoded strings such as URL's, username, passwords, api keys and api secrets in your app using reverse engineering tools (even if R8 or proguard is enabled in your gradle build) .
Loosing those strings can cause serious privacy issues. The hacker can use this information to create scripts to modify the backend databases (if your backend api do not verify its client).
But there are many ways to make it hard to extract for hacker.
- Encrypted properties.
- Public / private API key exchange.
- Digital signature
- NDK / JNI (safest).

Comments
Post a Comment