![]() However, the names of classes, methods, parameters, etc. IL2CPP builds do not have IL bytecode, so tools like dnSpy and ILspy won’t be able to show you the code inside classes. A quick and easy way to obscure your code is to use IL2CPP scripting backend instead of Mono. We saw how easy it was for someone to decompile the app, scan through the code, and tweak it a bit. In the previous example, we used the default Mono scripting backend to build a sample desktop app. What you can do is make it harder but not impossible for someone to hack your app. Anyone who has enough time and resources will be able to figure out how to break into your application. The gist here is that there are already a lot of tools and tutorials available out there.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |