How to ensure mobile security SDK when transferring to third parties?
There is a challenge to provide partners with an SDK for mobile development. But I would not like to see the source code of the SDK was available, i.e. it is necessary to give blackbox c documentation.
Please share the experience of implementation, pros and cons of this approach.
It is logical to use the obfuscation code, but is it possible to give the SDK in assembled format and not in the source code, even obfuscated?
1 answer
What is written in SDK? Generally can build it into a library target platforms (jar for Android, for example) and to pay for it. The possibility of reverse engineering will still be, but strictly speaking it is always there.
Find more questions by tags Information securityMobile development
I understand that decompilation and deobfuscation possible, the goal is to raise the bar of entry of crackers.
Ie you can build the library in the JAR, pre-obfuscates... And can it even lock, so that it is initialized only by key?
PS I am not a coder, just doing IB. - Simeon.Cremin43 commented on September 18th 19 at 23:45
Of course it can be done if the library itself has some value, if it's just a server wrapper API that prevents stupid users to capture network traffic and to write the equivalent client library (SSL pinning in this case is unlikely to save you) - Madyson.Stiedemann commented on September 18th 19 at 23:51