Protecting Source Code #68406
Replies: 4 comments 3 replies
-
Also, would NativeAOT solve this? |
Beta Was this translation helpful? Give feedback.
-
Yep, NativeAOT would be a proper solution, as the "binaries" are in native format (ILSpy will refuse to read it). But as you said, then it's just "not immediately obvious". To avoid reverse engineering completely just don't share your code / app. Leverage something like a server/client architecture, where the crucial code-parts are on the server side that is under your control. Which trouble did you get from obfuscators? Or did you just read about them? |
Beta Was this translation helpful? Give feedback.
-
Well, reverse-engineering something is always possible. You can only make it harder. For example by NativeAOT or any solutions that disguise your IL a bit. However, obfuscation (almost) always brings performance disadvantages with it, unless it is only name mangling. |
Beta Was this translation helpful? Give feedback.
-
You can always over engineer your code so one one can understand it anyway 😉 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
What is the right way to protect .NET source code? We'd like to protect data in such a way that our code is not immediately obvious to someone using a decompiler.
I've looked at obfuscators and they tend to not be reliable. I've also investigated single-file apps, but those can be extracted then easily inspected.
Any thoughts? Is there an article somewhere that talks about protecting source code?
Beta Was this translation helpful? Give feedback.
All reactions