I wondered how the rapid debugger is able to hot swap code without reinstalling an app. Erel explained it here: https://www.b4x.com/android/forum/threads/rapid-debugger.33120/#content
There's some sort of a shell running on the device. Couldn't that technique be used to protect an app?
- download parts from a server
- execute in that shell
- etc.
However: Jus an idea (without the knowledge how it really works)
There's some sort of a shell running on the device. Couldn't that technique be used to protect an app?
- download parts from a server
- execute in that shell
- etc.
However: Jus an idea (without the knowledge how it really works)