Ok, let's be more specific. An APK is just a zip file that contain the
application. Our public.mp3 is actually a TAR file, that is decompressed
at the initial startup.
In the tar, you'll have all the pyo, images, and others assets of your
applications and others libraries.
The protection of the .pyo is at the same level as the .class of Java:
both can be decompiled with appropriate tools.
If you want a more complex protection of a portion of the code, you
could compile it as a Python extension, and you will get a .so. This
will be pure C compiled in ARM. It would be harder to decompile, but not
that harder. Then all the matter is how you'll obfuscate the code.
Google for it, it's a mouse&cat game, there is no ideal solution.
Le 17/10/2012 13:55, Sven Petersen a écrit :