Skip to content

Introduction

Obfuscation is an effective method to deter reverse engineering, but even obfuscated code can often be deciphered — especially with the advancements in AI. However, jCloak takes security a step further by completely concealing the source code, rendering it unreadable. This significantly complicates reverse engineering attempts and provides an additional layer of protection for your software.

Interoperable

Security measures are designed to make reverse engineering as difficult and time-consuming as possible. While no system is entirely impervious, the true challenge lies in how much time and resources are required to bypass and analyze these defenses. Therefore, it is recommended to use an obfuscator as well to make reverse engineering as hard as possible.

Diagram

Make sure to use jCloak as the last stage in your toolchain. This will ensure that all classes can be resolved until the end.

Samples

Here are a few examples of of JCloak protected Java applications. The samples may not be up to date with the newest JCloak version. Check the Changelog if something you want to address has been fixed.