Artwork

Content provided by soundbite.fm. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by soundbite.fm or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Merge Conflict 35: Security Through Obscurity

40:59
 
Share
 

Manage episode 185771244 series 1535700
Content provided by soundbite.fm. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by soundbite.fm or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

It's time to talk code security when developing applications to try to stop people from stealing our precious code and apps. We discuss the different methods we have used to attempt to obfuscate our code and the tools we use to peek into our own code. When it comes to security, it is more than just the executable we ship as we have to be aware of everything happening on the device such as in app purchases, certificates, web requests, and a bunch of other things. We discuss all this and more on this week's show.

Links & Show Notes

Subscribe

Merge Conflict may make commission from affiliate links

Sponsored By:

Support Merge Conflict

  continue reading

415 episodes

Artwork
iconShare
 
Manage episode 185771244 series 1535700
Content provided by soundbite.fm. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by soundbite.fm or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

It's time to talk code security when developing applications to try to stop people from stealing our precious code and apps. We discuss the different methods we have used to attempt to obfuscate our code and the tools we use to peek into our own code. When it comes to security, it is more than just the executable we ship as we have to be aware of everything happening on the device such as in app purchases, certificates, web requests, and a bunch of other things. We discuss all this and more on this week's show.

Links & Show Notes

Subscribe

Merge Conflict may make commission from affiliate links

Sponsored By:

Support Merge Conflict

  continue reading

415 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide