There is an APK obfuscated by Proguard. I used APK tool to decompile it. It created *.smali files for each class. I can see real names of classes and even code flow:
.locals 2
new-instance v0, Lcom/acme/model/Receipt;
invoke-direct {v0}, Lcom/acme/model/Receipt;-><init>()V
iget-object v1, p1, Lcom/acme/bus/Receipt;->a:Ljava/lang/String;
invoke-virtual {v0, v1}, Lcom/acme/model/Receipt;->setText(Ljava/lang/String;)V
iget v1, p1, Lcom/acme/bus/event/device/Receipt;->b:I
invoke-virtual {v0, v1}, Lcom/acme/Receipt;->setType(I)V
return-object v0
I can see there what this method does. I expected that all packages, classes, properties, methods will be changed and source code will make no sense for the first sight. What can obfuscation do on Android?