i am using ndk and android studio to secure my api-key and it works now. also i am trying dirty code to harden disassembling... . but i can still decompile and see native methods in java classes. also pre-built .so(shared object) files are available in apk and wil be used again!
Questions:
After releasing the apk, all hackers can see .so file and they can use custom settings in .mk file and program specific native methods like my class for extracting the api-key only. they call my functions related to api-key without knowing the implementation. am i eliminating something here?
- is proguard necessary for this way ?