ch271828n
ch271828n

Reputation: 17567

Will Flutter code be reverse-engineered easily without obfuscation?

I know Flutter is compiled AOT (ahead-of-time). However, it seems that all the method/class/field/... names will still be visible in the final compiled output (.apk or .ipa). I know obfuscating can use non-readable strings to replaces such names, but I cannot use it since Sentry does not support it well.

Thus, my question is: Will Flutter code be reverse-engineered easily without obfuscation? (If no, I will just disable obfuscation.)

Thanks very much!

Upvotes: 1

Views: 1025

Answers (1)

Richard
Richard

Reputation: 1872

If it's possible then always assume it will be done. The question of easy or hard is dependent on who is attempting to do the reverse engineering.

Do what you can to secure your app as best you can, then if you have any sensitive logic, throw that into a backend API your app calls. If it's impossible to use an API, meaning the logic must be coded into the app that will eventually be distributed to end users, then you just hope nobody with resources notices your app.

Upvotes: 4

Related Questions