Hello Chris,<div><br></div><div>I do indeed realise this. The primary reason for obfuscation here is to shorten the names of symbols to make file sizes smaller (and additionally, some people claim better performance due to faster lookup but I don't think that makes much difference).</div>
<div><br></div><div>However some customers have asked for the obfuscation for security reasons: we have pointed out as you did that it's a bit pointless, but the argument is that they'd like it anyway as a means of making it more difficult (even if not impossible). And in any case, all obfuscation is always about making it difficult without ever achieving total security, because at some point the CPU has to do something intelligent :-)</div>
<div><br></div><div>We'd probably end up doing some encryption of the mapping file, but again, it's like licence keys: difficult but not impossible.</div><div><br></div><div>Thanks,</div><div>Christopher</div><div>
<br><br><div class="gmail_quote">On 28 November 2011 17:50, Chris Pratt <span dir="ltr"><<a href="mailto:thechrispratt@gmail.com">thechrispratt@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<p>You do realize that if you supply the mapping file to the end user, there is really no reason to obfuscale the code in the first place. They'll have everything they need to properly un-obfuscate and decompile it.<br>
(*Chris*)</p>
<div class="gmail_quote"><div><div class="h5">On Nov 28, 2011 7:32 AM, "Christopher BROWN" <<a href="mailto:brown@reflexe.fr" target="_blank">brown@reflexe.fr</a>> wrote:<br type="attribution"></div></div>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="h5">
<div>Hello,</div><div><br></div><div>What would be the best way to handle logging with logback when deploying obfuscated code?</div><div><br></div><div>For example, with YGuard, when the obfuscator runs, it outputs a mapping file of obfuscated code (class names, method names, etc) to unobfuscated code. When a stacktrace or just any logging trace is output, the class/method names are obviously obfuscated. As it's possible to deploy this mapping with the code, say embedded in the same ".jar", all the information I would need is available.</div>
<div><br></div><div>Without too much re-writing of code (default formatting with logback), what would be the best way to dynamically replace matching class/method names?</div><br clear="all">Thanks,<br>Christopher<br>
<br></div></div>_______________________________________________<br>
Logback-user mailing list<br>
<a href="mailto:Logback-user@qos.ch" target="_blank">Logback-user@qos.ch</a><br>
<a href="http://mailman.qos.ch/mailman/listinfo/logback-user" target="_blank">http://mailman.qos.ch/mailman/listinfo/logback-user</a><br></blockquote></div>
<br>_______________________________________________<br>
Logback-user mailing list<br>
<a href="mailto:Logback-user@qos.ch">Logback-user@qos.ch</a><br>
<a href="http://mailman.qos.ch/mailman/listinfo/logback-user" target="_blank">http://mailman.qos.ch/mailman/listinfo/logback-user</a><br></blockquote></div><br></div>