# DexGuard's default settings are fine for this sample application. # Display some more statistics about the processed code. -verbose # Access sensitive runtime APIs through reflection. # We also encrypt the resulting strings, adding another layer of obfuscation. -accessthroughreflection class com.example.HelloWorldActivity { android.content.pm.ApplicationInfo getApplicationInfo(); } -encryptstrings "com.example.HelloWorldActivity", "getApplicationInfo" -accessthroughreflection class android.content.pm.ApplicationInfo { int flags; } -encryptstrings "android.content.pm.ApplicationInfo", "flags" # We also encrypt sensitive message strings that could point in the direction # of our detection code. -encryptstrings "*debuggable*"