Obfuscate your Windows Phone 7 Code

Update 07 Nov: You can now get a free obfuscator from PreEmptive. Read this post for details.

A problem a lot of developers worry about is the reverse engineering of their code. Using freely available tools, it can often be easy to extract the source code from a compiled assembly and, therefore, many developers choose to obfuscate their code, which essentially means that their source code becomes unreadable to humans (but continues to work properly). Of course, anything man made can be broken, but it’s a case of placing barriers to decrease the return on investment for would-be crackers.

PreEmptive Solutions have announced that their Dotfuscator Professional product will be able to obfuscate code for Windows Phone 7 applications. Their application allows developers to:

  • Obfuscate Silverlight assemblies to protect Intellectual Property and prevent tampering;
  • Process XAP files and automatically re-sign assemblies to automate and streamline the build process.
  • Compress and link Silverlight assemblies to optimize load time and performance.
  • Inject analytics into Silverlight assemblies with no programming or access to source code to help developers and architects improve software quality and user experience.
  • Integrate web analytics through Expression Blend and the Silverlight Analytics Framework to help designers fine tune web application design and value.

Check out WMPoweruser for more details.




One Response to Obfuscate your Windows Phone 7 Code

  1. Pingback: Microsoft and Windows Round-up – 14.7.2010 | WinExtra

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: