DashO Java Obfuscator Change Log V8.1 Build 0 - Release Date April 18, 2017
Change Log - Version 8.1.0 - Release Date April 18, 2017
Enhancements:
The project wizard now outputs warnings to the Problems tab.
The War project wizard will automatically exclude some standard frameworks from being added as entry points.
String decrypters are now generated and used on a per-jar basis, by default, for multi-jar projects.
A properties file can now be passed on the command line via --properties (filename) to provide the values for properties used in the project's configuration.
Changes:
The level and number of string decrypters both now default to 2 in the .dox schema.
All decrypters for string encryption are now added to generated anonymous static inner classes. Decrypter Class configuration is now used to specify the containing outer classes.
The optional Constant Pool Tag is now embedded as custom class attribute.
Updated the DashO Gradle Plugin
v2.2.1 with support for a customized transform name.
v2.3.0 with support for the Android Gradle 2.3.0 plugin and which utilizes the new --properties command line argument.
Includes apktool-2.2.2.
Fixes:
Fixed an exception when processing Spring constructor arguments under certain circumstances.
The project wizard will log a warning and continue processing .war and .jar files after errors reading metadata.
Fixed an issue where a recursive property expansion error would inaccurately occur.
Fixed an issue where string encryption could, by altering the order of events during static initialization, cause incorrect behavior, under certain conditions.
Fixed an issue with abstract method implementation resolution that could inappropriately stop the build.
Fixed an issue where the optional Constant Pool Tag did not appear in the final output classes.
Fixed the ${dasho.java.version} property value when running DashO with Java 8.
PreEmptive is a trusted global leader of protection tools for Desktop, Mobile, Cloud, and Internet of Things (IoT) applications. We help organizations make their applications more resistant and resilient to hacking and tampering — protecting intellectual property, sensitive data and revenue.