As you might be aware it’s fairly easy to reverse engineer an objective-c iOS app and grab the header files, string values, and assembly code, then someone could perform a few tweaks, replace the graphics and release an app using your code. A few commercial tools have been around for obfuscation, but the costs are probably too high for smaller projects.
Here’s an open source command line objective-c obfuscation tool utility that allows you to obfuscate your class, protocol, and property names with minimal code changes called iOS class guard.
Some of the features of iOS class guard include:
– Obfuscation of Xibs and storyboards
– Generating a JSON symbol map for reverse engineering (for crash reports)
– Obfuscation of all dependencies including Cocoapods
– Seamless integration (once you’ve made the minimal additions required to use iOS class guard
You can read more about iOS class guard on the Polidea blog.
You can find the source code repository with installation instructions on Github here.
A nice open source tool for easily obfuscation.
Submit A Resource
Have you created a useful tutorial, library or tool for iOS development that you would like to get in front of our 300,000+ monthly page views from iOS developers?
You can submit the url here.
The resources we feel will appeal to our readers the most will be posted on the front page.