As you might be aware it’s fairly easy to reverse engineer an objective-c iOS app and grab the header files, string values, and assembly code, then someone could perform a few tweaks, replace the graphics and release an app using your code. A few commercial tools have been around for obfuscation, but the costs are probably too high for smaller projects.
Here’s an open source command line objective-c obfuscation tool utility that allows you to obfuscate your class, protocol, and property names with minimal code changes called iOS class guard.
Some of the features of iOS class guard include:
– Obfuscation of Xibs and storyboards
– Generating a JSON symbol map for reverse engineering (for crash reports)
– Obfuscation of all dependencies including Cocoapods
– Seamless integration (once you’ve made the minimal additions required to use iOS class guard
You can read more about iOS class guard on the Polidea blog.
You can find the source code repository with installation instructions on Github here.
A nice open source tool for easily obfuscation.
- Objective-C Category Providing Detailed Class Introspection In The LLDB Console
- Open Source: Library For Automatic Serialization/Deserialization To And From JSON Dictionaries
- Open Source Objective-C Library Enabling Faster HTTP Request Using The SPDY Protocol
- iPhone SDK Objective-C Cheat Sheet Updated
- A Simple Guide To Getting Started With The Mantle Modeling Framework
Original article: Open Source Tool For Easily Obfuscating Objective-C Class, Protocol, And Property Names
©2014 iOS App Dev Libraries, Controls, Tutorials, Examples and Tools. All Rights Reserved.




