From 40eee61e25fb887f5267686f8a0a7c5bd9f95769 Mon Sep 17 00:00:00 2001
From: Scott Main
You should obfuscate your in-app billing code so it is difficult for an attacker to reverse engineer security protocols and other application components. At a minimum, we recommend that you run an obfuscation tool like Proguard on your +href="{@docRoot}tools/help/proguard.html">Proguard on your code.
In addition to running an obfuscation program, we recommend that you use the following techniques to obfuscate your in-app billing code.
diff --git a/docs/html/guide/google/play/licensing/adding-licensing.jd b/docs/html/guide/google/play/licensing/adding-licensing.jd index 49375c206b67..4a45de398050 100644 --- a/docs/html/guide/google/play/licensing/adding-licensing.jd +++ b/docs/html/guide/google/play/licensing/adding-licensing.jd @@ -699,7 +699,7 @@ method, which the LVL calls to let your application handle errors that are not retryable. For a list of such errors, see Server Response Codes in the Licensing Reference. You can implement +href="{@docRoot}guide/google/play/licensing/licensing-reference.html">Licensing Reference. You can implement the method in any way needed. In most cases, the method should log the error code and calldontAllow().
--
cgit v1.2.3-59-g8ed1b