Documentation

Go to Portal Website

Encrypt All Code

PlanPlatformsMASVS
EnterpriseAndroidMASVS-RESILIENCE-3

Summary

Encrypt All Code is AppTego's strongest Android static-analysis resistance control. It hardens supported application code during the protected build process so decompiled output is substantially harder to understand, copy, or modify.

Use this control for Android apps that contain valuable business logic, proprietary algorithms, fraud controls, authentication flows, licensing logic, payment logic, or security-sensitive decision paths.

What It Protects Against

How It Works

During protected build creation, AppTego transforms supported application code and adds the runtime support needed for the app to execute normally. The transformation is applied after other compatible obfuscation controls so the final release artifact has a stronger static-analysis posture.

AppTego handles the hardening mechanics. Your team should focus on choosing the right protection profile, validating compatibility, and measuring startup, size, and functional impact before production release.

How to Enable the Control

Navigate to Code Obfuscation from the AppTego portal, and expand the Code And String Protection section. Under this section you will find the Encrypt All Code control. Click Enable to apply it to the next protected build.

API Configuration Example

{
  "EncryptAllCode": {
    "protection": true
  }
}
FieldPurpose
protectionEnables encrypt all code for protected builds.

Setup

  1. Open the AppTego Portal.
  2. Select the intended configuration version.
  3. Open Code Obfuscation.
  4. Enable Encrypt All Code.
  5. Save the configuration.
  6. Build a protected Android app.
  7. Run functional, startup, performance, crash, and login-flow validation on physical devices.

Compatibility Guidance

AreaWhat to validate
Reflection and dynamic loadingConfirm features that load classes, methods, or resources by name still work.
Native bridges and cross-platform frameworksTest React Native, Flutter, Unity, Cordova, Xamarin, MAUI, and similar bridge paths carefully.
Startup and cold launchMeasure launch time before and after enabling the control.
Crash reportingConfirm stack traces and crash grouping are still operational enough for release support.
Release sizeConfirm APK/AAB growth fits your distribution requirements.

Rollout Guidance

StageRecommendation
DevelopmentEnable lighter obfuscation first, then add Encrypt All Code once core flows are stable.
StagingTest a production-like protected build on physical devices, real accounts, and representative network conditions.
ProductionRelease only after startup, crash, performance, and support workflows are validated.
Incident responseKeep a known-good protected build profile available so you can quickly rebuild if an incompatibility is found.

User And App Impact

Users should not see a different app flow when the control is compatible with the app. Teams may observe larger build artifacts, longer protected build times, and small runtime overhead depending on app size and framework usage.

Because this is an advanced hardening control, introduce it deliberately and validate the full release path before enabling it for all production users.