Android Question Has anyone used StarForce Android Protection software?

Informatix

Expert
Licensed User
Longtime User
From the web site:
Either their protection is incompatible with a distribution via the Play Store (because you cannot know in advance the user device on which the app will be installed) or it is compatible but that requires that the device data are collected after the app is launched for the first time. This way, the app can request an approval (and maybe an additional bunch of data) from a server to be allowed to run. In this case, how can they prevent the APK from being copied to another device? Impossible. Whatever method is used to bind the app to an unique device, how do they prevent a hacker from modifying the code to remove their protection? It is not said anywhere, except the usual marketing bullshit ("StarForce Android Protection uses obfuscation, integrity checking and other methods of protection to prevent a successful decompilation"). Pigs will fly when an Android app will be impossible to decompile. And as I explain in my ProBundle pdf, you don't need to decompile to Java to modify an app.
I asked a free copy to know more.
 
Last edited:
Upvote 0

Widget

Well-Known Member
Licensed User
Longtime User

They claim their technology is compatible with the Play Store so I am pretty sure it is the latter.

This way, the app can request an approval (and maybe an additional bunch of data) from a server to be allowed to run. In this case, how can they prevent the APK from being copied to another device?

Perhaps their server sends a unique number (checksum?) to the device the first time the app is run and this checksum would be based on the hardware, software serial# and user's name/email. The device would have to on occasion check with their server to see if it is a valid copy of the software (hardware and serial# and User email matches).


I agree. I'm guessing but they might have wrapped their software (binary executable) around the user's APK so their software is what starts up and does the checking before it allows the user's APK to run. The APK would have to be encrypted when it is not running so the user can't hack it and then it is decrypted when the app is run. Or the APK is crippled in such a way that it can't run without first being called by their binary wrapper. Copy protecting Windows .exe files is hard enough. I can't imagine being able to do it with APK's.

I asked a free copy to know more.
Great. Let us know what you discover. Have they discovered a diamond in the rough? Or simply packaged a lot of hot air in a fancy box?
 
Upvote 0

Widget

Well-Known Member
Licensed User
Longtime User
I received the free copy of Protection Studio but it didn't work on my PC, so I let somebody else give a try.

Can you elaborate on the problem you encountered when running it? (In case I get the same problem. I'm thinking of getting an eval copy too.)
 
Upvote 0
Cookies are required to use this site. You must accept them to continue using the site. Learn more…