
Butter Knife is an annotation processing library that helps streamline boilerplate Java code in Android views. At compile time, Butter Knife annotations are processed to generate the relevant UI code to make views function properly.
When obfuscating applications that use Butter Knife, there are specific configuration patterns you should follow. The code that connects generated classes to their views uses runtime reflection under the hood. Because of this, the original name of the View is required.
When configuring DashO we need to:

Dotfuscator Pro 4.39 adds Xamarin anti-tamper controls and early support for .NET Core 3.0 Preview 1 while dramatically simplifying project integration.
CLEVELAND, OH — December 19, 2018 — Dotfuscator 4.39, available for download now includes Anti-tamper controls for Xamarin.Android. This feature adds to the growing list of run-time detection and response features that have rapidly emerged as standard controls required for every Android app processing sensitive information or secure transactions.

Dotfuscator Pro 4.39 includes MUCH simpler Xamarin Project integration and Anti-tamper and Rooted device controls for Xamarin.Android
Dotfuscator 4.39, available for download, now includes Anti-tamper controls for Xamarin.Android. This feature adds to the growing list of run-time detection and response features that have rapidly emerged as standard controls required for every Android app processing sensitive information or secure transactions.
This release comes less than three weeks after Version 4.38 dramatically simplified the configuration of Dotfuscator within Xamarin projects and just a few months after Dotfuscator added Rooted Device detection and defense controls.

Time is of the essence for application security — the sooner IT teams can detect potential attacks and the longer it takes cybercriminals to crack app code, the better your business outcomes.
But with hackers adapting to overcome infosec efforts and new software vulnerabilities constantly emerging, how do companies gain more time — and give hackers less time — across their application stack?
It all starts with a change in direction: Security needs to shift left.

Hotel chain Marriott International isn’t having a good week: As reported by The New York Times, the company announced that its reservation database for Starwood-branded properties had been hacked. The numbers aren’t great, with initial data suggesting that 500 million guest records have been compromised across records dating back to 2014.
The result? This is a bigger breach than the recent Equifax debacle, catapulting it to spot on the “biggest breaches of all-time list” behind Yahoo’s three billion compromised accounts in 2017. It’s a sobering reminder that even large organizations with substantial security resources still face the specter of data breaches, but also raises an important question: What (if anything) can companies do to limit their risk of becoming the next hacked-network newsmaker?

Entity Framework is an object-relational mapping (ORM) framework used in Xamarin, WPF, ASP.NET and many other types of .NET applications. It greatly simplifies the code that a developer typically needs to write for database access and querying.
Entity Framework pairs the names of database tables to the names of model types in source code that are used to generate the tables. These names must stay consistent for the application to function properly. This means that when performing renaming obfuscation on these sections of code, we must exclude the model types from renaming.

It’s no longer enough to just make great software. Now, mobile-enabled, always-connected users demand applications capable of meeting them where they are — without sacrificing quality, performance, or protection. This means easy to use, intuitive software that’s always available, always secure, and always works, delivered at a fast cadence.
To meet these increasing expectations, 3rd party tools and solutions continue to be critical for development environments. Companies recognize the need to use a combination of in-house, open-source, and proprietary offerings to deliver competitive software on-demand.
At PreEmptive we’re continuously searching for ways to improve our development process, boost productivity, and drive best-of-breed software design. But we’re not selfish — in the spirit of the season, we’re happy to share some of our favorite tools for software development and design.

DashO has support for protecting applications that use Spring Framework Core. Spring can be configured either by custom annotations or XML configuration files, and DashO has support for both. However, applications that use custom annotations require additional handling.