Other Ways to Use Dotfuscator
Improve Your Results
A common attack technique is to locate critical code sections by looking for string references inside the binary.
By scrambling the strings in your application, String Encryption makes both of these attacks less likely, because the attackers' string searches will come up empty.
const strings are not encrypted, but all the places that use them are updated with encrypted versions of the string. To get around this, enable Removal, and set Removal | Options | Removal Kind to Remove only literals (const definitions).
If some computationally intensive (highly repeated code) is generating strings (maybe for logging purposes), then there may be performance degradation as extra method calls must be performed to decrypt those strings.
Unlike Renaming and Control Flow which transform as much code as they can unless you specifically exclude items, String Encryption by default encrypts no strings whatsoever. To enable encryption of all strings in an assembly, simply go to the String Encryption | Include tab, and click the checkbox on the assembly node (which will recursively check all subitems).
In the Dotfuscator User Guide:
Dotfuscator Version 126.96.36.19991. Copyright © 2017 PreEmptive Solutions, LLC