Function | Option | Details |
Sealing Mode | Test |
Test mode provides the same security and function with professional version but it has differences and limitations
|
Release |
|
|
Dex Encryption | Yes |
It protects java source code by encrypting all classes.dex files in apk. We recommend using that option by default to prevent source code analysis and leaks. |
No |
It does not encrypt dex files (classes.dex) Without encryption, java source code is easily exposed, analyzed, tampered and it can be leaked. Recommend using obfuscation tools such as ProGuard or using the dex encryption option. |
|
Rooting | Block |
It detects the rooted device and closes the sealed app. Attacks such as cheat tools, speed hacks, memory tampering, and hooking are possible on rooted devices. Although AppSealing blocks attacks by its security module in the rooted device, it is recommended to block rooting to prevent the attacks. It is also blocking root hiding tools such as Magisk and Suhide. |
Allow |
The sealed app runs on the rooted device. 'Allow' option makes it easier for hackers to attack. |
|
Emulators | Block |
It detects the emulator environment and closes the sealed app. Most emulators are equipped with rooting, macro functions, and running on a PC. So, it makes the app less secure than running on mobile. 'Block' reduces exposure to the hacking threat. |
Allow |
Apps can run in an emulator environment. Allowing an app to run on the emulator makes it more vulnerable to hacking attacks and also exposes it to a number of emulator`s built-in functions, such as rooting/macro. |
|
Macro tools | Block |
It detects macro tools installed on the device and blocks abusing. Blacklists are always up to date to block macro tools. If a macro tool is detected, the sealed app closes. |
Allow |
It allows the sealed app running on the device installed with macro tools |
|
Packet attacks | Block |
It detects packet attack tools installed on the device and blocks data leakage and tampering. Blacklists are always up to date to block packet sniffing tools. If a packet attack tool is detected, the sealed app closes |
Allow |
The sealed app runs even if the packet attack tool is installed on the device. Data over the network can be leaked and tampered by Packet sniffing tools. |
|
Work Profile | Block |
If a sealed app is launched in the work profile, AppSealing detects it and closes the sealed app. 'Work Profile' is supported by Android 5.0 (API 21) and higher. It allows using work and personal apps separately on one device. Some cheating tools are found to use this feature for hacking. |
Allow |
The sealed app runs in the 'Work Profile' environment. If the sealed app needs to run in the 'Work Profile' environment, the 'Allow' option supports that. If not absolutely necessary, we recommend blocking the 'Work Profile' to reduce hacking threat exposure. |