Details of Android AppSealing Mode and Options

Function Option Details
Sealing Mode  Test

Test mode provides the same security and function with professional version but it has differences and limitations

  • Free of charge
  • Data service available on ADC dashboard
  • AppSealing shows 'Test mode' message periodically while app runtime
  • Tech support not provided
  • Release mode removes AppSealing`s splash screen & message
  • Start to calculate MAD (Monthly Active Device) for billing
  • Technical support available
Dex Encryption  Yes

 It protects java source code by encrypting all classes.dex files in apk. We recommend using that option by default to prevent source code analysis and leaks.


 It does not encrypt dex files (classes.dex) Without encryption, java source code is easily exposed, analyzed, tampered and it can be leaked. Recommend using obfuscation tools such as ProGuard or using the dex encryption option.

Rooting  Block

It detects the rooted device and closes the sealed app. Attacks such as cheat tools, speed hacks, memory tampering, and hooking are possible on rooted devices. Although AppSealing blocks attacks by its security module in the rooted device, it is recommended to block rooting to prevent the attacks. It is also blocking root hiding tools such as Magisk and Suhide.


The sealed app runs on the rooted device. 'Allow' option makes it easier for hackers to attack.

Emulators  Block

It detects the emulator environment and closes the sealed app. Most emulators are equipped with rooting, macro functions, and running on a PC. So, it makes the app less secure than running on mobile. 'Block' reduces exposure to the hacking threat.


Apps can run in an emulator environment. Allowing an app to run on the emulator makes it more vulnerable to hacking attacks and also exposes it to a number of emulator`s built-in functions, such as rooting/macro.

Macro tools  Block

It detects macro tools installed on the device and blocks abusing. Blacklists are always up to date to block macro tools. If a macro tool is detected, the sealed app closes.


It allows the sealed app running on the device installed with macro tools

Packet attacks  Block

It detects packet attack tools installed on the device and blocks data leakage and tampering. Blacklists are always up to date to block packet sniffing tools. If a packet attack tool is detected, the sealed app closes


The sealed app runs even if the packet attack tool is installed on the device. Data over the network can be leaked and tampered by Packet sniffing tools.

Work Profile  Block

If a sealed app is launched in the work profile, AppSealing detects it and closes the sealed app. 'Work Profile' is supported by Android 5.0 (API 21) and higher. It allows using work and personal apps separately on one device. Some cheating tools are found to use this feature for hacking.


The sealed app runs in the 'Work Profile' environment. If the sealed app needs to run in the 'Work Profile' environment, the 'Allow' option supports that. If not absolutely necessary, we recommend blocking the 'Work Profile' to reduce hacking threat exposure.

Was this article helpful?
0 out of 0 found this helpful
comment section


Please sign in to leave a comment.