Details of Android AppSealing Mode and Options

Function Option Details
Sealing Mode  Test

Test mode provides the same security and function with professional version but it has differences and limitations

  • Free of charge
  • Data service available on ADC dashboard
  • AppSealing loads splash screen while app initial loading time every time
  • Tech support not provided
Release
  • Release mode removes splash screen
  • Start to calculate MAD (Monthly Active Device) for billing
  • Technical support available
Dex Encryption  Yes

 It protects java source code by encrypting all classes.dex files in apk. We recommend using that option by default to prevent source code analysis and leaks.

No

 It does not encrypt dex files (classes.dex) Without encryption, java source code is easily exposed, analyzed, tampered and it can be leaked. Recommend using obfuscation tools such as ProGuard or using the dex encryption option.

Rooting  Block

It detects the rooted device and closes the sealed app. Attacks such as cheat tools, speed hacks, memory tampering, and hooking are possible on rooted devices. Although AppSealing blocks attacks by its security module in the rooted device, it is recommended to block rooting to prevent the attacks. It is also blocking root hiding tools such as Magisk and Suhide.

Allow

The sealed app runs on the rooted device. 'Allow' option makes it easier for hackers to attack.

Emulators  Block

It detects the emulator environment and closes the sealed app. Most emulators are equipped with rooting, macro functions, and running on a PC. So, it makes the app less secure than running on mobile. 'Block' reduces exposure to the hacking threat.

Allow

 

Macro tools  Block

It detects macro tools installed on the device and blocks abusing. Blacklists are always up to date to block macro tools. If a macro tool is detected, the sealed app closes.

Allow

It allows the sealed app running on the device installed with macro tools

Packet attacks  Block

It detects packet attack tools installed on the device and blocks data leakage and tampering. Blacklists are always up to date to block packet sniffing tools. If a packet attack tool is detected, the sealed app closes

Allow

The sealed app runs even if the packet attack tool is installed on the device. Data over the network can be leaked and tampered by Packet sniffing tools.

Work Profile  Block

If a sealed app is launched in the work profile, AppSealing detects it and closes the sealed app. 'Work Profile' is supported by Android 5.0 (API 21) and higher. It allows using work and personal apps separately on one device. Some cheating tools are found to use this feature for hacking.

Allow

The sealed app runs in the 'Work Profile' environment. If the sealed app needs to run in the 'Work Profile' environment, the 'Allow' option supports that. If not absolutely necessary, we recommend blocking the 'Work Profile' to reduce hacking threat exposure.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request
comment section

0 Comments

Please sign in to leave a comment.