Jason's comments below do a better job of explaining what I was getting
We have some titles in development (for the U.S. J2ME MIDP 1.0 phones)
and they rely heavily on server side processing.
1. An IM/Chat client. The server actually connects to the various IM
services, since these phones only offer HTTP connections. This also
reduces the size of the client because we only need to implement one
client/server protocol for the phone ... our own.
2. Multiplayer games. Game play is resolved on the server, client is
mainly a graphics terminal.
(P.S. Looking for contacts in Japan for marketing these titles).
[mailto:keitai-l-bounce_at_appelsiini.net] On Behalf Of Jason Pollard
Sent: Monday, September 01, 2003 12:35 PM
Subject: (keitai-l) Re: Hacking Java sites
Extending #2 below, what many people don't realize (potential clients
note :^), is that an iAppli that can do anything interesting is more
client-side java program. iApplis nowadays are so small that there's
no room for anything other than GUI code. Even then there may not be
resources on the client, and the client app would consult the server to
generate, for example, a stock chart. A typical _system_ would include
side code, which is generally designed exlusively for the mini-client.
Although better architected solutions will work with other clients such
fat-client GUI, SOAP, Web clients, etc. The system is as secure as the
platform it's built on and the dudes who administer it. So, while
be able to download and decompile the client-side java code, they may
getting a small part of the information they need to copy your service.
would need to worry about someone decompiling the code to learn the
API and then creating a copycat program of your original client. At
moment I can't think of anything you could do to prevent that.
#1 below, obfuscators are really only useful for reducing code size.
Obfuscated code is just an annoying speed bump for someone who really
copy your code.
--- Bill Volk <bvolk_at_teknikcorp.com> wrote:
> I think there are two main steps you can take to prevent this.
> 1. Use code obsufcators and compressors to make the code harder to
> 2. Have the software access assets from a server via. HTTP and use
> sort of authentication scheme to verify that the software is a
> legitimate purchase.
> Bill Volk
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
This mail was sent to address bvolk_at_teknikcorp.com
Need archives? How to unsubscribe? http://www.appelsiini.net/keitai-l/
Received on Tue Sep 2 20:03:16 2003