2. Encrypt the signature of the application to ensure that the signature will not be destroyed during the extraction process. If the signature is broken, the application will not run on the device.
3. Check whether the device is the root user in the application. If the device is root, it will refuse to run.
4. Integrate an integrity check module in the App to check the integrity of the App regularly. If the App is found to be cracked or tampered with, you can report it to the developer in time or refuse to run it.
5. Using hardware encryption technologies such as TrustZone and ARMv8 can effectively prevent App from being extracted.
6. Update the App regularly, fix vulnerabilities and improve security. Respond to new cracking technologies in time to ensure the security of the App.