How can I garble javascript code before sending it to client side. I don't want to expose functionalities. The code is already compressed using jsmin.
如何在将javascript代码发送到客户端之前将其解密。我不想暴露功能。代码已使用jsmin压缩。
5 个解决方案
#1
You could try some online obfuscator like this:
您可以尝试这样的在线混淆器:
#2
You need an obfuscator, see this for an example.
您需要一个混淆器,请参阅此示例。
Anyone determined enough can always reverse it though, and tools like this can help.
任何足够坚定的人都可以随时改变它,这样的工具可以提供帮助。
#3
Javascript is interpreted plaintext. As such any obfuscation is a placebo at best and easily reversed.
Javascript被解释为纯文本。因此,任何混淆都是最好的安慰剂并且容易逆转。
More to the point, if you're writing enough Javascript to constitute a work valuable enough to protect, you're doing something wrong.
更重要的是,如果你正在编写足够的Javascript来构建一个足以保护的工作,那么你做错了什么。
My Javascript these days consists of including jQuery, a handful of plug-ins and some code to activate those plug-ins and do some styling.
我的Javascript现在包括jQuery,一些插件和一些代码来激活这些插件并做一些样式。
I have a hard time envisioning writing anything in Javascript significant enough that I'd care about protecting it, which is just as well because you can't protect it. Not really.
我很难想象用Javascript编写任何足够重要的东西,以至于我都在关心保护它,这也是因为你无法保护它。并不是的。
#4
Search google for: Javascript obfuscator
搜索谷歌:Javascript混淆器
You might add your platform to the query, as well. There are plenty of tools already out there that you can incorporate into your project.
您也可以将平台添加到查询中。已经有很多工具可以整合到您的项目中。
#5
A word of warning: most obfuscated JS on the internet is security hole exploit code. You risk being mistaken for a sploit, particularly by the more paranoid anti-virus scanners.
一句警告:互联网上最混淆的JS是安全漏洞利用代码。你可能会被误认为是一个漏洞,特别是更偏执的反病毒扫描程序。
#1
You could try some online obfuscator like this:
您可以尝试这样的在线混淆器:
#2
You need an obfuscator, see this for an example.
您需要一个混淆器,请参阅此示例。
Anyone determined enough can always reverse it though, and tools like this can help.
任何足够坚定的人都可以随时改变它,这样的工具可以提供帮助。
#3
Javascript is interpreted plaintext. As such any obfuscation is a placebo at best and easily reversed.
Javascript被解释为纯文本。因此,任何混淆都是最好的安慰剂并且容易逆转。
More to the point, if you're writing enough Javascript to constitute a work valuable enough to protect, you're doing something wrong.
更重要的是,如果你正在编写足够的Javascript来构建一个足以保护的工作,那么你做错了什么。
My Javascript these days consists of including jQuery, a handful of plug-ins and some code to activate those plug-ins and do some styling.
我的Javascript现在包括jQuery,一些插件和一些代码来激活这些插件并做一些样式。
I have a hard time envisioning writing anything in Javascript significant enough that I'd care about protecting it, which is just as well because you can't protect it. Not really.
我很难想象用Javascript编写任何足够重要的东西,以至于我都在关心保护它,这也是因为你无法保护它。并不是的。
#4
Search google for: Javascript obfuscator
搜索谷歌:Javascript混淆器
You might add your platform to the query, as well. There are plenty of tools already out there that you can incorporate into your project.
您也可以将平台添加到查询中。已经有很多工具可以整合到您的项目中。
#5
A word of warning: most obfuscated JS on the internet is security hole exploit code. You risk being mistaken for a sploit, particularly by the more paranoid anti-virus scanners.
一句警告:互联网上最混淆的JS是安全漏洞利用代码。你可能会被误认为是一个漏洞,特别是更偏执的反病毒扫描程序。