Encryption WrapperWhen it comes to encrypting your software, the ideal solution to save time and effort is to use our encryption wrapper. You can protect your software against reverse engineering and piracy in a fully automated way.
With minimal effort it completely encrypts the software you want to protect. It shields the application with a security shell and anti-debugging and anti-disassembly methods are injected into your code.
How the encryption wrapper worksOur wrapper is integrated as a post-build process. After compilation of your software and before creation of the setup, the encryption operations are carried out. Our wrapper is available both via graphical user interface or command line tool. When used via command line tool, it can run as a continuous integration in an automated build system. On the launch of the protected software, the code of our engine is executed first and checks for available licenses. If a license is detected, it will be used to decrypt the protected software. In addition, it runs integrity checks to verify possible tampering attacks.
Supported Operating SystemsOur wrapper encrypts executables and libraries for Windows, macOS, Linux and many leading embedded operating systems. When your software consists of several applications and libraries, protected and unprotected items can be operated collectively.
Do I need to change my sourcecode?
No. The use of our wrapper does not require any change in your source code. You just integrate it as a post-build process. Encryption operations are carried out after compilation of your software and before creation of the setup. Our wrapper is available both via graphical user interface and command line tool. As a command line tool, it can run in continuous integration in an automated build system.
We have a special set-up for our build process, how should we work with your solution?
Our recommendation is to automate all steps in the build process, which can be done in virtually all build setups (even cloud-based build servers). Compilation, protection and signing should be included as standard consecutive steps. Since all our protection tools have a command-line variant, they are always easy to integrate. However, to discover all options and parameters available in our tools the GUI is very handy.
Are there any performance impacts?
Decryption and encryption always takes some computing power, with that in mind we developed our security mechanism in such a way as to minimize any performance loss . However, no application is ever the same, therefore we have included extra options to let you tweak and optimize security parameters so you can decide what works best based on your needs. Many real-time processes have been successfully protected with our tools and we can always assist and advise on this matter.