talk114 / obfuscate4e

Automatically exported from code.google.com/p/obfuscate4e
0 stars 0 forks source link

Allows remote debugging and retrace of stacktrace #18

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
This is more an information than a bug itself.

Does this plugin allows someon in remote debugging a live application to revert 
the stacktrace to the original class name and/or to breakpoint into the remote 
application, according that you have the proguard mapping file configured 
somewhere ?

So let's say I have a class called Test that get's obfuscated to A. Is it 
possible to breakpoint in Test from eclipse, and that the eclipse will itself 
break in A in the remote application but appear as Test in eclipse and if the 
obfuscation didn't occur at all ?

Original issue reported on code.google.com by lavoie.r...@gmail.com on 30 Aug 2013 at 5:40