You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I agree to follow the code of conduct that this project uses.
I have searched the issue tracker for a feature request that matches the one I want to file, without success.
Problem description
I went through most of the issue, No one cares that app.asar leaked the source code, this framework is more like forcing you to do open source software, your source code logic in app.asar at a list, and Electron website does not protect the source code to prevent the best solution to crack, Electron website security recommendations are only to prevent attacks from other hosts, However, Electron application is installed on the user side of the client, rather than deployed to the server, should be prevented from being cracked and tampered with by the user, just like other language development of the client, just like the official website, Electron application is not a browser, should not only front-end capabilities, as well as back-end capabilities, it should have back-end security.
I do not know whether I am not involved in deep enough or Electron design is not deep enough, I hope Electron can do enterprise applications, security and customization are relatively perfect and cutting-edge.
If anyone knows of a best practice in this area, please let me know. Thank you.
Proposed solution
Whether there are best practices or scheme for protecting source code from being cracked,Or the source code is packaged into binary executables, similar to the way pkg packages nodejs projects, at least the source code is not easy to view and debug, not easy to secondary development.
Alternatives considered
At this stage I have found that the only way to protect JavaScript source code is to use VM.Script() to create cached data, but there are more restrictions.
Additional information
No response
The text was updated successfully, but these errors were encountered:
Pre-flight checklist
Problem description
I went through most of the issue, No one cares that app.asar leaked the source code, this framework is more like forcing you to do open source software, your source code logic in app.asar at a list, and Electron website does not protect the source code to prevent the best solution to crack, Electron website security recommendations are only to prevent attacks from other hosts, However, Electron application is installed on the user side of the client, rather than deployed to the server, should be prevented from being cracked and tampered with by the user, just like other language development of the client, just like the official website, Electron application is not a browser, should not only front-end capabilities, as well as back-end capabilities, it should have back-end security.
I do not know whether I am not involved in deep enough or Electron design is not deep enough, I hope Electron can do enterprise applications, security and customization are relatively perfect and cutting-edge.
If anyone knows of a best practice in this area, please let me know. Thank you.
Proposed solution
Whether there are best practices or scheme for protecting source code from being cracked,Or the source code is packaged into binary executables, similar to the way pkg packages nodejs projects, at least the source code is not easy to view and debug, not easy to secondary development.
Alternatives considered
At this stage I have found that the only way to protect JavaScript source code is to use VM.Script() to create cached data, but there are more restrictions.
Additional information
No response
The text was updated successfully, but these errors were encountered: