- Tubelator AI
- >
- Videos
- >
- Science & Technology
- >
- 5 Essential Steps for Deploying Your App to Google Play Successfully
5 Essential Steps for Deploying Your App to Google Play Successfully
Learn the crucial steps to take before deploying your Android app to Google Play. Ensure code obfuscation and shrinking, along with four other key points, to avoid regrets later on.
Instantly generate YouTube summary, transcript and subtitles!
Install Tubelator On ChromeVideo Summary & Chapters
No chapters for this video generated yet.
Video Transcript
hey guys and welcome back to a new video
in this video just very quickly I want
to show you five things that you
definitely need to make sure of when you
want to deploy your Android app to
Google Play so take this as a deployment
checklist if you think about pushing an
app to Google Play to definitely make
sure you apply these Five Points number
one is you should definitely have code
obfuscation and code shrinking enabled
so here I am in a random project from my
previous video about encrypted data
store that doesn't matter but in Android
you have this build Gradle file in which
you have your Gradle config and down
here for the release build type you have
this Boolean is Minify enabled and by
default it's actually set to false but
you want to set this to true because
that will use R8 which is a code
optimization tool which will in the end
just obfuscate the source code of your
app before packaging it into an APK
obfuscation means that all your function
variable class names that are very human
readable in the actual source code will
be converted to very unreadable names
for the actual release build so what was
previously main activity will maybe just
be um b c or so so some random sequences
of letters and this on the one hand has
the advantage that of course your
resulting APK will be smaller since
possibly longer class names longer
source code files will be converted to
Shorter files with um shorter names and
it also has the side effect that your
app will be harder to reverse engineers
so someone a possible attacker who might
get your APK can of course try to
extract the source code of that again
and I don't know try to find sensitive
data try to find certain API Keys
certain secrets and if you Minify your
app with code officiation then that'll
of course be quite harder since the
attacker can't easily read your class
names and can't easily navigate through
the code base it's important to say that