You understand that anyone who has access to the machine on which the code is running can always get code that will perform custom class loading, right? This means that they can simply decompile this class and make it write out the decrypted classes, which makes this exercise pointless. True, most people do not know how to do this, but it is possible.
, . , , , , , , ( jad , , ).
, , .