Changelog
What’s New?
Features, updates and enhancements to the ByteHide platform
Features, updates and enhancements to the ByteHide platform
We’re excited to introduce a new product within the ByteHide platform: Radar, our intelligent and unified security scanner powered by artificial intelligence. Radar is designed to scan your codebase and…
We’re excited to introduce the new platform dashboard, a major update that brings a clearer, smarter, and more security-focused experience. We know that managing the security of your projects can…
After many requests, because yes, your wishes are our commands, we’ve launched a powerful new console-like experience in ByteHide Logs. Now you can search, filter and export logs instantly with…
The first official module for JavaScript integrations is now available Shield, ByteHide’s most popular obfuscator with over 1 million protected applications, now officially supports Next.js with a native integration module….
We’ve just launched a highly requested feature in ByteHide Logs: you can now add comments directly to any log from the control panel and mention teammates to streamline collaboration and…
The most popular code obfuscator for .NET is now available for JavaScript Shield, ByteHide’s most popular product, is now available for JavaScript.After protecting over 1 million applications worldwide, we’re taking…
New Feature: AI-Powered Log Analysis From now on, when you send a log with context, our AI doesn’t just store it. It analyzes it, understands it, and acts on it:…
Beyond all the advantages ByteHide Storage already offers such as being one of the first solutions in the world to incorporate real post-quantum encryption, guaranteeing a zero-knowledge architecture where not…
We’re excited to announce a powerful new feature in Shield: Code Virtualization Protection. This protection is designed to completely hide your IL code and method logic from decompilers, making static…
What’s New ByteHide Shield now supports a global configuration file and environment-based project tokens, allowing for centralized control and secure token management. Configuration Options You can now choose between two…