How Does Eazfuscator.NET Work?Version: 2024.2Chapter 3. How Does Eazfuscator.NET Work? Table of Contents3.1. Obfuscation Techniques3.1.1. Symbol Renaming3.1.2. String Encryption3.1.3. Constant Literals Pruning3.1.4. Overload Induction3.1.5. Class Hierarchy Linerization3.1.6. XML Documentation Filter3.1.7. XAML Renaming3.2. Optimization Techniques3.2.1. Merging of String Literal Duplicates3.2.2. Sealing of Terminal Classes3.2.3. String Compression3.2.4. Code Optimizations