If this is your key, and the application is intended for others, then they will be available in the application if they were configured with reverse processing. Even if you encrypted them in the application and decrypted during use, you will need to include a decryption key in your application, and therefore a certain attacker can also deploy and decrypt.
, .
, CONSUMER_KEY CONSUMER_SECRET . , , , .
"-" -. - - Twitter -, .
, , , - Twitter. - -. - - , - REST API Twitter, . - -. - - - - , - .
: http://wickedlysmart.com/twitternews-oauth/ https://dev.twitter.com/oauth/application-only http://hayageek.com/login-with-twitter/