updated description
This commit is contained in:
parent
8eb2502318
commit
38e3d3ee72
|
@ -15,6 +15,12 @@ Unlock KeePassDroid database with any NFC tags such as:
|
|||
* NTAG203
|
||||
* Sony SmartTag (few types are R/W)
|
||||
|
||||
Security:
|
||||
NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected
|
||||
Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android
|
||||
device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to
|
||||
re-write it with new random values, rendering the previous information useless.
|
||||
|
||||
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]
|
||||
.
|
||||
|
||||
|
|
Loading…
Reference in a new issue