updated description

This commit is contained in:
mateusz-szafraniec 2014-01-27 00:45:40 +01:00
parent 099ee44565
commit 52d2337c78

View file

@ -18,10 +18,10 @@ Unlock KeePassDroid database with any NFC tags such as:
Security:
NFC tag stores only random numbers, and the password is encrypted with those
numbers, stored in protected Android device memory. An attacker would have to
scan(copy) your NFC tag and either steal and root your Android device to get
your password. If you suspect that your NFC tag has been read, you can use NFC
Key again to re-write it with new random values, rendering the previous
numbers (AES-128 algorithm), stored in protected Android device memory.
An attacker would have to scan(copy) your NFC tag and either steal and root your
Android device to get your password. If you suspect that your NFC tag has been read,
you can use NFC Key again to re-write it with new random values, rendering the previous
information useless.
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]