updated description
This commit is contained in:
parent
099ee44565
commit
52d2337c78
|
@ -18,10 +18,10 @@ Unlock KeePassDroid database with any NFC tags such as:
|
|||
|
||||
Security:
|
||||
NFC tag stores only random numbers, and the password is encrypted with those
|
||||
numbers, stored in protected Android device memory. An attacker would have to
|
||||
scan(copy) your NFC tag and either steal and root your Android device to get
|
||||
your password. If you suspect that your NFC tag has been read, you can use NFC
|
||||
Key again to re-write it with new random values, rendering the previous
|
||||
numbers (AES-128 algorithm), stored in protected Android device memory.
|
||||
An attacker would have to scan(copy) your NFC tag and either steal and root your
|
||||
Android device to get your password. If you suspect that your NFC tag has been read,
|
||||
you can use NFC Key again to re-write it with new random values, rendering the previous
|
||||
information useless.
|
||||
|
||||
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]
|
||||
|
|
Loading…
Reference in a new issue