updated description

This commit is contained in:
mateusz-szafraniec 2014-01-27 00:45:40 +01:00
parent 099ee44565
commit 52d2337c78

View file

@ -18,10 +18,10 @@ Unlock KeePassDroid database with any NFC tags such as:
Security: Security:
NFC tag stores only random numbers, and the password is encrypted with those NFC tag stores only random numbers, and the password is encrypted with those
numbers, stored in protected Android device memory. An attacker would have to numbers (AES-128 algorithm), stored in protected Android device memory.
scan(copy) your NFC tag and either steal and root your Android device to get An attacker would have to scan(copy) your NFC tag and either steal and root your
your password. If you suspect that your NFC tag has been read, you can use NFC Android device to get your password. If you suspect that your NFC tag has been read,
Key again to re-write it with new random values, rendering the previous you can use NFC Key again to re-write it with new random values, rendering the previous
information useless. information useless.
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog] [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]