diff --git a/metadata/pl.net.szafraniec.NFCKey.txt b/metadata/pl.net.szafraniec.NFCKey.txt index e38439c346..e83949ec20 100644 --- a/metadata/pl.net.szafraniec.NFCKey.txt +++ b/metadata/pl.net.szafraniec.NFCKey.txt @@ -10,16 +10,19 @@ Auto Name:NFC Key Summary:Unlock KeePassDroid database with NFC Description: Unlock KeePassDroid database with any NFC tags such as: + * Mifare Ultralight * Mifare Classic * NTAG203 * Sony SmartTag (few types are R/W) Security: -NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected -Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android -device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to -re-write it with new random values, rendering the previous information useless. +NFC tag stores only random numbers, and the password is encrypted with those +numbers, stored in protected Android device memory. An attacker would have to +scan(copy) your NFC tag and either steal and root your Android device to get +your password. If you suspect that your NFC tag has been read, you can use NFC +Key again to re-write it with new random values, rendering the previous +information useless. [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog] .