From 743926138f6b3de22fb7964ca2a2e0c3967ce5fe Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Daniel=20Mart=C3=AD?= Date: Sat, 25 Jan 2014 01:54:27 +0100 Subject: [PATCH] Improve NFCKey description presentation a bit --- metadata/pl.net.szafraniec.NFCKey.txt | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/metadata/pl.net.szafraniec.NFCKey.txt b/metadata/pl.net.szafraniec.NFCKey.txt index e38439c346..e83949ec20 100644 --- a/metadata/pl.net.szafraniec.NFCKey.txt +++ b/metadata/pl.net.szafraniec.NFCKey.txt @@ -10,16 +10,19 @@ Auto Name:NFC Key Summary:Unlock KeePassDroid database with NFC Description: Unlock KeePassDroid database with any NFC tags such as: + * Mifare Ultralight * Mifare Classic * NTAG203 * Sony SmartTag (few types are R/W) Security: -NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected -Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android -device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to -re-write it with new random values, rendering the previous information useless. +NFC tag stores only random numbers, and the password is encrypted with those +numbers, stored in protected Android device memory. An attacker would have to +scan(copy) your NFC tag and either steal and root your Android device to get +your password. If you suspect that your NFC tag has been read, you can use NFC +Key again to re-write it with new random values, rendering the previous +information useless. [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog] .