Improve NFCKey description presentation a bit
This commit is contained in:
parent
ee29b162a2
commit
743926138f
|
@ -10,16 +10,19 @@ Auto Name:NFC Key
|
||||||
Summary:Unlock KeePassDroid database with NFC
|
Summary:Unlock KeePassDroid database with NFC
|
||||||
Description:
|
Description:
|
||||||
Unlock KeePassDroid database with any NFC tags such as:
|
Unlock KeePassDroid database with any NFC tags such as:
|
||||||
|
|
||||||
* Mifare Ultralight
|
* Mifare Ultralight
|
||||||
* Mifare Classic
|
* Mifare Classic
|
||||||
* NTAG203
|
* NTAG203
|
||||||
* Sony SmartTag (few types are R/W)
|
* Sony SmartTag (few types are R/W)
|
||||||
|
|
||||||
Security:
|
Security:
|
||||||
NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected
|
NFC tag stores only random numbers, and the password is encrypted with those
|
||||||
Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android
|
numbers, stored in protected Android device memory. An attacker would have to
|
||||||
device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to
|
scan(copy) your NFC tag and either steal and root your Android device to get
|
||||||
re-write it with new random values, rendering the previous information useless.
|
your password. If you suspect that your NFC tag has been read, you can use NFC
|
||||||
|
Key again to re-write it with new random values, rendering the previous
|
||||||
|
information useless.
|
||||||
|
|
||||||
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]
|
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]
|
||||||
.
|
.
|
||||||
|
|
Loading…
Reference in a new issue