Improve NFCKey description presentation a bit

This commit is contained in:
Daniel Martí 2014-01-25 01:54:27 +01:00
parent ee29b162a2
commit 743926138f

View file

@ -10,16 +10,19 @@ Auto Name:NFC Key
Summary:Unlock KeePassDroid database with NFC
Description:
Unlock KeePassDroid database with any NFC tags such as:
* Mifare Ultralight
* Mifare Classic
* NTAG203
* Sony SmartTag (few types are R/W)
Security:
NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected
Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android
device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to
re-write it with new random values, rendering the previous information useless.
NFC tag stores only random numbers, and the password is encrypted with those
numbers, stored in protected Android device memory. An attacker would have to
scan(copy) your NFC tag and either steal and root your Android device to get
your password. If you suspect that your NFC tag has been read, you can use NFC
Key again to re-write it with new random values, rendering the previous
information useless.
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]
.