Improve NFCKey description presentation a bit
This commit is contained in:
parent
ee29b162a2
commit
743926138f
|
@ -10,16 +10,19 @@ Auto Name:NFC Key
|
|||
Summary:Unlock KeePassDroid database with NFC
|
||||
Description:
|
||||
Unlock KeePassDroid database with any NFC tags such as:
|
||||
|
||||
* Mifare Ultralight
|
||||
* Mifare Classic
|
||||
* NTAG203
|
||||
* Sony SmartTag (few types are R/W)
|
||||
|
||||
Security:
|
||||
NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected
|
||||
Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android
|
||||
device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to
|
||||
re-write it with new random values, rendering the previous information useless.
|
||||
NFC tag stores only random numbers, and the password is encrypted with those
|
||||
numbers, stored in protected Android device memory. An attacker would have to
|
||||
scan(copy) your NFC tag and either steal and root your Android device to get
|
||||
your password. If you suspect that your NFC tag has been read, you can use NFC
|
||||
Key again to re-write it with new random values, rendering the previous
|
||||
information useless.
|
||||
|
||||
[https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]
|
||||
.
|
||||
|
|
Loading…
Reference in a new issue