From 38e3d3ee7259a7b199969aea7432e27a3dd4046e Mon Sep 17 00:00:00 2001 From: mateusz-szafraniec Date: Sat, 25 Jan 2014 00:51:21 +0100 Subject: [PATCH] updated description --- metadata/pl.net.szafraniec.NFCKey.txt | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/metadata/pl.net.szafraniec.NFCKey.txt b/metadata/pl.net.szafraniec.NFCKey.txt index 5458559a7e..e38439c346 100644 --- a/metadata/pl.net.szafraniec.NFCKey.txt +++ b/metadata/pl.net.szafraniec.NFCKey.txt @@ -15,6 +15,12 @@ Unlock KeePassDroid database with any NFC tags such as: * NTAG203 * Sony SmartTag (few types are R/W) +Security: +NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected +Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android +device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to +re-write it with new random values, rendering the previous information useless. + [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog] .