Categories:System License:GPLv3+ Web Site:https://github.com/mateusz-szafraniec/NFC-Key Source Code:https://github.com/mateusz-szafraniec/NFC-Key Issue Tracker:https://github.com/mateusz-szafraniec/NFC-Key/issues Donate:https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=XBHND7WJ8A46Y Bitcoin:17E32x5ygXkqf5EWJkryZuarUDUFrb8UqQ Auto Name:NFC Key Summary:Unlock KeePassDroid database with NFC Description: Unlock KeePassDroid database with any NFC tags such as: * Mifare Ultralight * Mifare Classic * NTAG203 * Sony SmartTag (few types are R/W) Security: NFC tag stores only random numbers, and the password is encrypted with those numbers, stored in protected Android device memory. An attacker would have to scan(copy) your NFC tag and either steal and root your Android device to get your password. If you suspect that your NFC tag has been read, you can use NFC Key again to re-write it with new random values, rendering the previous information useless. [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog] . Repo Type:git Repo:https://github.com/mateusz-szafraniec/NFC-Key.git Build:1.0,1 commit=a68c2f9eeb7260dda83431c6baf36273ffca1a93 Build:1.01,2 commit=v1.01 Build:1.02,3 commit=v1.02 Build:1.03,4 commit=v1.03 Auto Update Mode:Version v%v Update Check Mode:Tags Current Version:1.03 Current Version Code:4