diff --git a/metadata/pl.net.szafraniec.NFCKey.txt b/metadata/pl.net.szafraniec.NFCKey.txt index e83949ec20..237232bd7c 100644 --- a/metadata/pl.net.szafraniec.NFCKey.txt +++ b/metadata/pl.net.szafraniec.NFCKey.txt @@ -18,10 +18,10 @@ Unlock KeePassDroid database with any NFC tags such as: Security: NFC tag stores only random numbers, and the password is encrypted with those -numbers, stored in protected Android device memory. An attacker would have to -scan(copy) your NFC tag and either steal and root your Android device to get -your password. If you suspect that your NFC tag has been read, you can use NFC -Key again to re-write it with new random values, rendering the previous +numbers (AES-128 algorithm), stored in protected Android device memory. +An attacker would have to scan(copy) your NFC tag and either steal and root your +Android device to get your password. If you suspect that your NFC tag has been read, +you can use NFC Key again to re-write it with new random values, rendering the previous information useless. [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]