From 52d2337c783b7ee6c52237a21c0ee5b1e485c59c Mon Sep 17 00:00:00 2001 From: mateusz-szafraniec Date: Mon, 27 Jan 2014 00:45:40 +0100 Subject: [PATCH] updated description --- metadata/pl.net.szafraniec.NFCKey.txt | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/metadata/pl.net.szafraniec.NFCKey.txt b/metadata/pl.net.szafraniec.NFCKey.txt index e83949ec20..237232bd7c 100644 --- a/metadata/pl.net.szafraniec.NFCKey.txt +++ b/metadata/pl.net.szafraniec.NFCKey.txt @@ -18,10 +18,10 @@ Unlock KeePassDroid database with any NFC tags such as: Security: NFC tag stores only random numbers, and the password is encrypted with those -numbers, stored in protected Android device memory. An attacker would have to -scan(copy) your NFC tag and either steal and root your Android device to get -your password. If you suspect that your NFC tag has been read, you can use NFC -Key again to re-write it with new random values, rendering the previous +numbers (AES-128 algorithm), stored in protected Android device memory. +An attacker would have to scan(copy) your NFC tag and either steal and root your +Android device to get your password. If you suspect that your NFC tag has been read, +you can use NFC Key again to re-write it with new random values, rendering the previous information useless. [https://raw.github.com/mateusz-szafraniec/NFC-Key/master/CHANGELOG.txt Changelog]