- Navigation menu
- Why did we decide on this particular method?
- Safe Storage of Passwords, Private Keys, and Other Important Information
- Recover your 12 word backup phrase with btcrecover seedrecover
- How does it work?
- Item is in your Cart
- Your Answer
- NFC tags may be in many different types and form factors as follows:
NFC tags are passive devices that operate without power supply; they must fall within a certain range for activation. The tags cannot transfer data by themselves; instead, they are simply used to transfer information to an “active” device – to a Smartphone, for example.
Why did we decide on this particular method?
An NFC tag is not connected to the Internet.
And this means that it is not subject to such threats as the penetration of a trojan or other hacker attack.
2. NFC tags have a low cost.
Safe Storage of Passwords, Private Keys, and Other Important Information
The simplest NFC tag in the form of a sticker costs from 10 rubles. It is sold in almost every city.
You can record the most important data on such a label and stick it, for example, under the cover of your passport. As we know, most adequate people hide their passports in a safe place.
Recover your 12 word backup phrase with btcrecover seedrecover
Hence, your passwords will be in safekeeping.
3. It is easy to work with NFC tags. Currently, most Smartphones have the ability to record and read NFC tags.
How does it work?
We developed KeepMySeed, a special application on Android (the version on iOS will be ready in the nearest future).
First of all, you should install the application on your Smartphone and run it.
Then bring the Smartphone to the NFC tag. A dialog box appears in which you should enter your sensitive data.
Item is in your Cart
Also, when recording, you can specify “Encrypt Data”. In this case, the program will propose you to enter a password for the data encryption. And the data will be encrypted using the AES – this is the safest data storage method.
All your sensitive data in the tag will be encrypted. And even if an attacker takes possession of your tag, he/she can only read disorganized data.
In order to obtain ordered data from this data chaos, the attacker will have to enter the password key for decryption, which you created when recording the tag.
As a result, we have the following: You need to create and remember only one password key. This password key will be used to encrypt and decrypt your data in the NFC tag.
This is much easier than remembering dozens of logins and passwords.
NFC tags may be in many different types and form factors as follows:
NFC stickers – these are thin stickers with a chip integrated.
Smart rings with NFC chip – all your sensitive data is in the ring on your finger in the encrypted form.
NFC implants for implantation under the skin – at the present time, the surgery for implanting an NFC chip under the skin can be performed painlessly in almost any piercing center.
The chip itself is very tiny and does not make itself felt under the skin.
NFC key chains, cards, etc.
If there are no NFC tags sales outlets in your city, you can order them on our website.
You can download the KeepMySeed application for recording and reading NFC tags on Google Play (This application has open source code.
And it is available for audit. You may find all information about this on the page on Google Play).