diff --git a/README.md b/README.md
index 237bb9ab..41faca10 100644
--- a/README.md
+++ b/README.md
@@ -1,17 +1,17 @@
-# BruteForceSettings
-
-This app provides the possibility to manage some settings of the brute force protection in Nextcloud.
-
-- [See app in NC AppStore](https://apps.nextcloud.com/apps/bruteforcesettings)
-
-## Screenshot
-
-![Screenshot of configuration](https://raw.githubusercontent.com/nextcloud/bruteforcesettings/master/screenshots/1.png)
-
-## Description
-
-Brute Force Protection is meant to protect Nextcloud servers from attempts to guess user passwords in various ways. Besides the obvious "*let's try a big list of commonly used passwords*" attack, it also makes it harder to use slightly more sophisticated attacks via the reset password form or trying to find app password tokens.
-
-If triggered, brute force protection makes requests coming from an IP on a bruteforce protected controller with the same API slower for a 24 hour period.
-
-With this app, the admin can exempt an IP address or range from this protection which can be useful for testing purposes or when there are false positives due to a lot of users on one IP address.
+# BruteForceSettings
+
+This app provides the possibility to manage some settings of the brute force protection in Nextcloud.
+
+- [See app in NC AppStore](https://apps.nextcloud.com/apps/bruteforcesettings)
+
+## Screenshot
+
+![Screenshot of configuration](https://raw.githubusercontent.com/nextcloud/bruteforcesettings/master/screenshots/1.png)
+
+## Description
+
+Brute Force Protection is meant to protect Nextcloud servers from attempts to guess passwords and tokens in various ways. Besides the obvious "*let's try a big list of commonly used passwords*" attack, it also makes it harder to use slightly more sophisticated attacks via the reset password form or trying to find app password tokens.
+
+If triggered, brute force protection makes requests coming from an IP on a bruteforce protected controller with the same API slower for a 24 hour period.
+
+With this app, the admin can exempt an IP address or range from this protection which can be useful for testing purposes or when there are false positives due to a lot of people on a single IP address.
diff --git a/appinfo/info.xml b/appinfo/info.xml
index e10465f2..b76589f2 100644
--- a/appinfo/info.xml
+++ b/appinfo/info.xml
@@ -4,7 +4,7 @@
Brute-force settings
Whitelist IPs
+positives due to a lot of accounts on one IP address.]]>
2.5.0
agpl
Roeland Jago Douma