Yeah that link in my last response has chrome and firefox tested. This may be an issue with Samsung phones in general especially if Amal isn’t having the same issues as in that chart. I’d love to dig into this and get the bridge working as a viable drop-in to fill the gaps that android is lacking at the moment. Especially since Samsung is 30.8% of the android market share #ref.
The marketer in me also suspects that filling this gap could seriously boost the sales and visibility of Vivokey as a brand as the annoyed users of yubikeys are frequently complaining about this as well https://www.reddit.com/r/yubikey/comments/1lyf2z0/fido_2_passkey_nfc_prompt_not_working_on_android/ and they should in theory also be able to use this app. This momentum could be awesome growth for vivokey, at least until android implements the function in the core OS.
Just to double check things we checked together at the event one more time: when you do the exact same thing with a reader on a PC, you do get a valid aaguid?
Edit: well not the EXACT same thing. I want ti confirm the app is still installed ans configured propety.
I’ve never had any issues with the ACR 1252U (or most other PC/SC readers) on Linux, but I pretty much only run stock Debian or its non-Ubuntu variants. I just install pcsc-lite and libpcsclite-dev and am able to read tags, install applets, etc. Now actually getting cards/applets to work with things like the browser is a whole different beast.
I’ll need to try again with my 1252u. I also have a 1552u on the way. I can test both to see if I can get something to work. But yeah, actually getting things integrated is the battle
We really need an all-in-one NFC manager app for Linux that can handle getting things integrated for NFC signin + browser integration for passkeys + applet installation
No. Tripple-checked as that was my first thought to. Even turned it on then back off to be safe.
No – the sign-in flow with the NFC Bridge presents the same on Chrome and Firefox. But on Firefox, passkeys.io briefly flashes an error then logs me in. On Chrome, I just remain on the log in screen.
I’m sending you a screen recording of the enrollment and sign-in flows for both Firefox and Chrome.
Long-press the VivoKey logo to enable debug mode. It will log to a debug file in encrypted storage which you can share. The log will redact sensitive information like PIN, but expose things like token UID, relying parties, and account names.