Robin Krahl
Robin Krahl
This is missing a fix for an issue that occurs when overwriting an existing resident keys, see: https://github.com/Nitrokey/fido-authenticator/pull/14
Thanks for the PR! Some initial thoughts: - Why not implement these on `File` directly? AFAIS that’s the only struct implementing the `littlefs2::io::*` traits. That would be more ergonomic than...
I’m not familiar with the Ubuntu app store but it looks like these two versions come from different sources – see the top right of the window. > Source: Snap...
Thanks for the report! First, let me add some context to explain the current behavior: TOTPs are typically valid for a 30 s period. This period does not start with...
Immediately hiding the OTP would be at least very confusing – you might not even realize that it was displayed at all. Also, it makes the process unnecessarily complicated because...
Relaxing the constraint would most likely lead to the opposite problem, Nitrokey App 2 not being compatible with newer pynitrokey releases. The proper fix would be to extract the library...
Just to be clear, we could of course relax it to `">=0.4.45,
Unfortunately, pynitrokey currently does not use semantic versioning and even patch versions may include breaking changes. Hopefully, this will change in the future. But for the time being, I think...
None that I’m aware of. Even 0.4.40 should work fine, see: https://github.com/Nitrokey/nitrokey-app2/pull/149
Since https://github.com/Nitrokey/nitrokey-app2/pull/264 / [v2.3.2](https://github.com/Nitrokey/nitrokey-app2/releases/tag/v2.3.2), we use the [Nitrokey Python SDK](https://github.com/Nitrokey/nitrokey-sdk-py) instead of pynitrokey. The SDK follows semantic versioning so we only require a semver-compatible version. I hope this improves the...