Based on the reviews on the Play Store and discussion elsewhere, this app appears to have serious issues with Android 13 operating systems in general. It previously had issues with Android 12 operating systems before they fixed them. They're likely to start using Play Integrity attestation eventually to forbid using anything other than a Google certified OS. They simply aren't competent enough to do that yet. I wouldn't expect much unless you convince them that this is incredibly misguided and harming users.

    FYI: I'm forwarding the response I received from MitID support:

    Thank you for your e-mail.
    We are aware about the issue you are experiencing, our supplier are working to solve this.
    There are scheduled an update monday 7th of november, the update should fix this problem.

      7 days later

      Another data point:

      GOS has once again updated to latest version (TP1A.221005.002.2022110600) but this time MitID didn't break, and kept working. The combination that seems to be stable is "OEM unlock" disabled and "exploit protection compatibility mode" enabled.

      This is on MitID 2.3.4, I delibetary did not update the app because I wanted to check if this problematic version would trip agan on a new GOS update.

        After reinstaling the APP and setting again the user the app worked. I did a test and removed all the google play store services. MIT Id have worked, no issue ,nem id did not want to start saying app needs play services etc.
        I did restarted the phone and after the reset mitid did not worked. "Device is rooted".
        After installing the play services etc as it was before the app still did not worked.
        I had to once more reinstall the app to make it work.
        Next day the APP worked but in aurora I got google play update , could not make it update the system did not allowed I think.
        I reinstalled the app and did the same as @lbschenkel . will see how long it will take till it breaks again.

          2 months later

          lbschenkel I am on the fence on installing GrapheneOS, as I am also a user of the MitID app.
          Are the issue resolved or have you found a workaound?

          lbschenkel Is there any acknowledgement from their development team as to whether that's expected or not, and if they're planning to do anything about it?

          I'm asking because the topic of this app comes up from time to time, so I would like to be able to give as much current information as possible to assist them.

          Their support said the next release (now current) would fix it but nothing changed. Given the reviews on Play Store it seems to be a widespread issue, and they simply don't care.

          Given that they are a goverment mandated monopoly, it is not like you can choose a competitor's implementation...

            lbschenkel Funnily enough, in an old phone that I use for experimentation (rooted with Magisk) I can fake it enough to make the app work, but in a non-rooted, hardened device like GOS it refuses to work and falsely claims that it is rooted.

              lbschenkel That is starting to sound like Play Integrity API or something of that sort...

              Would you happen to know whether those other reviews are from people not running an alternative OS? If it is a widespread issue with the app in general, I suppose it's expected for it to also not work on GrapheneOS. Likewise, if they're choosing to only let Google certified OSes use the app, that's unfortunate but understandable. There's only something actionable for us here if the app is only broken on GrapheneOS, which isn't sounding like it's the case...

              Very unfortunate for what seems like a very important app to many people, they should really get their act together.

              If it is Play Integrity API, the only realistic option would be to get them to implement this:

              https://grapheneos.org/articles/attestation-compatibility-guide

                matchboxbananasynergy I have no idea, but I think they are not using the integrity API because then the app should refuse to work from the very start.

                Given what I have experienced after a lot of experimentation, I think they are doing some ad-hoc checks client-side together with measurements being sent server-side, and perhaps the server implements heuristics to revoke clients. Given that the app needs network permission to do anything useful (its purpose is to sign incoming auth requests from the server), it is not possible to prevent it from being victim of server-side shenigans.

                But it is very possible that the integrity verification is one of the measuments involved. I just don't believe it is the sole one.

                lbschenkel
                Thank you for the update. I use MitID both private and in my company, so that would be cumbersome to switch permanent to the code display unit.
                Have a great weekend.