Replies: 1 comment 1 reply
-
What about a dedicated crypto key? At the moment, each desktop app has a public key that allow the verification of the server, but there's no role distinction between controlling and controlled party. This will require some modification in the protocol and in the desktop application: you have to specify a controlling private key. But this level of protection is often required when dealing with medium to large installations. |
Beta Was this translation helpful? Give feedback.
-
Now that discussions is open I'd like to submit here an idea I originally posted on Issues.
I'm certain others would find it useful too.
Issue #281
Note that it is different from just filtering peers: it would dictate who has rights for remote control or even just screen viewing.
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions