share-file-systems
share-file-systems copied to clipboard
Public Keys
Make use of PKI and exchange public keys during invitation.
On subsequent connections an agent will encrypt their identifier using the public key of the remote agent. The remote agent will then decrypt that identity using their private key. This continues to ensure authentication by identity but also ensures identities cannot be spoofed without also replicating key sets.