<p dir="ltr">Exactly, so the private keys are never sent to other devices. And the public keys are, well, public (we could even be using them as device ID, as I wrote on another TODO in device.h). This is how ssh and other protocols work, too.</p>
<div class="gmail_quote">On Jan 16, 2014 6:41 PM, "Yuri Samoilenko" <<a href="mailto:kinnalru@gmail.com">kinnalru@gmail.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<p>Question solved.<br>
As i understand every device(mobile or desktop) has own key pair. When pairing occures device receive remote public key and sends own. E.g. each device has public keys of EVERY devices paired with. <br>
When device send package it encrypt it with apropriate recipien public key. When device receive package it decrypt it with OWN private key.<br>
Right?</p>
<div class="gmail_quote">16.01.2014 20:22 пользователь "Yuri Samoilenko" <<a href="mailto:kinnalru@gmail.com" target="_blank">kinnalru@gmail.com</a>> написал:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hmm this is not a bug. You store public key if device already have<br>
public key and provide it for desktop?<br>
I don't understand whole auth system :(<br>
</blockquote></div>
<br>_______________________________________________<br>
KDEConnect mailing list<br>
<a href="mailto:KDEConnect@kde.org">KDEConnect@kde.org</a><br>
<a href="https://mail.kde.org/mailman/listinfo/kdeconnect" target="_blank">https://mail.kde.org/mailman/listinfo/kdeconnect</a><br>
<br></blockquote></div>