Closed tobiasgoecke closed 1 year ago
@tobiasgoecke At present, our communication method does not have authentication, it is only related to the protocol, as long as the network is normal and the content of the protocol is correct, the command will be executed.
@vimior, thanks for the reply.
How does authentification over an internet connection work?