As soon as the public vital has been configured on the server, the server enables any connecting consumer that has the non-public critical to log in. Over the login approach, the consumer proves possession of the private vital by digitally signing The real key exchange.Therefore your neighborhood Laptop or computer won't figure out the remote host.