This article applies to all TeamViewer users.
At TeamViewer, we believe that top security is a combination of state-of-the-art technology, best practices, and discipline and we are working hard on making sure to provide you with the best and most secure software.
The TeamViewer fingerprint allows users additional proof of the identity of the remote device.
The fingerprint is generated on the local TeamViewer client by the machines public key and consists of letters (small and capital), numbers, and special characters.
Like the TeamViewer ID, each device has a unique fingerprint and can be seen as a TeamViewer ID verifier for all TeamViewer users.
For a connection, the fingerprint of the remote device is calculated locally from the public key the other side uses to establish the connection.
Where can I find the fingerprint?
The fingerprint is located under Help --> About TeamViewer.
The fingerprint is available for the Full version, Host module, and the QuickSupport of Windows, Mac, and Linux devices as well as on mobile devices. Here, the fingerprint is displayed in the log files.
How to use the fingerprint?
Before establishing a connection to your partner, please let them send you the fingerprint via your preferred communication method (e.g. via chat, email, read out loud).
After establishing the connection (e.g. via the TeamViewer ID) you can check via the TeamViewer Toolbar --> Connection Info whether the fingerprint is identical with the one your partner gave you earlier.
With this, you can verify that the connection has been established to the correct device.
Why should I use the fingerprint?
Using the verification via fingerprint is not required for successful and secure TeamViewer connections.
However, in very sensitive cases (e.g., governmental usage) there might be a requirement for a second layer of verification of the remote devices.
The fingerprint has been developed especially for those cases. Still - every TeamViewer user can use it.
The fingerprint acts as an increased trust level for all involved parties and allows users to verify themselves.