diff --git a/docs/extending/establishing-a-connection.mdx b/docs/extending/establishing-a-connection.mdx index 864dcb1bf..58d299216 100644 --- a/docs/extending/establishing-a-connection.mdx +++ b/docs/extending/establishing-a-connection.mdx @@ -26,7 +26,7 @@ In order for the mobile app to know which certificates it can trust, it conducts This is achieved through the following steps: * Desktop app starts an insecure server on port 8089. * Mobile app connects to localhost:8089 and sends a Certificate Signing Request to the desktop app. -* Desktop app uses it's private key (this is generated once and stored in ~/.flipper) to sign a client certificate for the mobile app. +* Desktop app uses its private key (this is generated once and stored in ~/.flipper) to sign a client certificate for the mobile app. * Along with the Certificate Signing Request, mobile app also lets the desktop app know which certificate exchange medium to use. * If the chosen Certificate Exchange Medium is FS_ACCESS, the desktop uses ADB (for Android), or the mounted file system (for iOS simulators) to write the following files to the mobile app's private data partition * Server certificate that the mobile app can now trust.