diff --git a/communicationScripts/client.py b/communicationScripts/client.py
index 7c4a4de2d13f230e90614b969f3689059fc59c5a..abf637944bd3a0fba1d492165abae20f9a35705c 100644
--- a/communicationScripts/client.py
+++ b/communicationScripts/client.py
@@ -3,15 +3,11 @@ import socket
 import wolfssl
 
 def run_client(file_path):
-    # CA-Zertifikat laden
-    ca_cert = "../certificates/ca-cert.pem"
-
     # Festlegen der Cipher Suite und TLS-Version
     cipher_suite = "TLS_AES_128_GCM_SHA256"  # Sichere Cipher Suite
     context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3)  # TLS 1.3 verwenden
-    context.load_verify_locations(ca_cert)
     context.set_ciphers(cipher_suite)
-
+    
     print(f"TLS-Kontext mit Cipher Suite '{cipher_suite}' erfolgreich initialisiert.")
 
     # Sichere Verbindung mit dem Server herstellen
diff --git a/communicationScripts/server.py b/communicationScripts/server.py
index 7959d9b7d8375db97df2d319ded35bc6a20cf720..8a0380d19893c153d07315ee12d8968646397389 100644
--- a/communicationScripts/server.py
+++ b/communicationScripts/server.py
@@ -1,18 +1,15 @@
 import socket
 import wolfssl
 
-# SERVER-SKRIPT
 def run_server():
     # Server-Zertifikat und Schlüssel
     cert_file = "../certificates/server-cert.pem"
     key_file = "../certificates/server-key.pem"
-    ca_cert = "../certificates/ca-cert.pem"  # CA Zertifikat, um Client zu verifizieren
 
     # Festlegen der Cipher Suite und TLS-Version
     cipher_suite = "TLS_AES_128_GCM_SHA256"  # Sichere Cipher Suite
     context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3)  # TLS 1.3 verwenden
     context.load_cert_chain(certfile=cert_file, keyfile=key_file)
-    context.load_verify_locations(ca_cert)  # Zertifikate des CA hinzufügen
     context.set_ciphers(cipher_suite)
 
     # Server-Socket erstellen