diff --git a/src/jamidht/account_manager.cpp b/src/jamidht/account_manager.cpp
index 333d86e958d313d4371cce3bbca3563c3a13e481..8796c1f3c4ab3a0fdaf202516e764b11669bed8f 100644
--- a/src/jamidht/account_manager.cpp
+++ b/src/jamidht/account_manager.cpp
@@ -315,7 +315,7 @@ AccountManager::foundPeerDevice(const std::shared_ptr<dht::crypto::Certificate>&
 
     // Device certificate can't be self-signed
     if (top_issuer == crt) {
-        JAMI_WARN("Found invalid peer device: %s", crt->getId().toString().c_str());
+        JAMI_WARN("Found invalid peer device: %s", crt->getLongId().toString().c_str());
         return false;
     }
 
@@ -324,19 +324,19 @@ AccountManager::foundPeerDevice(const std::shared_ptr<dht::crypto::Certificate>&
     dht::crypto::TrustList peer_trust;
     peer_trust.add(*top_issuer);
     if (not peer_trust.verify(*crt)) {
-        JAMI_WARN("Found invalid peer device: %s", crt->getId().toString().c_str());
+        JAMI_WARN("Found invalid peer device: %s", crt->getLongId().toString().c_str());
         return false;
     }
 
     // Check cached OCSP response
     if (crt->ocspResponse and crt->ocspResponse->getCertificateStatus() != GNUTLS_OCSP_CERT_GOOD) {
-        JAMI_ERR("Certificate %s is disabled by cached OCSP response", crt->getId().to_c_str());
+        JAMI_ERR("Certificate %s is disabled by cached OCSP response", crt->getLongId().to_c_str());
         return false;
     }
 
     account_id = crt->issuer->getId();
     JAMI_WARN("Found peer device: %s account:%s CA:%s",
-              crt->getId().toString().c_str(),
+              crt->getLongId().toString().c_str(),
               account_id.toString().c_str(),
               top_issuer->getId().toString().c_str());
     return true;