( bzt | 2024. 04. 16., k – 19:29 )

én nem ezt olvastam
Csak azért, mert nem is olvastad végig:
To obtain these signatures, an attacker need only briefly compromise any server you use the key to authenticate to
However, these signatures are not exposed to passive eavesdroppers of SSH connections