én nem ezt olvastam
Csak azért, mert nem is olvastad végig:
To obtain these signatures, an attacker need only briefly compromise any server you use the key to authenticate to
However, these signatures are not exposed to passive eavesdroppers of SSH connections