( bzt | 2024. 04. 16., k – 19:29 )

én nem ezt olvastam

Csak azért, mert nem is olvastad végig:

To obtain these signatures, an attacker need only briefly compromise any server you use the key to authenticate to

However, these signatures are not exposed to passive eavesdroppers of SSH connections