The 2-Minute Rule for createssh
We can try this by using the cat command to read through the contents of the public SSH critical on our nearby Laptop or computer and piping that by way of an SSH connection towards the distant server.
By doing this, although one of them is compromised someway, another supply of randomness sh