If i ssh to some remote computer
ssh@hisip
fingerprint is sha256:xxxxx`
then continue (y/n) yes
can the remote computer later control my source computer?
Also is there any risk if i connect to a untrusted ssh from a middlemen trusted ssh connection through my source computer ?