I do pen testing and shit (Kali Linux etc)
do they mean there's a backdoor in SSH itself, or are they referring to backdoors that make use of SSH? like someone gets a reverse shell with netcat and then they set up an SSH account or some shit
not the same thing at all, this needs less ambiguous language, also I don't trust PDFs