In reverse, it is common for a computer to log in to a mobile phone, at which time SSH protocol is required for encrypted login. There are two users root&mobile for login, and root is usually used for login because of higher permissions
For the first time login
The root permission is higher than the mobile permission
Openssh is used
Intermediate attack
Place an intermediate attack
USB login