DEV Community

[Comment from a deleted post]
Collapse
 
nicoroy2561 profile image
nicoroy2561

So overall this way it would be pretty much the same, since both methods involve going through the hosting provider to authorize operations from a new device.
Using keys is probably easier over time, I ought to consider that.

 
zedentox profile image
Florian Lefèvre

Another solution may be to use something like a Yubikey and 2FA.

If you loose it, 2FA protect you the time you remove it everywhere.
You can take it with you and it cant be copied by someone.