So overall this way it would be pretty much the same, since both methods involve going through the hosting provider to authorize operations from a new device. Using keys is probably easier over time, I ought to consider that.
Another solution may be to use something like a Yubikey and 2FA.
If you loose it, 2FA protect you the time you remove it everywhere. You can take it with you and it cant be copied by someone.
Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink.
Hide child comments as well
Confirm
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
So overall this way it would be pretty much the same, since both methods involve going through the hosting provider to authorize operations from a new device.
Using keys is probably easier over time, I ought to consider that.
Another solution may be to use something like a Yubikey and 2FA.
If you loose it, 2FA protect you the time you remove it everywhere.
You can take it with you and it cant be copied by someone.