@byteborg Because if you’ve installed a malicious native app, it getting your ssh keys is not your only worry. But sure, yes, if you are happy doing what you describe, do that. I don’t know your threat model and I don’t know how you otherwise secure your operating system and environment. I find this acceptable for my threat model and my other security practices and by keeping it simple, if it discourages folks creating one ssh key (via “magic!”) and copying it everywhere, I’ll take that win.