(If a rationale is needed, consider that most of our users are hopelessly confused about what ssh keys are, and follow guides they find on the net without any understanding of the technical merit of said guide. Someone could write one explaining to copy a key in, delete it, etc - and grab auth credentials).
(If a rationale is needed, consider that most of our users are hopelessly confused about what ssh keys are, and follow guides they find on the net without any understanding of the technical merit of said guide. Someone could write one explaining to copy a key in, delete it, etc - and grab auth credentials).