What’s worse than leaving private keys lying unattended? Having public keys that can be brute-forced. The “secure” in secure shell comes from the combination of hashing, symmetric encryption, and asymmetric encryption.
https://gravitational.com/blog/comparing-ssh-keys/
https://gravitational.com/blog/comparing-ssh-keys/