I am not an expert. Please dont take it as an advise, just as random thoughts.
It depends on your threat model and the sensitivity of the data and systems your key has access to. It also depends what device you use.
I dont store my ssh keys on my phone, because I have no need to