If you think those are the only choices, you are truely ignorant.
Take a look at NitroKey, Terzor Model T, and the other open source hardware implementations and then get behind cryptographically secure authentication like the entire security community has been for years.