How to check integrity please

I have managed to check the file by following this thread, but I need confirmation about the method :

I have imported the key according to the above reference :

gpg --keyserver pgpkeys.mit.edu --recv-key 1904C5B42E4856DCD4E9CF96360AAF3259A3E6FF
gpg: clef 360AAF3259A3E6FF : clef publique « YunoHost <build@yunohost.org> » importée
gpg:       Quantité totale traitée : 1
gpg:                     importées : 1

Then I have added the repository key with the following command :

gpg -a --export 1904C5B42E4856DCD4E9CF96360AAF3259A3E6FF | sudo apt-key add -
Warning: apt-key is deprecated. Manage keyring files in trusted.gpg.d instead (see apt-key(8)).
OK

Now, if I check the integrity, I can read the following :

gpg --verify yunohost-buster-4.1.8-amd64-stable.iso.sig yunohost-buster-4.1.8-amd64-stable.iso
gpg: Signature faite le mar. 04 mai 2021 21:10:07 CEST
gpg:                avec la clef RSA 1904C5B42E4856DCD4E9CF96360AAF3259A3E6FF
gpg: Bonne signature de « YunoHost <build@yunohost.org> » [inconnu]
gpg: Attention : cette clef n'est pas certifiée avec une signature de confiance.
gpg:             Rien n'indique que la signature appartient à son propriétaire.
Empreinte de clef principale : 1904 C5B4 2E48 56DC D4E9  CF96 360A AF32 59A3 E6FF

Meaning that it works.

However, as you can see, it is said that apt-key is deprecated, therefore, do you know a better way to check integrity ?

Also, as said in the linked thread, a member suggest to do :

sudo aptitude install debian-keyring debian-archive-keyring

What do you think ?

I suggest to decide the best way to check integrity and add it to the Documentation because as Yunohost is a self hosted server, so some people may want to trust the .iso file first.

Thank you very much.