In the wake of 2013’s eye opening NSA revelations, privacy breaches, and compromise of systems from multiple adversaries on a grand scale we would like to share with you the following best practise encryption guide for common services and devices.

“This guide arose out of the need for system administrators to have an updated, solid, well re- searched and thought-through guide for configuring SSL, PGP, SSH and other cryptographic tools in the post-Snowden age. Triggered by the NSA leaks in the summer of 2013, many system administrators and IT security officers saw the need to strengthen their encryption settings. This guide is specifically written for these system administrators.”


The PDF is available from