On 02/06/2014 8:52 AM, Michael Tremer wrote: > * Briefly(!) explain the algorithms there are and point out advantages > and disadvantages. Of course can never give advice to use exactly this > algorithm, but we can say which are considered unsafe to use. Michael, This isn't documentation-related, but is relevant tot he subject you brought up. Perhaps it would be worthwhile to change the user interface to add an element that requires a user to "Enable insecure encryption methods" before using protocols that are considered weak? That way a user could still use those methods if required for interoperability, but it would be clear that it is not recommended for security reasons. Tom