- Knowledge Base
- Technology Services
- Security
The purpose of this document is to list recommended practices concerning security of data in transit. In particular this document will cover why certain Protocols/Key Exchanges/Authentication schemes/etc are bad practice as well as a recommendation of use. Once a cipher/protocol/etc has fallen into disuse it will typically not be revived. Please Leave references to RFC's or Official sources when stating something as insecure.