Outdated
The project was a wonderful project to document better choices for typical crypto related settings and config options in multiple
operating systems, services, proxies and ... generally speaking in software post Snowden-2013.
However, time continued to pass and by now a lot of systems have strong and hardened crypto settings by default.
Problems shifted from finding the right crypto settings to key management and -rollover, post quantum crypto etc. or hiding metadata from traffic flows (see Encrypted Client Hello for example).
As a consequence we archived this project for now.
If the project continues, it will be time to make a completely new guide since so much changed in the mean time.
If you are interested in participating in writing a new guide which addresses current crypto issues, feel free to reach out to me.