System administrators who want to copy \& paste recommendations quickly without
spending a lot of time on background reading on cryptography or cryptanalysis
can do so, by simply searching for the corresponding section in chapter
-\ref{chapter:PracticalSettings} (``Practical recommendations'').
+\ref{chapter:PracticalSettings} (``Practical recommendations'').
It is important to know that in this guide the authors arrived at two recommendations: \textit{Cipher string A} and \textit{Cipher string B}. While the former is a hardened recommendation the latter is a weaker one but provides wider compatibility.
-\textit{Cipher strings A and B} are described in \ref{section:recommendedciphers}.
+\textit{Cipher strings A and B} are described in \ref{section:recommendedciphers}.
%\textit{Cipher
%string B} covers the most common use-cases (such as running an e-commerce shop,
%a private homepage, a mail server, $ \ldots $).
However, for the quick copy \& paste approach it is important to know that this
-guide assumes users are happy with \textit{Cipher string B}.
+guide assumes users are happy with \textit{Cipher string B}.
While chapter \ref{chapter:PracticalSettings} is intended to serve as a copy \& paste reference, chapter \ref{chapter:Theory} (``Theory'') explains the reasoning behind \textit{cipher string B}. In particular, section \ref{section:CipherSuites} explains how to choose individual cipher strings. We advise the reader to actually read this section and challenge our reasoning in choosing \textit{Cipher string B} and to come up with a better or localized solution.