\section{Methods}
\label{section:Methods}
-For writing this guide, we chose to collect the most well researched facts about
-cryptography settings and let as many trusted specialists as possible review those settings.
-The review process is completely open and done on a public mailing list. The
-document is available (read-only) to the public Internet on a git server, GitHub (mirror)
-and open for public scrutiny. However, write permissions to the document are only
-granted to vetted people. The list of editors can be found in section \ref{section:Reviewers}.
-Every write operation to the document is logged via the ``git'' version control system
-and can thus be traced to a specific author. We do not trust an unknown git server.
+\epigraph{``C.O.S.H.E.R - completely open source, headers, engineering and research}{A. Kaplan's mail signature for many years}
-Public peer-review and ``multiple eyes'' checking of our publication is the best
-strategy we can imagine at the present moment
+For writing this guide, we chose to collect the most well researched facts
+about cryptography settings and let as many trusted specialists as possible
+review those settings. The review process is completely open and done on a
+public mailing list. The document is available (read-only) to the public
+Internet on a git server, GitHub (mirror) and open for public scrutiny.
+However, write permissions to the document are only granted to vetted people.
+The list of reviewers can be found in section \ref{section:Reviewers}. Every
+write operation to the document is logged via the ``git'' version control
+system and can thus be traced to a specific author. We accept ``git pull
+requests'' on the github
+mirror\footnote{\url{https://github.com/BetterCrypto/Applied-Crypto-Hardening}}
+for this paper.
+
+Public peer-review and ``multiple eyes'' checking of our publication is the
+best strategy we can imagine at the present moment
\footnote{\url{http://www.wired.com/opinion/2013/10/how-to-design-and-defend-against-the-perfect-backdoor/}}.