|Classes of Scott Arciszewski||>||Cipher Sweet||>||docs/examples/04-key-generation.md||>||Download|
The sky's the limit, really.
That's all there is to it.
Don't do something crazy like try to use a human-memorizable password as
an encryption key without key-stretching (i.e.
This library tries to side-step common mistakes, but if you go out of your way to do something insecure, it cannot save you from the consequences of your choices.
When in doubt, consult a cryptographer.