hi bmarkus,
you are right!
but i believe only the encryption and the ssh-server that i configured and audited myself ;-)
this "embedded stuff" is often very comfortable,
but a not fully audited and intensively tested remote connection is,
in my personally perception, a risk that i avoid at every reasonable point.
in my opinion these requirements are reached for remote functions and other channels
that go directly into the core of a system... but one is for sure, it's really more manual configuration...
and sometimes not very comfortable...
additionally we all know that security is not a state, it's a process... and the systems are moving,
but it's interesting to solve new tasks and changes.
thank you all for the nice teamwork!