Skip to content

Global structure

A MyCrypNet network is made of MyCrypNet accesses installed on different devices.

The MyCrypNet accesses identify the devices on the MyCrypNet network.

A devices can have several accesses. It can be used by several users with, each, his(her) own MyCrypNet access for him(her) alone. But also, a common access can be installed on the device, available for all the users of the device.

Accesses in a MyCrypNet network can be delegated.

How to install MyCrypNet

Here are the tutorials allowing to install a MyCrypNet access on the main operating systems:

This tutorial shows how to install MyCrypNet on Android™
This tutorial shows how to install MyCrypNet on IOS®
This tutorial shows how to install MyCrypNet on Linux®
This tutorial shows how to install MyCrypNet on Mac OS®
This tutorial shows how to install MyCrypNet on Windows®

Alternate configurations

If you want to adapt the accesses configuration to particular networks constraints (firewalls, routers…) You can edit the configurations with the help of the following tutorials:

How to use alternative configurations for MyCrypNet

How to create alternative configurations for MyCrypNet

Delegation

If you want to delegate parts of your MyCrypNet network, here is the tutorial showing you how to do:

How to delegate a MyCrypNet access

And here is the tutorial with the provided options to the delegated:

How to use the delegation for a MyCrypNet access ?

If you want to detach completely an access from the network, isolate it from its network to use it as a simple anonymous tunnel, here is the tutorial:

How to use a MyCrypNet access as a simple tunnel ?

Security

If one of your devices is compromised, lost or stolen, it is strongly recommended to revoke the access installed on it to avoid a potential intrusion on the network.

Here is the revocation tutorial:

What to do in case of theft or lost with MyCrypNet ?

If you want to reinforce, even more, the access security, you can add a two-factor authentication to it:

Two-factor authentication on MyCrypNet

Also, if you want to reinforce the accesses management interface (available on Limawi) and your payment informations handled by Limawi as well, you can add a two-factor authentication too:

Two-factor authentication on Limawi

Modified on

If you want the installation in a Linux environnent with command lines, take a look here.

You must have a MyCrypNet access first. You can buy one here or ask a delegation to someone who bought one.

Step 1: Download and install the software

From a package repository. For “Debian-like”:

sudo apt-get install openvpn resolvconf network-manager-openvpn-gnome

Step 2: Download the settings file

Download the MyCrypNet.conf file and put it into a dedicated folder. MyCrypNet.conf

Make sure to keep this folder in a safe place on your disk.

Step 3: Download the key and certificate

Download the two settings files (vpn.cert and vpn.key) from the “Your apps” page or the “Delegated apps” page and put them together into the same folder as the MyCrypNet.conf file.

Step 4: Open the configuration interface

Go to the Gnome menu and select “VPN Off”.

Click on “VPN Settings”.

Step 5: Load the configuration

Add a VPN configuration by clicking on the “+” on the “VPN” section.

Select “Import from file…” and look for the MyCrypNet.conf file.

Sometimes GNOME® bugs and force you to save the configuration (by clicking on the “save” button) in order to make it work.

Modified on

Sub categories

Responsible Disclosure Guidelines.
Modified on
Technical informations about the website and the service.
Modified on
Legal informations about the service, domains and cookies.
Modified on
How is MyCrypNet secure ? And other important questions.
Modified on
A MyCrypNet access can be used in a more complex network allowing the connection of several devices together.
Modified on
The Limawi password policy is checked using an entropy library.
Modified on
Follow us
© 2019 Coppint Market Place Ltd, All rights reserved.