Global informations involving more or less Limawi.
A MyCrypNet network is made of MyCrypNet accesses installed on different devices.
The MyCrypNet accesses identify the devices on the MyCrypNet network.
A devices can have several accesses. It can be used by several users with, each, his(her) own MyCrypNet access for him(her) alone. But also, a common access can be installed on the device, available for all the users of the device.
Accesses in a MyCrypNet network can be delegated.
How to install MyCrypNet
Here are the tutorials allowing to install a MyCrypNet access on the main operating systems:
If you want to adapt the accesses configuration to particular networks constraints (firewalls, routers…) You can edit the configurations with the help of the following tutorials:
If you want to delegate parts of your MyCrypNet network, here is the tutorial showing you how to do:
And here is the tutorial with the provided options to the delegated:
If you want to detach completely an access from the network, isolate it from its network to use it as a simple anonymous tunnel, here is the tutorial:
If one of your devices is compromised, lost or stolen, it is strongly recommended to revoke the access installed on it to avoid a potential intrusion on the network.
Here is the revocation tutorial:
If you want to reinforce, even more, the access security, you can add a two-factor authentication to it:
Also, if you want to reinforce the accesses management interface (available on Limawi) and your payment informations handled by Limawi as well, you can add a two-factor authentication too:
Security Vulnerability Reporting Policy
If you think you have found a security vulnerability on limawi or on any of our services, we invite you to contact us immediately. If you wish to contact us for anything else, please use the general contact page. Thanks.
We are committed to working with the community to verify, reproduce, and respond to legitimate reported vulnerabilities.
We encourage the community to participate in our responsible reporting process.
If you would like to report a security vulnerability, please contact us on the DPO contact page. Here is the DPO’s PGP/GPG key. You may use it to mail him directly your report. Please provide your name, contact information(s), and company name (if applicable) with each report. If you use the DPO’s PGP/GPG key, don’t forget to include your PGP/GPG public key with such reports, if you have one.
Responsible Disclosure Guidelines
We will investigate all legitimate reports and make every effort to quickly correct any vulnerability. To encourage responsible reporting, we commit that we will never take legal action against you or ask law enforcement to investigate you, if you completely comply with the following Responsible Disclosure Guidelines:
- Provide details of the vulnerability, including information needed to reproduce and validate the vulnerability and a Proof of Concept (POC);
- Make good faith efforts to avoid privacy violations, destruction of data and interruption or degradation of our services;
- Do not modify, delete or access data that does not belong to you;
- Give us a reasonable time to correct the issue before making any information public.
Create your secure network