Skip to content

Global structure

A MyCrypNet network is made of MyCrypNet accesses installed on different devices.

The MyCrypNet accesses identify the devices on the MyCrypNet network.

A devices can have several accesses. It can be used by several users with, each, his(her) own MyCrypNet access for him(her) alone. But also, a common access can be installed on the device, available for all the users of the device.

Accesses in a MyCrypNet network can be delegated.

How to install MyCrypNet

Here are the tutorials allowing to install a MyCrypNet access on the main operating systems:

This tutorial shows how to install MyCrypNet on Android™
This tutorial shows how to install MyCrypNet on IOS®
This tutorial shows how to install MyCrypNet on Linux®
This tutorial shows how to install MyCrypNet on Mac OS®
This tutorial shows how to install MyCrypNet on Windows®

Alternate configurations

If you want to adapt the accesses configuration to particular networks constraints (firewalls, routers…) You can edit the configurations with the help of the following tutorials:

How to use alternative configurations for MyCrypNet

How to create alternative configurations for MyCrypNet


If you want to delegate parts of your MyCrypNet network, here is the tutorial showing you how to do:

How to delegate a MyCrypNet access

And here is the tutorial with the provided options to the delegated:

How to use the delegation for a MyCrypNet access ?

If you want to detach completely an access from the network, isolate it from its network to use it as a simple anonymous tunnel, here is the tutorial:

How to use a MyCrypNet access as a simple tunnel ?


If one of your devices is compromised, lost or stolen, it is strongly recommended to revoke the access installed on it to avoid a potential intrusion on the network.

Here is the revocation tutorial:

What to do in case of theft or lost with MyCrypNet ?

If you want to reinforce, even more, the access security, you can add a two-factor authentication to it:

Two-factor authentication on MyCrypNet

Also, if you want to reinforce the accesses management interface (available on Limawi) and your payment informations handled by Limawi as well, you can add a two-factor authentication too:

Two-factor authentication on Limawi

Modified on

Security Vulnerability Reporting Policy

If you think you have found a security vulnerability on limawi or on any of our services, we invite you to contact us immediately. If you wish to contact us for anything else, please use the general contact page. Thanks.

We are committed to working with the community to verify, reproduce, and respond to legitimate reported vulnerabilities.

We encourage the community to participate in our responsible reporting process.

If you would like to report a security vulnerability, please contact us on the DPO contact page. Here is the DPO’s PGP/GPG key. You may use it to mail him directly your report. Please provide your name, contact information(s), and company name (if applicable) with each report. If you use the DPO’s PGP/GPG key, don’t forget to include your PGP/GPG public key with such reports, if you have one.

Responsible Disclosure Guidelines

We will investigate all legitimate reports and make every effort to quickly correct any vulnerability. To encourage responsible reporting, we commit that we will never take legal action against you or ask law enforcement to investigate you, if you completely comply with the following Responsible Disclosure Guidelines:

  • Provide details of the vulnerability, including information needed to reproduce and validate the vulnerability and a Proof of Concept (POC);
  • Make good faith efforts to avoid privacy violations, destruction of data and interruption or degradation of our services;
  • Do not modify, delete or access data that does not belong to you;
  • Give us a reasonable time to correct the issue before making any information public.
Modified on
Technical informations about the website and the service.
Modified on
Legal informations about the service, domains and cookies.
Modified on
How is MyCrypNet secure ? And other important questions.
Modified on
A MyCrypNet access can be used in a more complex network allowing the connection of several devices together.
Modified on
The Limawi password policy is checked using an entropy library.
Modified on
Technical informations about the websites.
Modified on
Follow us
© 2019 Coppint Market Place Ltd, All rights reserved.