|
|
|
@ -1,9 +1,9 @@ |
|
|
|
|
# Creating a New Network |
|
|
|
|
|
|
|
|
|
This guide is for those who wish to start a new cryptic-net network of their |
|
|
|
|
This guide is for those who wish to start a new cryptic network of their |
|
|
|
|
own. |
|
|
|
|
|
|
|
|
|
By starting a new cryptic-net network, you are becoming the administrator of a |
|
|
|
|
By starting a new cryptic network, you are becoming the administrator of a |
|
|
|
|
network. Be aware that being a network administrator is not necessarily easy, |
|
|
|
|
and the users of your network will frequently need your help in order to have a |
|
|
|
|
good experience. It can be helpful to have others with which you are |
|
|
|
@ -83,8 +83,8 @@ be chosen with care. |
|
|
|
|
## Step 3: Prepare to Encrypt `admin.yml` |
|
|
|
|
|
|
|
|
|
The `admin.yml` file (which will be created in the next step) is the most |
|
|
|
|
sensitive part of a cryptic-net network. If it falls into the wrong hands it can |
|
|
|
|
be used to completely compromise your network, impersonate hosts on the network, |
|
|
|
|
sensitive part of a cryptic network. If it falls into the wrong hands it can be |
|
|
|
|
used to completely compromise your network, impersonate hosts on the network, |
|
|
|
|
and will likely lead to someone stealing or deleting all of your data. |
|
|
|
|
|
|
|
|
|
Therefore it is important that the file remains encrypted when it is not being |
|
|
|
|