# ============================================ # ENCRYPTION CONFIGURATION # ============================================ # IMPORTANT: Add this to your .env file # Generate a strong encryption key (minimum 32 characters) # Example: Use a password generator or run this command: # node -e "console.log(require('crypto').randomBytes(32).toString('hex'))" ENCRYPTION_KEY=your-secure-encryption-key-here-min-32-chars-change-this-immediately # ============================================ # INSTRUCTIONS # ============================================ # 1. Generate a secure encryption key using one of these methods: # - Run: node -e "console.log(require('crypto').randomBytes(32).toString('hex'))" # - Use a password generator to create a 32+ character random string # - Use a passphrase (minimum 32 characters) # # 2. Copy the generated key # # 3. Open your backend/.env file # # 4. Add this line with your generated key: # ENCRYPTION_KEY=your_generated_key_here # # 5. IMPORTANT: Keep this key secure and backed up! # - If you lose this key, encrypted data cannot be recovered # - Store it in a secure password manager # - Never commit it to version control # # 6. For production, consider using a key management service: # - AWS KMS # - Azure Key Vault # - Google Cloud KMS