# ============================================
# ENCRYPTION CONFIGURATION
# ============================================
# IMPORTANT: Add this to your .env file
# Generate a strong encryption key (minimum 32 characters)
# Example: Use a password generator or run this command:
# node -e "console.log(require('crypto').randomBytes(32).toString('hex'))"

ENCRYPTION_KEY=your-secure-encryption-key-here-min-32-chars-change-this-immediately

# ============================================
# INSTRUCTIONS
# ============================================
# 1. Generate a secure encryption key using one of these methods:
#    - Run: node -e "console.log(require('crypto').randomBytes(32).toString('hex'))"
#    - Use a password generator to create a 32+ character random string
#    - Use a passphrase (minimum 32 characters)
#
# 2. Copy the generated key
#
# 3. Open your backend/.env file
#
# 4. Add this line with your generated key:
#    ENCRYPTION_KEY=your_generated_key_here
#
# 5. IMPORTANT: Keep this key secure and backed up!
#    - If you lose this key, encrypted data cannot be recovered
#    - Store it in a secure password manager
#    - Never commit it to version control
#
# 6. For production, consider using a key management service:
#    - AWS KMS
#    - Azure Key Vault
#    - Google Cloud KMS
