@node UsecaseSpy
+@cindex reconnaissance, spying, intelligence, covert operations
@section Reconnaissance, spying, intelligence, covert agents
Those guys know how Internet is a dangerous place incompatible with
with it (don't you?), you do not "toss" those packets immediately on the
same device. Tossing (reading those encrypted packets and extracting
transferred files and mail messages) could and should be done on a
-separate computer (@ref{nncp-cfgmin} command could help creating
+separate computer (@command{@ref{nncp-cfgmin}} command could help creating
configuration file without private keys for that purpose).
-If you really want to carry your private keys, then @ref{nncp-cfgenc}
+If you really want to carry your private keys, then @command{@ref{nncp-cfgenc}}
command will be able to encrypt your configuration file. Passphrase you
enter is strengthened with both CPU and memory hard function.