Planning, accompaniment, and supervision of the construction of end sites in an untrusted network, and beyond to an operations area classified as highly trusted, while supplying solutions for encryption, dilution, and aggregation between the networks.