Gibberfish, Inc./Gibberfish User Documentation
-
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
Para documentación más extensa de las características de base, consulte el Manual del usuario Nextcloud, que también se encuentra en su carpeta de inicio de Gibberfish. -
FINAL NOTES
FINAL NOTES
NOTAS FINALES -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Esperamos que disfrute usando Gibberfish. Hemos trabajado duro hacer lo fácil y seguro-uso de plataforma, como los muchos contribuidores independientes para los distintos proyectos de código abierto que hemos integrado en nuestro servicio. Un agradecimiento especial para la gente de Nextcloud, sin que nuestra plataforma no sería posible. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
CLIENTES MÓVILES Y DE ESCRITORIO -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish trabaja con el Nextcloud le permite automáticamente sincronizar archivos desde el servidor y clientes móviles y de escritorio. Esto está deshabilitado por defecto como medida de seguridad. Si desea utilizar a estos clientes, hable con su administrador de cambiar las reglas de acceso de archivo. Si decides sincronizar archivos localmente, sólo hacerlo si activado el cifrado de disco completo para su dispositivo. Esto protege tus archivos si tu dispositivo es perdido, robado o hackeado -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
Mientras que el cómic anterior explica el concepto, el método Diceware recomienda una longitud de frase de paso de 5 o más palabras para una seguridad óptima. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Usar Tor es la mejor manera para proteger su privacidad en línea. Por eso es lo que lo usamos para implementar tu servidor de Gibberfish. Mientras que específicamente se refiere al proyecto de The Onion Router, Tor ha llegado a abarcar una gran variedad de productos y servicios que todos pueden usar para proteger sus actividades en línea. Recomendamos que cada uno use el navegador Tor para anonimizar su presencia online. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Por favor lea cuidadosamente la documentación y FAQ que Tor proporciona sobre navegación en la red. Tienen importantes recomendaciones para mantener su privacidad. Importante, usando el navegador Tor no garantiza que todas sus actividades en línea son anónimos. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
Ya que su seguridad necesita escalar Tor tiene otras herramientas gratuitas para ayudar a. Cuando se evalúa el modelo de amenaza, puede investigar servidores puente y colas. Servidores de puente permiten a la gente a Tor en países que bloquearlo. Colas es un sistema operativo Linux, con programas utilizados, todo en una memoria USB. Permite el trabajo informático muy privado. -
Discover these and other Tor services at:
Discover these and other Tor services at:
Descubra estos y otros servicios de Tor: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Buenas contraseñas son muy importantes para salvaguardar sus datos. Nosotros (y muchos expertos en seguridad) recomiendan crear contraseñas mediante el método Diceware. Este es el único método de generación de contraseña que se considera seguros. Su fácil de hacer y proporciona claves muy fuerte que pueden derrotar incluso a los adversarios más ingeniosos. -
Image courtesy xkcd.com.
Image courtesy xkcd.com.
Imagen cortesía xkcd.com. -
Hello,
Hello,
Hola, -
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Tu servidor Gibberfish está listo para ser desplegado. Para ello primero debes instalar el Tor Browser (Orfox en móvil) y descargar las instrucciones usando este enlace, que será automáticamente eliminado después de la primera visita: -
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
La instalación debe tomar aproximadamente 30 minutos. Si la instalación no se inicia correctamente, cierre su navegador e intente otra vez en una nueva sesión. -
Some important reminders:
Some important reminders:
Algunos recordatorios importantes: -
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
-Antes de implementar el servidor, por favor lea a nuestra guía de inicio rápido. Contiene sugerencias importantes para mantener tu privacidad y seguridad. -
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
-No pierda su contraseña de cifrado. Sin ella todos sus datos serán permanentemente perdidos cuando se reinicie el sistema. -
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
-No pierda su contraseña de cifrado. Nosotros no podemos recuperarla, nunca, por ninguna razón. -
- Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.
- Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.
- Una vez completada la instalación, el Administrador designado puede empezar a crear cuentas para usuarios nuevos. No se recomienda el envío de las credenciales de inicio de sesión por correo electrónico sin cifrar. Signal es una buena opción.