Gibberfish, Inc./Gibberfish User Documentation
-
VIDEO CALLS
VIDEO CALLS
CHIAMATE VIDEO -
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid.
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid.
L'app di "Parlare" di Nextcloud consente di creare e partecipare a videochiamate nel browser web. Per migliori prestazioni su dispositivi mobili, si consiglia di installare e utilizzare l'app mobile "Nextcloud Talk", che è disponibile da iTunes, Google Play e F-Droid. -
CHAT
CHAT
CHAT -
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is <your username>@<your gibberfish server>. For example,
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is
<your username>
@<your gibberfish server>
. For example,Il sistema di chat utilizza il protocollo XMPP standard, che vi permetterà di chattare non solo con altri utenti di Gibberfish, ma anche con chiunque altro nel mondo utilizzando un server XMPP. Il tuo indirizzo XMPP è< username >
@< server gibberfish >
. Per esempio -
FURTHER READING
FURTHER READING
ULTERIORE LETTURA -
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
Per la più ampia documentazione delle funzionalità principali, fare riferimento al manuale dell'utente di Nextcloud, che si trova anche nella cartella home di Gibberfish. -
FINAL NOTES
FINAL NOTES
NOTE FINALI -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Ci auguriamo che usando Gibberfish. Abbiamo lavorato duro rendere esso un sicuro e facile-per utilizzare la piattaforma, come hanno molti collaboratori indipendenti i vari progetti open source che abbiamo integrato nel nostro servizio. Un ringraziamento speciale va alla gente a Nextcloud, senza la quale la nostra piattaforma non sarebbe possibile. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
CLIENT DESKTOP E MOBILE -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish funziona con il Nextcloud i client desktop e dispositivi mobili per consentire di sincronizzare automaticamente i file da e verso il server. Questa è disattivata per impostazione predefinita come misura di sicurezza. Se si desidera utilizzare questi client, rivolgersi all'amministratore di cambiare le regole di accesso di file. Se si decide di sincronizzare i file localmente, farlo solo se è stata attivata la crittografia completa del disco per il dispositivo. Questo protegge i file, se il dispositivo viene perso, rubato o hacked -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
Mentre il fumetto sopra spiega il concetto, il metodo Diceware raccomanda una lunghezza della passphrase di 5 o più parole per una sicurezza ottimale. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Usando Tor è il modo migliore per proteggere la tua privacy online. Ecco perché usiamo Tor per distribuire il server di Gibberfish. Mentre si riferisce specificamente al progetto The Onion Router, Tor è venuto a comprendere una varietà di prodotti gratuiti e servizi persone possono utilizzare per salvaguardare la loro attività online. È consigliabile che tutti utilizzare il browser Tor per aiutare anonimizzare la propria presenza online. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Leggere attentamente la documentazione e le FAQ che Tor fornisce informazioni sull'esplorazione sulla loro rete. Hanno importanti consigli per mantenere la tua privacy. D'importanza, utilizzando il browser Tor non garantisce che tutte le attività online sono anonime. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
Come la sicurezza deve inoltrare la richiesta Tor ha altri strumenti gratuiti per aiutare. Quando si valuta il tuo modello di minaccia, è possibile indagare Bridge Server e code. Server di ponte permettono alle persone di accedere a Tor in paesi che bloccarlo. Tails è un sistema operativo Linux, completo di programmi comunemente utilizzati, tutto su una chiavetta USB. Permette di calcolo estremamente privati. -
Discover these and other Tor services at:
Discover these and other Tor services at:
Scoprire questi ed altri servizi di Tor: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Buone passphrase sono estremamente importanti per la salvaguardia dei dati. Noi (e molti esperti di sicurezza) consigliamo di creare le password utilizzando il metodo Diceware. Questo è l'unico metodo di generazione di passphrase che consideriamo sicuri. È facile da fare e fornisce ultra-forte passphrase che possono sconfiggere anche gli avversari più intraprendenti. -
Image courtesy xkcd.com.
Image courtesy xkcd.com.
Immagine cortesia xkcd.com. -
Hello,
Hello,
Ciao, -
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Il server di Gibberfish è pronto per essere distribuito. Per farlo devi prima installare il Tor Browser (Orfox sul cellulare) e scaricare le istruzioni utilizzando questo link, che verrà automaticamente autodistruzione dopo la prima visita: -
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
L'installazione dovrebbe richiedere circa 30 minuti per completare. Se l'installazione non viene avviato correttamente, si prega di chiudere il browser e provare di nuovo in una nuova sessione.