Gibberfish, Inc./Gibberfish User Documentation
-
FINAL NOTES
FINAL NOTES
NOTA-NOTA AKHIR -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Kami harap anda seronok menggunakan Gibberfish. Kami telah bekerja keras membuat satu selamat dan mudah-menggunakan platform, kerana mempunyai ramai penyumbang bebas untuk pelbagai projek sumber terbuka yang kami telah diintegrasikan ke dalam perkhidmatan kami. Terima kasih khas tujukan kepada orang-orang di Nextcloud, tanpa siapa platform kami tidak mungkin. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
KLIEN DESKTOP DAN MUDAH ALIH -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish bekerjasama dengan Nextcloud dalam klien desktop dan mudah alih untuk membolehkan anda untuk secara automatik menyegerakkan fail ke dan dari pelayan. Ini telah dinyahdayakan oleh lalai sebagai langkah keselamatan. Jika anda ingin menggunakan pelanggan ini, bercakap kepada pentadbir anda mengenai perubahan peraturan akses fail. Jika anda memutuskan untuk menyegerakkan fail tempatan, hanya berbuat demikian jika anda telah menghidupkan cakera penuh penyulitan untuk peranti anda. Ini melindungi fail awda jika peranti anda hilang, dicuri atau digodam -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
Manakala judul komik tersebut di atas menjelaskan konsep, kaedah Diceware mengesyorkan panjangnya frasa laluan 5 atau lebih banyak perkataan untuk keselamatan yang optimum. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Menggunakan Tor adalah satu cara terbaik untuk melindungi privasi anda dalam talian. Ini adalah mengapa kami menggunakan Tor untuk menggunakan pelayan Gibberfish. Walaupun ia secara khusus merujuk kepada projek The bawang penghala, Tor telah datang untuk merangkumi pelbagai produk percuma dan boleh digunakan oleh orang Perkhidmatan untuk melindungi aktiviti-aktiviti dalam talian mereka. Kami mengesyorkan bahawa semua orang menggunakan pelayar Tor untuk membantu anonymize kehadiran mereka dalam talian. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Sila baca dengan teliti dokumentasi dan FAQ yang menyediakan Tor mengenai semak imbas pada rangkaian mereka. Mereka mempunyai saranan-saranan yang penting untuk mengekalkan privasi anda. Penting, menggunakan Tor browser tidak menjamin bahawa segala aktiviti anda dalam talian adalah tanpa nama. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
Keselamatan anda perlu memuncak Tor mempunyai alat percuma yang lain untuk membantu. Apabila anda menilai Model ancaman anda, anda mungkin ingin menyiasat jambatan pelayan dan ekor. Pelayan jambatan membenarkan orang ramai untuk mengakses Tor negara-negara yang menyekatnya. Ekor adalah sebuah sistem operasi Linux, lengkap dengan atur cara biasa digunakan, Semua pada kayu USB. Hal ini membolehkan komputer amat peribadi. -
Discover these and other Tor services at:
Discover these and other Tor services at:
Temui ini dan lain-lain Perkhidmatan Tor pada: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Passphrases yang baik adalah sangat penting untuk melindungi data anda. Kami (dan banyak pakar Keselamatan) menyarankan untuk mencipta kata laluan yang menggunakan kaedah Diceware. Inilah sahaja kaedah penjanaan frasa yang kita anggap selamat. Yang mudah untuk dilakukan, dan ia menyediakan passphrases yang sangat kuat yang boleh mengalahkan malah segala Tempahan akal. -
Image courtesy xkcd.com.
Image courtesy xkcd.com.
Imej ihsan xkcd.com. -
Hello,
Hello,
Hello, -
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Pelayan Gibberfish anda telah sedia untuk digunakan. Untuk berbuat demikian anda terlebih dahulu perlu memasang pelayar Tor (Orfox pada telefon bimbit) dan muat turun arahan menggunakan link ini, yang akan secara automatik sendiri merosakkan selepas lawatan pertama: -
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
Pemasangan perlu mengambil kira-kira 30 minit untuk selesai. Jika pemasangan tidak bermula dengan betul, Sila tutup browser anda dan cuba lagi dalam sesi yang baru. -
Some important reminders:
Some important reminders:
Beberapa peringatan penting: -
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
-Sebelum menggunakan pelayan anda, sila baca panduan mula cepat kami. Ia mengandungi cadangan-cadangan yang penting untuk mengekalkan privasi dan Keselamatan anda. -
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
-Kehilangan frasa laluan penyulitan anda. Tanpa itu semua data anda akan menjadi kekal hilang apabila sistem dibut semula. -
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
-Kehilangan frasa laluan penyulitan anda. Kita tidak boleh memulihkan, pernah, apa-apa sebab. -
- Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.
- Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.
-Apabila pemasangan telah selesai, pentadbir kawasan anda boleh mula mencipta akaun pengguna baru. Kami tidak mengesyorkan menghantar bukti kelayakan log masuk melalui e-mel tidak dienkripsi. Isyarat adalah pilihan yang baik. -
- Do not hesitate to reach out to use with questions at info@gibberfish.org, but remember that we will only comply with requests originating from you@youremail.com. We strongly suggest using PGP encryption when communicating with Gibberfish.
- Do not hesitate to reach out to use with questions at info@gibberfish.org, but remember that we will only comply with requests originating from you@youremail.com. We strongly suggest using PGP encryption when communicating with Gibberfish.
-Tidak teragak-agak untuk mendekati menggunakan dengan soalan-soalan pada info@gibberfish.org, tetapi ingatlah bahawa kita hanya akan mematuhi permintaan yang berasal dari you@youremail.com. Kami amat mengesyorkan menggunakan penyulitan PGP semasa berkomunikasi dengan Gibberfish.