Gibberfish, Inc./Gibberfish User Documentation
- 
ac1621e2d65b1c57e2bea613689dd66e7fab0898ac1621e2d65b1c57e2bea613689dd66e7fab0898 For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
- 
UWAGI KOŃCOWEUWAGI KOŃCOWE FINAL NOTES
- 
f1c90d7021e80722eb402a38bd366770107f94b7f1c90d7021e80722eb402a38bd366770107f94b7 We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
- 
af025220e850b661747b7b8ecff468cecec35758af025220e850b661747b7b8ecff468cecec35758 DESKTOP AND MOBILE CLIENTS
- 
7aafc26d303169ce4a6e3c99733a4c20c807a4c17aafc26d303169ce4a6e3c99733a4c20c807a4c1 Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
- 
24547c7092f4086f807946819bf43ba52f783a5c24547c7092f4086f807946819bf43ba52f783a5c While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
- 
98e40363e2574317092ab0ea713647cce796d1f598e40363e2574317092ab0ea713647cce796d1f5 Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
- 
c281b33bccf7469dd65bf25145e20fec3da60225c281b33bccf7469dd65bf25145e20fec3da60225 Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
- 
27f88a8c3cc8924500f0dc56843d684e246b349b27f88a8c3cc8924500f0dc56843d684e246b349b As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
- 
af8bf78e711f96a90e4fa3ee1934ba941295388faf8bf78e711f96a90e4fa3ee1934ba941295388f Discover these and other Tor services at:
- 
39c90d8ca6a569fee1025a5d7414d51a9b49017339c90d8ca6a569fee1025a5d7414d51a9b490173 Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
- 
615b6b4014a902816473e0820dc924a1f9e40b92615b6b4014a902816473e0820dc924a1f9e40b92 Image courtesy xkcd.com.
- 
f52ab57fa51dfa714505294444463ae5a009ae34f52ab57fa51dfa714505294444463ae5a009ae34 Hello,
- 
7b2c553376b37735b342cbcd8de10451fc324ae17b2c553376b37735b342cbcd8de10451fc324ae1 Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
- 
e0d39df5ff64f4c2f1da104899674b052b4953dce0d39df5ff64f4c2f1da104899674b052b4953dc The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
- 
5304ba624f07b18fee46545980f9a1a8ea22208b5304ba624f07b18fee46545980f9a1a8ea22208b Some important reminders:
- 
3c97d569e9acb18681d9a942331f2312f3018fda3c97d569e9acb18681d9a942331f2312f3018fda - Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- 
b437e8e04110f56a8b9c47f307752f1ffe534f74b437e8e04110f56a8b9c47f307752f1ffe534f74 - Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
- 
83cd4abd5ed571a328114106a39627a8d97d243683cd4abd5ed571a328114106a39627a8d97d2436 - Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
- 
da4c5c9fa26b28a9d4e878ff4ca2b806cb529d97da4c5c9fa26b28a9d4e878ff4ca2b806cb529d97 - Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.