Gibberfish, Inc./Gibberfish User Documentation
-
40753e3d3f875b7bc6c9acf55a791f7e5d1200ac
40753e3d3f875b7bc6c9acf55a791f7e5d1200ac
Good Digital Hygiene is the consistent use of robust security practices. -
e587b2680fac89f66093877c53868f40fb4b16c3
e587b2680fac89f66093877c53868f40fb4b16c3
THREATS -
7b749a3e6ad6c89a9a72a0c924c54a8c3ffc6329
7b749a3e6ad6c89a9a72a0c924c54a8c3ffc6329
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask. -
bdfa259de6bdca5cc59ab8d5df506cd31a7e22fa
bdfa259de6bdca5cc59ab8d5df506cd31a7e22fa
EXISTING COMMUNICATIONS -
61bf882c9e71483b2ee6a8819ba17d972b1d694d
61bf882c9e71483b2ee6a8819ba17d972b1d694d
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it. -
f947d60b0ebc8661d1adab1e20c3f45cb1a3a9e4
f947d60b0ebc8661d1adab1e20c3f45cb1a3a9e4
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them. -
284da2e9c8943a9faa155f56f0faaa7791471528
284da2e9c8943a9faa155f56f0faaa7791471528
TOR -
80a0006a978748e5998dadfb42208467c468b35e
80a0006a978748e5998dadfb42208467c468b35e
VIDEO CALLS -
4cc13b6a33230df11e68f8be86e7fd428be7c12e
4cc13b6a33230df11e68f8be86e7fd428be7c12e
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid. -
26bc51b8c24e969082271b782f467f409b70cfb2
26bc51b8c24e969082271b782f467f409b70cfb2
CHAT -
90d7fb7d490d0991c4dbd5bed495d33b03cdf2c0
90d7fb7d490d0991c4dbd5bed495d33b03cdf2c0
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is<your username>
@<your gibberfish server>
. For example, -
546e2c9a8685e17aa5c5cf752632f067b0b1ac92
546e2c9a8685e17aa5c5cf752632f067b0b1ac92
FURTHER READING -
ac1621e2d65b1c57e2bea613689dd66e7fab0898
ac1621e2d65b1c57e2bea613689dd66e7fab0898
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder. -
637077a14aad08a4ae7720c591e9f9308552e5ff
637077a14aad08a4ae7720c591e9f9308552e5ff
FINAL NOTES -
f1c90d7021e80722eb402a38bd366770107f94b7
f1c90d7021e80722eb402a38bd366770107f94b7
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible. -
af025220e850b661747b7b8ecff468cecec35758
af025220e850b661747b7b8ecff468cecec35758
DESKTOP AND MOBILE CLIENTS -
7aafc26d303169ce4a6e3c99733a4c20c807a4c1
7aafc26d303169ce4a6e3c99733a4c20c807a4c1
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked -
24547c7092f4086f807946819bf43ba52f783a5c
24547c7092f4086f807946819bf43ba52f783a5c
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security. -
98e40363e2574317092ab0ea713647cce796d1f5
98e40363e2574317092ab0ea713647cce796d1f5
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence. -
c281b33bccf7469dd65bf25145e20fec3da60225
c281b33bccf7469dd65bf25145e20fec3da60225
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.