Gibberfish, Inc./Gibberfish User Documentation
-
FURTHER READING
FURTHER READING
WEITER LESEN -
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
Umfangreichere Dokumentation der Kernfeatures entnehmen Sie bitte der Nextcloud User Manual, befindet sich ebenfalls in Ihrem Benutzerordner Gibberfish. -
FINAL NOTES
FINAL NOTES
ABSCHLIEßENDE BEMERKUNGEN -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Wir wünschen Ihnen viel Freude mit Gibberfish. Wir arbeiteten hart machen es zu einem sicheren und einfachen-Plattform verwenden, wie die vielen unabhängigen Beiträgen zu den verschiedenen open-Source-Projekten, die wir in unseren Service integriert haben. Besonderer Dank geht an die Leute von Nextcloud, ohne die unsere Plattform nicht möglich wäre. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
DESKTOP- UND MOBILEN CLIENTS -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish arbeitet mit der Nextcloud desktop und mobile Clients ermöglichen es Ihnen, automatisch synchronisieren Sie Dateien zum und vom Server. Dies ist aus Sicherheitsgründen standardmäßig deaktiviert. Wenn Sie diese Clients verwenden möchten, sprechen Sie mit Ihren Administrator über das Ändern der Datei Zugriffsregeln. Möchten Sie Dateien lokal zu synchronisieren, nur tun, wenn Sie vollständige Festplattenverschlüsselung für Ihr Gerät eingeschaltet haben. Dies schützt Ihre Dateien, wenn Ihr Gerät verloren, gestohlen oder gehackt -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
Während der oben genannten Comic das Konzept erklärt, empfiehlt die Diceware-Methode eine Passphrase Länge von 5 oder mehr Wörtern für optimale Sicherheit. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Benutzung von Tor ist der beste Weg, Ihre Online-Privatsphäre zu schützen. Deshalb verwenden wir Tor Ihre Gibberfish-Server bereitstellen. Während es speziell auf The Onion Router Projekt bezieht, Tor gekommen ist, umfassen eine Vielzahl von kostenlosen Produkten und Dienstleistungen können anhand ihrer Online-Aktivitäten zu schützen. Es wird empfohlen, dass jeder den Tor-Browser verwenden, um ihre Online-Präsenz zu anonymisieren. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Bitte lesen Sie die Dokumentation und FAQ, das Tor bietet über ihr Netzwerk Browsen. Sie haben wichtige Empfehlungen für die Wahrung Ihrer Privatsphäre. Wichtig ist, garantieren mit dem Tor Browser nicht, dass Ihre Online-Aktivitäten anonym sind. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
Wie Ihre Sicherheitsanforderungen eskalieren hat Tor weitere kostenlose Tools zu helfen. Wenn Sie Ihr Bedrohungsmodell auswerten, können Sie Bridge Servern und Tails zu untersuchen. Brücke-Server erlauben Leuten, Tor in Ländern zugreifen, die es zu blockieren. Tails ist ein Linux-Betriebssystem, komplett mit häufig verwendeten Programme auf einem USB-Stick. Es ermöglicht extrem private Datenverarbeitung. -
Discover these and other Tor services at:
Discover these and other Tor services at:
Entdecken Sie diese und andere Tor-Services an: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Gute Passwörter sind extrem wichtig für die Sicherung Ihrer Daten. Wir (und viele Sicherheitsexperten) empfehlen Kennwörter mithilfe der Diceware-Methode erstellen. Dies ist die einzige Methode der Passphrase-Generation, die wir sicher halten. Seine einfach zu tun, und es bietet Ultra-starke Passwörter, die selbst das Reich an Hilfsquellen Gegner besiegen kann. -
Image courtesy xkcd.com.
Image courtesy xkcd.com.
Bild mit freundlicher Genehmigung xkcd.com. -
Hello,
Hello,
Hallo -
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Ihr Gibberfish-Server ist jetzt bereitgestellt werden. Dazu müssen Sie zuerst Tor Browser (Orfox auf dem Handy) zu installieren und die Anweisungen über diesen Link herunterladen, wird die automatisch nach dem ersten Besuch Selbstzerstörung: -
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
Die Installation dauert ca. 30 Minuten in Anspruch. Wenn die Installation nicht ordnungsgemäß gestartet werden kann, Bitte schließen Sie Ihren Browser und versuchen Sie es in eine neue Sitzung. -
Some important reminders:
Some important reminders:
Einige wichtige Hinweise: -
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
-Vor der Bereitstellung Ihres Servers, lesen Sie bitte unsere Schnellstart-Anleitung. Es enthält wichtige Anregungen zur Wahrung Ihrer Privatsphäre und Sicherheit. -
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
-Verlieren Sie nicht Ihre verschlüsselungspassphrase. Ohne es werden alle Daten unwiderruflich verloren, wenn das System neu gestartet wird. -
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
-Verlieren Sie nicht Ihre verschlüsselungspassphrase. Wir können sie, je, aus irgendeinem Grund nicht wiederherstellen.