Gibberfish, Inc./Gibberfish User Documentation
-
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
-
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
-
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
-
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
-
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
-
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
-
Discover these and other Tor services at:
Discover these and other Tor services at:
-
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
-
Image courtesy xkcd.com.
Image courtesy xkcd.com.
-
Hello,
Hello,
-
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Ο σέρβερ σας είναι έτοιμος για χρήση. Προτού ξεκινήσετε, θα πρέπει να εγκαταστήσετε το πρόγραμμα περιήγησης Tor Browser (Orfox για κινητά τηλέφωνα) και να κατεβάσετε τις οδηγίες χρησιμοποιώντας τον παρακάτω σύνδεσμο, ο οποίος θα αυτοκαταστραφεί μετά την πρώτη σας επίσκεψη: -
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
Η εγκατάσταση θα διαρκέσει περίπου 30 λεπτά. Εάν δεν ξεκινήσει αυτόματα, παρακαλώ κλείστε τον περιηγητή σας και προσπαθήστε ξανά σε νέο παράθυρο. -
Some important reminders:
Some important reminders:
Μερικές σημαντικές υπενθυμίσεις: -
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- Προτού χρησιμοποιήσετε τον σέρβερ, παρακαλώ διαβάστε τον Οδηγό Γρήγορης Εκκίνησης. Εκεί θα βρείτε σημαντικές συμβουλές για την διαφύλαξη τόσο της ιδιωτικότητάς, όσο και της ασφάλειάς σας. -
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
Μην χάσετε την κρυπτογραφημένη φράση πρόσβασης. Σε αυτήν την περίπτωση, όλα σας τα δεδομένα θα χαθούν όταν το σύστημα επανεκκινήσει. -
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.
- Μην χάσετε την κρυπτογραφημένη φράση πρόσβασης. Δεν είναι δυνατόν να ανακτηθεί ποτέ, για οποιονδήποτε λόγο. -
- Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.
- Once the installation is complete, your designated Administrator can begin creating accounts for new users. We do not recommend sending login credentials via unencrypted email. Signal is a good choice.
- Μόλις ολοκληρωθεί η εγκατάσταση, ο διαχειριστής σας μπορεί να ξεκινήσει να δημιουργεί λογαριασμούς για νέους χρήστες. Δεν συνιστούμε την αποστολή των στοιχείων εισόδου δίχως την χρήση κρυπτογραφημένου email. Η πλατφόρμα Signal είναι μία καλή επιλογή για αυτό. -
- Do not hesitate to reach out to use with questions at info@gibberfish.org, but remember that we will only comply with requests originating from you@youremail.com. We strongly suggest using PGP encryption when communicating with Gibberfish.
- Do not hesitate to reach out to use with questions at info@gibberfish.org, but remember that we will only comply with requests originating from you@youremail.com. We strongly suggest using PGP encryption when communicating with Gibberfish.
-
- We can only provide limited technical support because we cannot log in to your server. In the coming months we will be rolling out improvements to our Management Portal which will provide better troubleshooting tools.
- We can only provide limited technical support because we cannot log in to your server. In the coming months we will be rolling out improvements to our Management Portal which will provide better troubleshooting tools.
-
- If your server is rebooted, the encrypted disk will become locked. You will need to log in to the Management Portal and enter your passphrase to unlock it again.
- If your server is rebooted, the encrypted disk will become locked. You will need to log in to the Management Portal and enter your passphrase to unlock it again.