Gibberfish, Inc./Gibberfish User Documentation
-
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
NYKYISTEN VIESTINTÄ -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
On todennäköistä, että lisäät Gibberfish erilaisia olemassa olevia asiakkuuksia ja online-toimintaan liittyvät palvelut. Nämä vanhemmat tilinpäätöksen ja palveluja voi jo vaarantunut. Suosittelemme käyttämään uusia tilejä toimintaa, jossa Gibberfish palvelin, varastoidaan sisältöä tai palvelupyyntöön liittyvät aktiviteetit. -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
Ymmärrämme, että tämä ei ole aina syystä tai jokaiselle käyttäjälle. Tässä tapauksessa ota aikaa saada uudelleen kaikki tilin tai aiot käyttää yksityisiä toimintoja. Sinun tunnuslauseet muuttamista työsulun luvattomilta käyttäjiltä, jotka ovat saaneet käyttää tietämättäsi. Mahdollisuuksien mukaan ottaa käyttöön kahden tekijän luvan. Kaikkien laitteiden, kuten puhelimen ohjelmistopäivitysten tarkistaminen ja asentaa ne. -
TOR
TOR
TOR -
VIDEO CALLS
VIDEO CALLS
VIDEOPUHELUT -
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid.
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid.
Nextcloud ”puhua” app voit luoda ja liittyä videopuhelut web-selaimessa. Parhaan suorituskyvyn mobiililaitteissa suosittelemme että asennat ja käytät ”Nextcloud puhua” Mobilen, joka löytyy iTunes, Google Play ja F-Droid. -
CHAT
CHAT
CHAT -
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is <your username>@<your gibberfish server>. For example,
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is
<your username>
@<your gibberfish server>
. For example,Chat-järjestelmä käyttää tavallista XMPP-protokollaa, jonka avulla voit keskustella muiden Gibberfish-käyttäjien kanssa ja lisäksi kenenkään muun maailman käyttämällä XMPP Serveriin. XMPP-osoitteesi on< käyttäjätunnuksesi >
@< gibberfish palvelimen >
. Esimerkiksi -
FURTHER READING
FURTHER READING
LISÄÄ AIHEESTA -
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
Laajemmat ohjeet keskeisiä ominaisuuksia Tutustu Nextcloud-käyttöoppaassa, joka sijaitsee kotikansiosi Gibberfish. -
FINAL NOTES
FINAL NOTES
LOPULLINEN NOTES -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Toivomme, että nautit Gibberfish. Olemme työskennelleet vaikea tehdä se turvallinen ja helppo-käyttää foorumi, on riippumaton edeltävässä eri avoimen lähdekoodin projekti, joka on integroitu palvelu. Erityinen kiitos menee folks at Nextcloud, joille meidän foorumi ei olisi mahdollista ilman. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
PÖYTÄKONEIDEN JA KANNETTAVIEN ASIAKKAIDEN -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish toimii Nextcloud ja asiakkaita avulla voit automaattisesti synkronoida tiedostoja ja palvelimen. Tämä on oletusarvoisesti turvallisuussyistä. Voit halutessasi käyttää näitä asiakkaita puhua järjestelmänvalvoja muuttaa tiedoston käyttösääntöjä. Jos päätät synkronoida tiedostoja paikallisesti, tehdä niin vain jos olet poistanut koko levyn salaus laitteelle. Tämä suojaa tiedostot, jos laitteesi katoaa, varastetaan tai hakkeroitu -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
Vaikka edellä sarjakuva selittää käsite, Diceware menetelmä suosittelee salasanan pituus vähintään 5 sanoja suojaustapa. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Käyttämällä Tor on yksi paras tapa suojata yksityisyyttäsi. Siksi ottaa Gibberfish-palvelimen käyttöön Tor. Vaikka tämä viittaa nimenomaan sipuli ajoväylä projektin, Tor on tullut käsittää useita eri tuotteita ja palveluja ihmiset avulla voit turvata heidän online toiminta. Suosittelemme, että kaikki avulla Tor-selainversion anonyymiseksi heidän online läsnäolo. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Lue huolellisesti dokumentteihin ja FAQ, joka Tor tarjoaa selailusta verkossa. Ne ovat tärkeitä suosituksia tietosuojan ylläpitäminen. Kaikkea Tor-selaimella ei takaa kaikkien online-toimintaa ovat nimettömiä. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
Tietoturvavaatimukset kärjistyä Tor on toinen vapauttaa koristella auttaa. Kun arvioidaan uhka-malli, voit tutkia sillan palvelimet ja hännät. Silta palvelimia käyttäjille pääsyn Tor maista, jotka estävät sen. Hännät on Linux-käyttöjärjestelmä, jossa on yleisesti käytettyjä ohjelmia, kaikki USB-muistille. Se mahdollistaa äärimmäisen yksityinen computing. -
Discover these and other Tor services at:
Discover these and other Tor services at:
Tutustu nämä ja Tor-palveluihin: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Hyvän tunnuslauseen ovat erittäin tärkeitä tietojen suojaamiseksi. Me (ja monet tietoturva-asiantuntijat) suosittelee Diceware-menetelmällä salasanojen luominen. Tämä on ainoa tapa tunnuslause sukupolven pidämme turvallista. Se on helppo tehdä, ja se tarjoaa erittäin vahva tunnuslauseita, joissa voi voittaa jopa kaikkein neuvokkaita vastustajia.