Gibberfish, Inc./Gibberfish User Documentation
-
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Esperamos que você goste do Gibberfish. Trabalhamos duro para torná-lo uma plataforma segura e fácil de usar, assim como trabalharam as muitas pessoas que contribuiram independentemente para os vários projetos de código aberto que integramos ao nosso serviço. Agradecemos especialmente ao pessoal da Nextcloud, sem a qual nossa plataforma não seria possível. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
CLIENTES PARA DESKTOP E DISPOSITIVO MÓVEL -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
O Gibberfish funciona com os clientes da Nextcloud para desktop e dispositivo móvel, permitindo que você sincronize seus arquivos automaticamente com o servidor. Como precaução, esse recurso é desabilitado por padrão. Para usar esses clientes, peça à Administração para alterar as regras de acesso aos arquivos. Se você quiser sincronizar os arquivos localmente, certifique-se de ativar a criptografia de disco inteiro para o seu dispositivo. Assim, seus arquivos são protegidos caso seu aparelho seja perdido, roubado ou hackeado. -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
O quadrinho acima explica o conceito do método Diceware, segundo o qual uma frase secreta deve ter, de fato, pelo menos cinco palavras para maior segurança. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
O Tor é o melhor caminho para proteger sua privacidade on-line, e é por isso que o utilizamos para implantar seu servidor Gibberfish. Embora o nome se refira especificamente ao projeto The Onion Router, o Tor passou a englobar uma série de produtos e serviços gratuitos que as pessoas podem usar para resguardar suas atividades on-line. Nossa recomendação é que todos os internautas usem o Tor Browser para se manter anônimos. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Por favor, leia atentamente a documentação e o FAQ a respeito da navegação na rede Tor fornecidos pelo próprio projeto. Eles contêm recomendações importantes sobre privacidade. Vale ressaltar que usar o Tor Browser não garante que todas as suas atividades on-line são anônimas. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
O Tor oferece outras ferramentas gratuitas para ajudar a reforçar sua segurança. Ao avaliar seu Modelo de Ameaças, você talvez perceba vantagens em utilizar bridges e o Linux Tails. As bridges, ou pontes, são servidores que permitem acesso ao Tor em países onde ele é bloqueado. Já o Linux Tails é um sistema operacional completo, contando com os programas mais comuns, que pode ser posto para funcionar a partir de um pen drive. É extremamente seguro. -
Discover these and other Tor services at:
Discover these and other Tor services at:
Descubra esses e outros serviços Tor em: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Uma boa frase secreta é essencial para resguardar seus dados. Nós (e muitos especialistas em segurança) recomendamos o método Diceware para criação de senhas. É o único procedimento que consideramos seguro para gerar sua frase secreta. Fácil de seguir, resulta em senhas ultrafortes, capazes de resistir aos ataques mais engenhosos. -
Image courtesy xkcd.com.
Image courtesy xkcd.com.
Imagem cedida por xkcd.com.