Gibberfish, Inc./Gibberfish User Documentation
-
546e2c9a8685e17aa5c5cf752632f067b0b1ac92
546e2c9a8685e17aa5c5cf752632f067b0b1ac92
FURTHER READING -
ac1621e2d65b1c57e2bea613689dd66e7fab0898
ac1621e2d65b1c57e2bea613689dd66e7fab0898
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder. -
637077a14aad08a4ae7720c591e9f9308552e5ff
637077a14aad08a4ae7720c591e9f9308552e5ff
FINAL NOTES -
f1c90d7021e80722eb402a38bd366770107f94b7
f1c90d7021e80722eb402a38bd366770107f94b7
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible. -
af025220e850b661747b7b8ecff468cecec35758
af025220e850b661747b7b8ecff468cecec35758
DESKTOP AND MOBILE CLIENTS -
7aafc26d303169ce4a6e3c99733a4c20c807a4c1
7aafc26d303169ce4a6e3c99733a4c20c807a4c1
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked -
24547c7092f4086f807946819bf43ba52f783a5c
24547c7092f4086f807946819bf43ba52f783a5c
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security. -
98e40363e2574317092ab0ea713647cce796d1f5
98e40363e2574317092ab0ea713647cce796d1f5
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence. -
c281b33bccf7469dd65bf25145e20fec3da60225
c281b33bccf7469dd65bf25145e20fec3da60225
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous. -
27f88a8c3cc8924500f0dc56843d684e246b349b
27f88a8c3cc8924500f0dc56843d684e246b349b
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing. -
af8bf78e711f96a90e4fa3ee1934ba941295388f
af8bf78e711f96a90e4fa3ee1934ba941295388f
Discover these and other Tor services at: -
39c90d8ca6a569fee1025a5d7414d51a9b490173
39c90d8ca6a569fee1025a5d7414d51a9b490173
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries. -
615b6b4014a902816473e0820dc924a1f9e40b92
615b6b4014a902816473e0820dc924a1f9e40b92
Image courtesy xkcd.com. -
f52ab57fa51dfa714505294444463ae5a009ae34
f52ab57fa51dfa714505294444463ae5a009ae34
Hello, -
7b2c553376b37735b342cbcd8de10451fc324ae1
7b2c553376b37735b342cbcd8de10451fc324ae1
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit: -
e0d39df5ff64f4c2f1da104899674b052b4953dc
e0d39df5ff64f4c2f1da104899674b052b4953dc
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session. -
5304ba624f07b18fee46545980f9a1a8ea22208b
5304ba624f07b18fee46545980f9a1a8ea22208b
Some important reminders: -
3c97d569e9acb18681d9a942331f2312f3018fda
3c97d569e9acb18681d9a942331f2312f3018fda
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security. -
b437e8e04110f56a8b9c47f307752f1ffe534f74
b437e8e04110f56a8b9c47f307752f1ffe534f74
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted. -
83cd4abd5ed571a328114106a39627a8d97d2436
83cd4abd5ed571a328114106a39627a8d97d2436
- Do not lose your encryption passphrase. We cannot recover it, ever, for any reason.