Gibberfish, Inc./Gibberfish User Documentation
-
bdfa259de6bdca5cc59ab8d5df506cd31a7e22fa
bdfa259de6bdca5cc59ab8d5df506cd31a7e22fa
EXISTING COMMUNICATIONS -
61bf882c9e71483b2ee6a8819ba17d972b1d694d
61bf882c9e71483b2ee6a8819ba17d972b1d694d
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it. -
f947d60b0ebc8661d1adab1e20c3f45cb1a3a9e4
f947d60b0ebc8661d1adab1e20c3f45cb1a3a9e4
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them. -
284da2e9c8943a9faa155f56f0faaa7791471528
284da2e9c8943a9faa155f56f0faaa7791471528
TOR -
ROZMOWY VIDEO
ROZMOWY VIDEO
VIDEO CALLS -
4cc13b6a33230df11e68f8be86e7fd428be7c12e
4cc13b6a33230df11e68f8be86e7fd428be7c12e
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid. -
CZAT
CZAT
CHAT -
90d7fb7d490d0991c4dbd5bed495d33b03cdf2c0
90d7fb7d490d0991c4dbd5bed495d33b03cdf2c0
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is<your username>
@<your gibberfish server>
. For example, -
546e2c9a8685e17aa5c5cf752632f067b0b1ac92
546e2c9a8685e17aa5c5cf752632f067b0b1ac92
FURTHER READING -
ac1621e2d65b1c57e2bea613689dd66e7fab0898
ac1621e2d65b1c57e2bea613689dd66e7fab0898
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder. -
UWAGI KOŃCOWE
UWAGI KOŃCOWE
FINAL NOTES -
f1c90d7021e80722eb402a38bd366770107f94b7
f1c90d7021e80722eb402a38bd366770107f94b7
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible. -
af025220e850b661747b7b8ecff468cecec35758
af025220e850b661747b7b8ecff468cecec35758
DESKTOP AND MOBILE CLIENTS -
7aafc26d303169ce4a6e3c99733a4c20c807a4c1
7aafc26d303169ce4a6e3c99733a4c20c807a4c1
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked -
24547c7092f4086f807946819bf43ba52f783a5c
24547c7092f4086f807946819bf43ba52f783a5c
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security. -
98e40363e2574317092ab0ea713647cce796d1f5
98e40363e2574317092ab0ea713647cce796d1f5
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence. -
c281b33bccf7469dd65bf25145e20fec3da60225
c281b33bccf7469dd65bf25145e20fec3da60225
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous. -
27f88a8c3cc8924500f0dc56843d684e246b349b
27f88a8c3cc8924500f0dc56843d684e246b349b
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing. -
af8bf78e711f96a90e4fa3ee1934ba941295388f
af8bf78e711f96a90e4fa3ee1934ba941295388f
Discover these and other Tor services at: -
39c90d8ca6a569fee1025a5d7414d51a9b490173
39c90d8ca6a569fee1025a5d7414d51a9b490173
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
No more segments to load.
Loading more segments…
© 2009-2024 WebTranslateIt Software S.L. All rights reserved.
Terms of Service
·
Privacy Policy
·
Security Policy