Gibberfish, Inc./Gibberfish User Documentation
-
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
Entendemos por 'robusto' procedimientos que se han establecido o validados por expertos en seguridad. Éstos incluyen, pero no se limitan a, el proyecto de Electronic Frontier Foundation (EFF), el Guardian Project y Tor.
-
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Utilizamos 'consistente' para enfatizar que el uso intermitente de cualquier práctica de seguridad es tan dañino como no utilizar ninguna. Una vez que se desarrolla un modelo de amenaza y una estrategia para derrotarla, debes aplicar esta estrategia cada vez que participes en actividades privadas.
-
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Cada usuario debe entender el modelo de amenaza de su grupo y utilizar constantemente las mismas prácticas de seguridad.
-
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Para obtener más información sobre modelos de amenaza, consulte este excelente primer producido por la EFF.
-
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
Cuando inicies sesión por primera vez, tu lista de chat a la derecha de la pantalla aparecerá vacía. Desde el menú en la parte inferior puedes agregar contactos. Solo comienza a escribir y buscará automáticamente los usuarios existentes en el servidor, o puedes escribir la dirección XMPP de usuarios externos.
-
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Para permanecer conectado mientras no has iniciado sesión en Gibberfish, puedes conectarte al servidor directamente usando a un cliente compatible con XMPP como Adium, Pidgin o una de muchas de las aplicaciones móviles.
-
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
El servidor de chat también es accesible como un "servicio de cebolla" de Tor en el puerto 5222. Consulte a su administrador por la dirección del servidor Tor.
-
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
Sin embargo, al chatear con usuarios fuera de su servidor, no tiene ninguna garantía de privacidad a menos que tú y tus contactos utilicen un plugin de end-to-end cifrado como "OTR". La mayoría de aplicaciones de chat son compatibles con el cifrado end-to-end y tienen guías para ayudarle a entenderlo y habilitarlo.
-
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
Es difícil, pero posible, que los datos sean interceptados por adversarios ingeniosos mientras en tránsito. Por esta razón no recomendamos sincronizar sus datos sin considerar cuidadosamente el modelo de amenaza y sus prácticas de seguridad.
-
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
Los administradores también deben familiarizarse con el Manual de Administración.
-
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Por último, le recomendamos suscribirse al Gibberfish Blog en la aplicación de noticias para mantenerse al día sobre importantes anuncios y garantía de seguridad.
-
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
Contamos con donaciones para sobrevivir. Si usted puede permitírselo, por favor considere hacer una contribución caritativa de cualquier cantidad en https://gibberfish.org/donate. Se lo agradeceremos inmensamente. ¡Gracias!
-
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
Por razones de seguridad, nos sólo responder a las solicitudes de su administrador registrado. Si usted tiene preguntas relacionadas con el servicio, por favor consulte a su administrador.
-
PROFILE
PROFILE
PERFIL
-
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
Si es la primera vez que inicias sesión, te llevaría unos minutos completar tu perfil y cambiar tu contraseña. Haz clic en la esquina superior derecha y selecciona Personal para editar tu perfil.
-
PASSPHRASES
PASSPHRASES
CONTRASEÑAS
-
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
AUTENTICACIÓN DE DOS FACTORES
-
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Una vez que has cambiado tu contraseña, también le animamos a habilitar la autenticación de dos factores ("2FA"). Se trata de instalar una aplicación en su dispositivo móvil que genera un código único de 6 dígitos que debe ingresar cada vez que inicie sesión. Para que alguien pueda hackear su cuenta, necesitan conocer su contraseña y poseer físicamente el teléfono. Esta combinación te mantiene más seguro. Porque Gibberfish es parte del ecosistema de Nextcloud, puede utilizar la aplicación de Nextcloud 2FA. Esta aplicación es compatible con FreeOTP, que puede descargarse en la app store para dispositivos iOS y Android.
-
KEY VAULTS
KEY VAULTS
BÓVEDAS DE CLAVES.
-
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
Si aún no te acostumbras, sería una buena idea guardar tus contraseñas en una bóveda de claves como KeePass. Las bóvedas de claves hacen fácil de recordar con seguridad todas tus contraseñas. Necesitarás cerrar tu bóveda de claves con una contraseña generada por Diceware . Además, recomendamos fuertemente que actives el cifrado de disco completo en el dispositivo de almacenamiento de tu bóveda de claves.