Gibberfish, Inc./Gibberfish User Documentation
-
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Usted puede haber notado que esta url no utiliza HTTPS, que es el estándar para la navegación web segura. Esto es porque Tor ya protege su tráfico con varias capas de cifrado, haciendo innecesario HTTPS.
-
3. Log in to the management portal:
3. Log in to the management portal:
3. Inicie sesión el portal de gestión:
-
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery stapleusername: portal_admin
contraseña: engrapadora de baterías correcta caballo -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. en la siguiente pantalla, escriba la contraseña de cifrado que ha elegido para proteger sus datos. Por favor revise con exactitud antes de oprimir la tecla 'Enter'. Esto iniciará el proceso de cifrado y la instalación de su nueva nube. Una vez finalizado, se mostrará el nombre de usuario y contraseña que se puede utilizar para acceder a la nube en la dirección que aparece en la parte superior de esta carta. Puede continuar utilizando el navegador Tor desde este punto, o cambiar a un navegador normal. Por favor cambie la contraseña una vez que haya iniciado sesión.
-
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Si tiene algún problema, por favor contáctenos en info@gibberfish.org.
-
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH INICIO RÁPIDO
-
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
¡Bienvenido a Gibberfish! Nuestro objetivo es su privacidad y seguridad, pero necesitamos que seas un participante. A continuación se muestran un par de sugerencias para que vayas iniciando.
-
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Nunca utilices una contraseña para el inicio de sesión de Gibberfish que utilices en otro lugar.
-
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Siempre genera una contraseña única para cualquier servicio, cuenta o dispositivo.
-
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Este método asegura que sólo necesitas recordar una contraseña: la que abre tu caja fuerte de claves.
-
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
Entendemos por 'robusto' procedimientos que se han establecido o validados por expertos en seguridad. Éstos incluyen, pero no se limitan a, el proyecto de Electronic Frontier Foundation (EFF), el Guardian Project y Tor.
-
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Utilizamos 'consistente' para enfatizar que el uso intermitente de cualquier práctica de seguridad es tan dañino como no utilizar ninguna. Una vez que se desarrolla un modelo de amenaza y una estrategia para derrotarla, debes aplicar esta estrategia cada vez que participes en actividades privadas.
-
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Cada usuario debe entender el modelo de amenaza de su grupo y utilizar constantemente las mismas prácticas de seguridad.
-
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Para obtener más información sobre modelos de amenaza, consulte este excelente primer producido por la EFF.
-
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
Cuando inicies sesión por primera vez, tu lista de chat a la derecha de la pantalla aparecerá vacía. Desde el menú en la parte inferior puedes agregar contactos. Solo comienza a escribir y buscará automáticamente los usuarios existentes en el servidor, o puedes escribir la dirección XMPP de usuarios externos.
-
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Para permanecer conectado mientras no has iniciado sesión en Gibberfish, puedes conectarte al servidor directamente usando a un cliente compatible con XMPP como Adium, Pidgin o una de muchas de las aplicaciones móviles.
-
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
El servidor de chat también es accesible como un "servicio de cebolla" de Tor en el puerto 5222. Consulte a su administrador por la dirección del servidor Tor.
-
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
Sin embargo, al chatear con usuarios fuera de su servidor, no tiene ninguna garantía de privacidad a menos que tú y tus contactos utilicen un plugin de end-to-end cifrado como "OTR". La mayoría de aplicaciones de chat son compatibles con el cifrado end-to-end y tienen guías para ayudarle a entenderlo y habilitarlo.
-
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
Es difícil, pero posible, que los datos sean interceptados por adversarios ingeniosos mientras en tránsito. Por esta razón no recomendamos sincronizar sus datos sin considerar cuidadosamente el modelo de amenaza y sus prácticas de seguridad.
-
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
Los administradores también deben familiarizarse con el Manual de Administración.