Gibberfish, Inc./Gibberfish User Documentation
-
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
Es difícil, pero posible, que los datos sean interceptados por adversarios ingeniosos mientras en tránsito. Por esta razón no recomendamos sincronizar sus datos sin considerar cuidadosamente el modelo de amenaza y sus prácticas de seguridad. -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
Los administradores también deben familiarizarse con el Manual de Administración. -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Por último, le recomendamos suscribirse al Gibberfish Blog en la aplicación de noticias para mantenerse al día sobre importantes anuncios y garantía de seguridad. -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
Contamos con donaciones para sobrevivir. Si usted puede permitírselo, por favor considere hacer una contribución caritativa de cualquier cantidad en https://gibberfish.org/donate. Se lo agradeceremos inmensamente. ¡Gracias! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
Por razones de seguridad, nos sólo responder a las solicitudes de su administrador registrado. Si usted tiene preguntas relacionadas con el servicio, por favor consulte a su administrador. -
PROFILE
PROFILE
PERFIL -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
Si es la primera vez que inicias sesión, te llevaría unos minutos completar tu perfil y cambiar tu contraseña. Haz clic en la esquina superior derecha y selecciona Personal para editar tu perfil. -
PASSPHRASES
PASSPHRASES
CONTRASEÑAS -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
AUTENTICACIÓN DE DOS FACTORES -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Una vez que has cambiado tu contraseña, también le animamos a habilitar la autenticación de dos factores ("2FA"). Se trata de instalar una aplicación en su dispositivo móvil que genera un código único de 6 dígitos que debe ingresar cada vez que inicie sesión. Para que alguien pueda hackear su cuenta, necesitan conocer su contraseña y poseer físicamente el teléfono. Esta combinación te mantiene más seguro. Porque Gibberfish es parte del ecosistema de Nextcloud, puede utilizar la aplicación de Nextcloud 2FA. Esta aplicación es compatible con FreeOTP, que puede descargarse en la app store para dispositivos iOS y Android. -
KEY VAULTS
KEY VAULTS
BÓVEDAS DE CLAVES. -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
Si aún no te acostumbras, sería una buena idea guardar tus contraseñas en una bóveda de claves como KeePass. Las bóvedas de claves hacen fácil de recordar con seguridad todas tus contraseñas. Necesitarás cerrar tu bóveda de claves con una contraseña generada por Diceware . Además, recomendamos fuertemente que actives el cifrado de disco completo en el dispositivo de almacenamiento de tu bóveda de claves. -
DIGITAL HYGIENE
DIGITAL HYGIENE
HIGIENE DIGITAL -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
Una buena higiene digital consiste en el uso de buenas prácticas de seguridad . -
THREATS
THREATS
AMENAZAS -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Comprender las amenazas que usted y su grupo encontrará es un paso importante en el establecimiento de una estrategia de seguridad útil. El objetivo es utilizar sólo las técnicas necesarias para proteger contra sus adversarios probablemente. Esto evitará que su régimen de seguridad ser tan onerosas que dejas de usarlo. El administrador puede ya han creado un modelo de amenaza que describe los retos de seguridad que usted y su grupo pueden esperar. Si no está seguro, por favor contactar con ellos y preguntar. -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
COMUNICACIONES EXISTENTES -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
Es probable que agregue Gibberfish a una variedad de cuentas existentes y servicios asociados con sus actividades en línea. Estas más viejas cuentas y servicios ya pueden verse comprometidas. Recomendamos utilizar cuentas frescas para cualquier actividad que implique su servidor Gibberfish, el contenido almacenado allí o las actividades asociadas con él. -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
Reconocemos que esto no es siempre conveniente o apropiado para cada usuario. En este caso, por favor tome el tiempo para volver a fijar cualquier cuenta o servicio que vaya a utilizar para actividades privadas. Cambiar sus contraseñas para cierre no autorizado de usuarios que pueden haber accedido sin su conocimiento. Siempre que sea posible, permitir la autorización de dos factores. Busque actualizaciones de software para todos sus dispositivos, incluyendo su teléfono e instalarlos. -
TOR
TOR
TOR