Gibberfish, Inc./Gibberfish User Documentation
-
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. 在下一屏幕上, 键入您选择用来保护数据的加密密码。请检查它的准确性, 然后再点击 ' 进入 '。这将启动加密和安装新云的过程。一旦完成, 它将显示用户名和密码, 您可以使用它访问您的云在该信的顶部列出的地址。您可以从此位置继续使用 Tor 浏览器, 或者切换到普通浏览器。登录后请更改密码。 -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
如果您遇到任何麻烦, 请与我们联系在 info@gibberfish.org info@gibberfish。 -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH 快速入门 -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
欢迎来到 Gibberfish!我们的重点是你的隐私和安全, 但我们需要你是一个平等的参与者。下面是几个建议, 让你开始。 -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
不要使用您在其他任何地方使用的 Gibberfish 登录的密码。 -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
始终为任何服务、帐户或设备生成唯一的密码。 -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
使用此方法可以确保只需要记住一个密码: 打开密钥存储库的口令。 -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
通过 "强健", 我们指的是由受信任的安全专家建立或审核的程序。这些包括但不限于电子前沿基金会、卫报项目和 Tor 项目。 -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
我们使用 "一致" 来强调, 任何安全实践的间歇性使用都与不使用一个操作一样糟糕。一旦你制定了一个威胁模型和一个战胜它的策略, 你必须在每次从事私人活动时都应用该策略。 -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
每个用户都必须了解您的组的威胁模型, 并始终使用相同的安全做法。 -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
有关威胁模型的详细信息, 请参阅本文所生产的这一优秀底漆。 -
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
首次登录时, 屏幕右侧的聊天名册将为空。从底部的菜单中, 您可以添加联系人。只需开始键入, 它将自动搜索服务器上的现有用户, 也可以键入外部用户的 XMPP 地址。 -
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
要在未登录到 Gibberfish 时保持连接, 您还可以使用与 XMPP 兼容的客户端 (如 Adium、洋泾浜或许多移动应用程序之一) 直接连接到服务器。 -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
聊天服务器也可作为端口5222上的 Tor "洋葱服务" 访问。向管理员询问服务器的 Tor 地址。 -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
但是, 在与服务器以外的用户聊天时, 除非您和您的联系人使用端到端的加密插件 (如 "工程机械"), 否则您无法保证隐私。大多数聊天客户端都支持端对端加密, 并具有帮助您理解和启用它的指南。 -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
这是困难的, 但可能的, 你的数据被截获的资源, 而在过境的敌人。因此, 我们不建议在不仔细考虑您的威胁模型和安全做法的情况下同步数据。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理员也应该熟悉管理手册。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最后, 我们建议订阅新闻应用程序中的 Gibberfish 博客, 以保持最新的重要公告和我们的金丝雀声明。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
我们依靠捐赠来生存。如果你能负担得起, 请考虑作出任何金额在 https://gibberfish.org/donate 慈善捐款。我们将不胜感激。谢谢! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
出于安全原因, 我们只响应您的注册管理员的请求。如果您有与服务相关的问题, 请询问您的管理员。