Gibberfish, Inc./Gibberfish User Documentation
-
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
这是困难的, 但可能的, 你的数据被截获的资源, 而在过境的敌人。因此, 我们不建议在不仔细考虑您的威胁模型和安全做法的情况下同步数据。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理员也应该熟悉管理手册。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最后, 我们建议订阅新闻应用程序中的 Gibberfish 博客, 以保持最新的重要公告和我们的金丝雀声明。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
我们依靠捐赠来生存。如果你能负担得起, 请考虑作出任何金额在 https://gibberfish.org/donate 慈善捐款。我们将不胜感激。谢谢! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
出于安全原因, 我们只响应您的注册管理员的请求。如果您有与服务相关的问题, 请询问您的管理员。 -
PROFILE
PROFILE
配置 文件 -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
如果这是你第一次登录, 你应该花几分钟填写你的个人资料, 而你在那里改变你的密码!点击右上角, 选择个人编辑你的档案文件。 -
PASSPHRASES
PASSPHRASES
密码 -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
双因素身份验证 -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
一旦您更改了密码, 我们还强烈鼓励您启用双因素身份验证 ("2FA")。这包括在您的移动设备上安装一个应用程序, 它生成了每次登录时必须输入的唯一的6位代码。如果有人破解了你的帐号, 他们需要知道你的密码, 并在物理上拥有你的手机。这种组合使您更安全。因为 Gibberfish 是 Nextcloud 生态系统的一部分, 所以您可以使用 Nextcloud 2FA 应用程序。这个应用程序支持 FreeOTP, 它可以下载在 app 商店的 Android 和 iOS 设备。 -
KEY VAULTS
KEY VAULTS
钥匙金库 -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
如果您还没有这样做的习惯, 那么将您的密码存储在像 KeePass 这样的密钥库中是个好主意。密钥库使您可以轻松地记住所有密码。您将需要使用 Diceware 生成的密码锁来锁定密钥库本身。此外, 我们强烈建议您在存储密钥存储库的设备上启用全磁盘加密。 -
DIGITAL HYGIENE
DIGITAL HYGIENE
数字卫生 -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
良好的数字卫生是一贯使用稳健的安全做法。 -
THREATS
THREATS
威胁 -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
了解您和您的团队将遇到的威胁是建立有用的安全策略的重要步骤。目标是只使用必要的技术来抵御可能的对手。这将防止您的安全机制变得如此繁重, 以至于您不再使用它。您的管理员可能已经创建了一个威胁模型, 描述您和您的组可能期望的安全挑战。如果您不确定, 请与他们联系并询问。 -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
现有通信 -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
您可能正在将 Gibberfish 添加到与联机活动关联的各种现有帐户和服务中。这些旧帐和服务可能已被泄露。我们建议对涉及您的 Gibberfish 服务器的任何活动、存储在那里的内容或与其相关的活动使用新帐户。 -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
我们认识到, 这并不总是方便或适合每个用户。在这种情况下, 请花时间重新保护您打算用于私人活动的任何帐户或服务。更改您的密码以锁定未授权的用户, 他们可能在没有您的知识的情况下获得了访问权限。只要可能, 启用双因素授权。检查所有设备 (包括电话) 的软件更新并安装它们。 -
TOR
TOR
Tor