Gibberfish, Inc./Gibberfish User Documentation
-
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
要在未登录到 Gibberfish 时保持连接, 您还可以使用与 XMPP 兼容的客户端 (如 Adium、洋泾浜或许多移动应用程序之一) 直接连接到服务器。 -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
聊天服务器也可作为端口5222上的 Tor "洋葱服务" 访问。向管理员询问服务器的 Tor 地址。 -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
但是, 在与服务器以外的用户聊天时, 除非您和您的联系人使用端到端的加密插件 (如 "工程机械"), 否则您无法保证隐私。大多数聊天客户端都支持端对端加密, 并具有帮助您理解和启用它的指南。 -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
这是困难的, 但可能的, 你的数据被截获的资源, 而在过境的敌人。因此, 我们不建议在不仔细考虑您的威胁模型和安全做法的情况下同步数据。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理员也应该熟悉管理手册。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最后, 我们建议订阅新闻应用程序中的 Gibberfish 博客, 以保持最新的重要公告和我们的金丝雀声明。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
我们依靠捐赠来生存。如果你能负担得起, 请考虑作出任何金额在 https://gibberfish.org/donate 慈善捐款。我们将不胜感激。谢谢! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
出于安全原因, 我们只响应您的注册管理员的请求。如果您有与服务相关的问题, 请询问您的管理员。 -
PROFILE
PROFILE
配置 文件 -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
如果这是你第一次登录, 你应该花几分钟填写你的个人资料, 而你在那里改变你的密码!点击右上角, 选择个人编辑你的档案文件。 -
PASSPHRASES
PASSPHRASES
密码 -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
双因素身份验证 -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
一旦您更改了密码, 我们还强烈鼓励您启用双因素身份验证 ("2FA")。这包括在您的移动设备上安装一个应用程序, 它生成了每次登录时必须输入的唯一的6位代码。如果有人破解了你的帐号, 他们需要知道你的密码, 并在物理上拥有你的手机。这种组合使您更安全。因为 Gibberfish 是 Nextcloud 生态系统的一部分, 所以您可以使用 Nextcloud 2FA 应用程序。这个应用程序支持 FreeOTP, 它可以下载在 app 商店的 Android 和 iOS 设备。 -
KEY VAULTS
KEY VAULTS
钥匙金库 -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
如果您还没有这样做的习惯, 那么将您的密码存储在像 KeePass 这样的密钥库中是个好主意。密钥库使您可以轻松地记住所有密码。您将需要使用 Diceware 生成的密码锁来锁定密钥库本身。此外, 我们强烈建议您在存储密钥存储库的设备上启用全磁盘加密。 -
DIGITAL HYGIENE
DIGITAL HYGIENE
数字卫生 -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
良好的数字卫生是一贯使用稳健的安全做法。 -
THREATS
THREATS
威胁 -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
了解您和您的团队将遇到的威胁是建立有用的安全策略的重要步骤。目标是只使用必要的技术来抵御可能的对手。这将防止您的安全机制变得如此繁重, 以至于您不再使用它。您的管理员可能已经创建了一个威胁模型, 描述您和您的组可能期望的安全挑战。如果您不确定, 请与他们联系并询问。 -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
现有通信