Gibberfish, Inc./Gibberfish User Documentation
-
THREATS
THREATS
威脅 -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
瞭解您和您的團隊將遇到的威脅是建立有用的安全性原則的重要步驟。目標是只使用必要的技術來抵禦可能的對手。這將防止您的安全機制變得如此繁重, 以至於您不再使用它。您的管理員可能已經創建了一個威脅模型, 描述您和您的組可能期望的安全挑戰。如果您不確定, 請與他們聯繫並詢問。 -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
現有通信 -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
您可能正在將 Gibberfish 添加到與連線活動關聯的各種現有帳戶和服務中。這些舊帳和服務可能已被洩露。我們建議對涉及您的 Gibberfish 伺服器的任何活動、存儲在那裡的內容或與其相關的活動使用新帳戶。 -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
我們認識到, 這並不總是方便或適合每個使用者。在這種情況下, 請花時間重新保護您打算用於私人活動的任何帳戶或服務。更改您的密碼以鎖定未授權的使用者, 他們可能在沒有您的知識的情況下獲得了存取權限。只要可能, 啟用雙因素授權。檢查所有設備 (包括電話) 的軟體更新並安裝它們。 -
TOR
TOR
Tor -
VIDEO CALLS
VIDEO CALLS
視頻呼叫 -
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid.
The Nextcloud “Talk” app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the “Nextcloud Talk” mobile app, which is available from iTunes, Google Play, and F-Droid.
Nextcloud "聊天" 應用程式允許您在 web 瀏覽器中創建和加入視頻呼叫。為了在行動裝置上獲得最佳性能, 我們建議您安裝並使用 "Nextcloud 聊天" 移動應用程式, 它可從 iTunes、Google 播放和 F 機器人中獲得。 -
CHAT
CHAT
聊天 -
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is <your username>@<your gibberfish server>. For example,
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is
<your username>
@<your gibberfish server>
. For example,聊天系統使用標準的 XMPP 協定, 它不僅允許您與其他 Gibberfish 使用者聊天, 還可以與使用 XMPP 伺服器的世界上的任何人進行交談。您的 XMPP 位址為<your username>
@<your gibberfish server>
。例如, -
FURTHER READING
FURTHER READING
進一步閱讀 -
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
有關核心功能的更廣泛文檔, 請參閱 Nextcloud 使用者手冊, 它也位於您的 Gibberfish 主資料夾中。 -
FINAL NOTES
FINAL NOTES
最後說明 -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
我們希望你喜歡使用 Gibberfish。我們努力使它成為一個安全和便於使用的平臺, 以及許多獨立的貢獻者, 我們已經集成到我們的服務的各種開源專案。特別感謝 Nextcloud 的鄉親們, 沒有他們我們的平臺是不可能的。 -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
桌上型電腦和移動用戶端 -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish 與 Nextcloud 桌面和移動用戶端一起工作, 允許您自動將檔與伺服器同步。預設情況下, 此選項被禁用為安全措施。如果希望使用這些用戶端, 請與管理員聯繫以更改檔訪問規則。如果您決定在本地同步檔, 則只有在打開設備的全磁片加密時才這樣做。如果您的設備丟失、被盜或被駭客攻擊, 這將保護您的檔 -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
雖然上面的漫畫解釋的概念, Diceware 方法建議一個密碼長度為5或更多的詞, 以獲得最佳的安全性。 -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
使用 Tor 是保護您的線上隱私的唯一最佳方式。這就是為什麼我們使用 Tor 部署您的 Gibberfish 伺服器。雖然它具體地提到了洋蔥路由器專案, Tor 已經包括了各種各樣的免費產品和服務, 人們可以用來維護他們的線上活動。我們建議每個人都使用 Tor 瀏覽器來説明匿名他們的線上存在。 -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
請仔細閱讀 Tor 提供的關於在他們的網路上流覽的文檔和常見問題。他們對維護你的隱私有重要的建議。重要的是, 使用 Tor 瀏覽器並不保證所有的線上活動都是匿名的。 -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
由於您的安全需要升級 Tor 有其他的免費工具來説明。評估威脅模型時, 您可能希望調查橋頭伺服器和尾部。橋式伺服器允許人們在阻止它的國家訪問 Tor。尾部是一個 Linux 作業系統, 用通用的程式完成, 所有的 USB 棒。它允許極私人計算。