Gibberfish, Inc./Gibberfish User Documentation
-
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
要在未登錄到 Gibberfish 時保持連接, 您還可以使用與 XMPP 相容的用戶端 (如 Adium、洋涇浜或許多移動應用程式之一) 直接連接到伺服器。 -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
聊天伺服器也可作為埠5222上的 Tor "洋蔥服務" 訪問。向管理員詢問伺服器的 Tor 位址。 -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
但是, 在與伺服器以外的使用者聊天時, 除非您和您的連絡人使用端到端的加密外掛程式 (如 "工程機械"), 否則您無法保證隱私。大多數聊天用戶端都支援端對端加密, 並具有説明您理解和啟用它的指南。 -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
這是困難的, 但可能的, 你的資料被截獲的資源, 而在過境的敵人。因此, 我們不建議在不仔細考慮您的威脅模型和安全做法的情況下同步資料。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理員也應該熟悉管理手冊。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最後, 我們建議訂閱新聞應用程式中的 Gibberfish 博客, 以保持最新的重要公告和我們的金絲雀聲明。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
我們依靠捐贈來生存。如果你能負擔得起, 請考慮作出任何金額在 HTTPs://gibberfish.org/donate 慈善捐款。我們將不勝感激。謝謝! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
出於安全原因, 我們只回應您的註冊管理員的請求。如果您有與服務相關的問題, 請詢問您的管理員。 -
PROFILE
PROFILE
配置 檔 -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
如果這是你第一次登錄, 你應該花幾分鐘填寫你的個人資料, 而你在那裡改變你的密碼!點擊右上角, 選擇個人編輯你的檔案檔。 -
PASSPHRASES
PASSPHRASES
密碼 -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
雙因素身份驗證 -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
一旦您更改了密碼, 我們還強烈鼓勵您啟用雙因素身份驗證 ("2FA")。這包括在您的行動裝置上安裝一個應用程式, 它生成了每次登錄時必須輸入的唯一的6位代碼。如果有人破解了你的帳號, 他們需要知道你的密碼, 並在物理上擁有你的手機。這種組合使您更安全。因為 Gibberfish 是 Nextcloud 生態系統的一部分, 所以您可以使用 Nextcloud 2FA 應用程式。這個應用程式支援 FreeOTP, 它可以下載在 app 商店的 Android 和 iOS 設備。 -
KEY VAULTS
KEY VAULTS
鑰匙金庫 -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
如果您還沒有這樣做的習慣, 那麼將您的密碼存儲在像 KeePass 這樣的金鑰庫中是個好主意。金鑰庫使您可以輕鬆地記住所有密碼。您將需要使用 Diceware 生成的密碼鎖來鎖定金鑰庫本身。此外, 我們強烈建議您在存儲金鑰存儲庫的設備上啟用全磁片加密。 -
DIGITAL HYGIENE
DIGITAL HYGIENE
數位衛生 -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
良好的數位衛生是一貫使用穩健的安全做法。 -
THREATS
THREATS
威脅 -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
瞭解您和您的團隊將遇到的威脅是建立有用的安全性原則的重要步驟。目標是只使用必要的技術來抵禦可能的對手。這將防止您的安全機制變得如此繁重, 以至於您不再使用它。您的管理員可能已經創建了一個威脅模型, 描述您和您的組可能期望的安全挑戰。如果您不確定, 請與他們聯繫並詢問。 -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
現有通信