Gibberfish, Inc./Gibberfish User Documentation
-
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staple使用者名: portal_admin 密碼: 正確的馬電池釘 -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. 在下一螢幕上, 鍵入您選擇用來保護資料的加密密碼。請檢查它的準確性, 然後再點擊 ' 進入 '。這將啟動加密和安裝新雲的過程。一旦完成, 它將顯示使用者名和密碼, 您可以使用它訪問您的雲在該信的頂部列出的位址。您可以從此位置繼續使用 Tor 瀏覽器, 或者切換到普通瀏覽器。登錄後請更改密碼。 -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
如果您遇到任何麻煩, 請與我們聯繫在 info@gibberfish.org info@gibberfish。 -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH 快速入門 -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
歡迎來到 Gibberfish!我們的重點是你的隱私和安全, 但我們需要你是一個平等的參與者。下面是幾個建議, 讓你開始。 -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
不要使用您在其他任何地方使用的 Gibberfish 登錄的密碼。 -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
始終為任何服務、帳戶或設備生成唯一的密碼。 -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
使用此方法可以確保只需要記住一個密碼: 打開金鑰存儲庫的口令。 -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
通過 "強健", 我們指的是由受信任的安全專家建立或審核的程式。這些包括但不限於電子前沿基金會、衛報專案和 Tor 專案。 -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
我們使用 "一致" 來強調, 任何安全實踐的間歇性使用都與不使用一個操作一樣糟糕。一旦你制定了一個威脅模型和一個戰勝它的策略, 你必須在每次從事私人活動時都應用該策略。 -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
每個使用者都必須瞭解您的組的威脅模型, 並始終使用相同的安全做法。 -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
有關威脅模型的詳細資訊, 請參閱本文所生產的這一優秀底漆。 -
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
首次登錄時, 螢幕右側的聊天名冊將為空。從底部的功能表中, 您可以添加連絡人。只需開始鍵入, 它將自動搜尋伺服器上的現有使用者, 也可以鍵入外部使用者的 XMPP 位址。 -
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
要在未登錄到 Gibberfish 時保持連接, 您還可以使用與 XMPP 相容的用戶端 (如 Adium、洋涇浜或許多移動應用程式之一) 直接連接到伺服器。 -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
聊天伺服器也可作為埠5222上的 Tor "洋蔥服務" 訪問。向管理員詢問伺服器的 Tor 位址。 -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
但是, 在與伺服器以外的使用者聊天時, 除非您和您的連絡人使用端到端的加密外掛程式 (如 "工程機械"), 否則您無法保證隱私。大多數聊天用戶端都支援端對端加密, 並具有説明您理解和啟用它的指南。 -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
這是困難的, 但可能的, 你的資料被截獲的資源, 而在過境的敵人。因此, 我們不建議在不仔細考慮您的威脅模型和安全做法的情況下同步資料。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理員也應該熟悉管理手冊。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最後, 我們建議訂閱新聞應用程式中的 Gibberfish 博客, 以保持最新的重要公告和我們的金絲雀聲明。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
我們依靠捐贈來生存。如果你能負擔得起, 請考慮作出任何金額在 HTTPs://gibberfish.org/donate 慈善捐款。我們將不勝感激。謝謝!