Gibberfish, Inc./Gibberfish User Documentation
-
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
Ketika Anda pertama kali masuk, kenalan ngobrol Anda di sisi kanan layar akan kosong. Dari menu di bawah Anda dapat menambahkan kontak. Hanya mulai mengetik dan akan secara otomatis mencari untuk pengguna yang ada di server, atau Anda dapat mengetik dalam alamat XMPP pengguna eksternal. -
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Untuk tetap terhubung ketika Anda tidak login ke Gibberfish, Anda juga dapat menghubungkan ke server secara langsung menggunakan klien XMPP-kompatibel seperti Adium, Pidgin atau salah satu dari banyak aplikasi mobile. -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
Server obrolan dicapai sebagai Tor "bawang Layanan" pada port 5222. Meminta administrator server Anda Tor alamat. -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
Namun, ketika mengobrol dengan pengguna di luar server Anda, Anda memiliki tidak menjamin privasi kecuali Anda dan kontak Anda menggunakan enkripsi end-to-end plugin seperti "OTR". Kebanyakan klien chat mendukung enkripsi end-to-end, dan memiliki panduan untuk membantu Anda memahami dan mengaktifkannya. -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
Hal ini sulit, tetapi mungkin, untuk data Anda dapat dicegat oleh akal musuh saat di persinggahan. Untuk alasan ini kami tidak merekomendasikan untuk menyinkronkan data tanpa hati-hati mempertimbangkan Model ancaman dan praktik keamanan Anda. -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
Administrator juga harus membiasakan diri dengan Admin Manual. -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Akhirnya, kami sarankan untuk berlangganan ke Gibberfish Blog di app berita untuk tetap up to date pada pengumuman penting dan pernyataan kami canary. -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
Kami mengandalkan sumbangan untuk bertahan hidup. Jika Anda mampu membelinya, silakan mempertimbangkan untuk membuat sumbangan dari setiap jumlah di https://gibberfish.org/donate. Kami akan sangat menghargai itu. Terima kasih! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
Untuk alasan keamanan, kami hanya menanggapi permintaan dari Administrator Anda terdaftar. Jika Anda memiliki pertanyaan yang berhubungan dengan layanan, minta administrator. -
PROFILE
PROFILE
PROFIL -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
Jika ini adalah pertama kalinya Anda log in, Anda harus mengambil beberapa menit untuk mengisi profil Anda, dan sementara kau tidak mengubah sandi! Klik di atas kanan sudut dan memilih Personal untuk mengedit profil Anda. -
PASSPHRASES
PASSPHRASES
PASSPHRASES -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
DUA FAKTOR OTENTIKASI -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Setelah mengubah sandi, kami juga sangat menyarankan Anda untuk mengaktifkan otentikasi dua-faktor ("2FA"). Ini melibatkan menginstal aplikasi pada ponsel yang menghasilkan kode 6 digit yang unik yang Anda harus memasukkan setiap kali Anda log in. Bagi seseorang untuk hack account Anda, mereka akan perlu tahu sandi dan secara fisik memiliki telepon Anda. Kombinasi ini membuat Anda lebih aman. Karena Gibberfish merupakan bagian dari ekosistem Nextcloud, Anda dapat menggunakan Nextcloud 2FA app. Aplikasi ini mendukung FreeOTP, yang dapat diunduh di app store untuk perangkat Android dan iOS. -
KEY VAULTS
KEY VAULTS
KUBAH UTAMA -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
Jika Anda tidak sudah terbiasa melakukan hal itu, itu akan menjadi ide yang baik untuk menyimpan passphrases Anda dalam peti kunci seperti KeePass. Kunci kubah membuatnya mudah untuk aman mengingat semua passphrases Anda. Anda akan perlu untuk mengunci vault Anda kunci sendiri dengan sebuah passphrase Diceware dihasilkan. Selain itu, kami sangat menyarankan Anda mengaktifkan full-disk enkripsi pada perangkat menyimpan vault kunci Anda. -
DIGITAL HYGIENE
DIGITAL HYGIENE
DIGITAL KEBERSIHAN -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
Kebersihan Digital yang baik adalah penggunaan yang konsisten praktik keamanan yang kuat. -
THREATS
THREATS
ANCAMAN -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Pemahaman Anda dan kelompok Anda akan menghadapi ancaman yang merupakan langkah penting dalam membangun strategi keamanan yang berguna. Tujuannya adalah untuk menggunakan hanya teknik yang diperlukan untuk melindungi terhadap musuh Anda mungkin. Ini akan mencegah rezim keamanan Anda menjadi mengganggu sekali bahwa Anda berhenti menggunakannya. Administrator mungkin telah membuat Model ancaman yang menggambarkan tantangan keamanan Anda dan kelompok Anda mungkin mengharapkan. Jika Anda tidak yakin, silakan menghubungi mereka dan meminta.