Gibberfish, Inc./Gibberfish User Documentation
-
2. Open the Tor browser and type the following into the address bar:
2. Open the Tor browser and type the following into the address bar:
2. Buka Tor browser dan ketik berikut ke address bar: -
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Anda mungkin telah memperhatikan bahwa url ini tidak menggunakan HTTPS, yang merupakan standar untuk browsing web aman. Hal ini karena Tor sudah melindungi lalu lintas dengan beberapa lapisan enkripsi, membuat HTTPS unneccessary. -
3. Log in to the management portal:
3. Log in to the management portal:
3. masuk ke portal manajemen: -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staplenama pengguna: portal_admin password: kuda benar baterai pokok -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. pada layar berikutnya, ketik kata sandi enkripsi ubahsuaian Anda telah memilih untuk melindungi data Anda. Harap Tinjau untuk akurasi sebelum menekan tombol 'Enter'. Ini akan memulai proses enkripsi dan menginstal awan baru Anda. Setelah selesai, ia akan menampilkan username dan password yang dapat Anda gunakan untuk mengakses internet Anda di alamat yang tercantum di bagian atas Surat ini. Anda dapat terus menggunakan Tor browser dari titik ini, atau beralih ke browser yang normal. Ubah sandi setelah Anda login. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Jika Anda mengalami kesulitan, silahkan hubungi kami di info@gibberfish.org. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Selamat datang di Gibberfish! Fokus kami adalah pada privasi dan keamanan Anda, tetapi kami membutuhkan Anda untuk menjadi peserta sama. Berikut adalah beberapa saran untuk Anda mulai. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Pernah menggunakan sebuah passphrase untuk login Gibberfish Anda yang Anda gunakan di mana saja lain. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Selalu menghasilkan sebuah passphrase yang unik untuk setiap layanan, akun atau perangkat. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Menggunakan metode ini menjamin Anda hanya perlu ingat satu passphrase: satu untuk membuka vault kunci Anda. -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
Dengan 'kuat' berarti prosedur yang telah didirikan atau Diperiksa oleh pakar keamanan terpercaya. Ini termasuk, tetapi tidak terbatas pada, proyek Electronic Frontier Foundation (EFF), wali proyek dan Tor. -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Kami menggunakan 'konsisten' untuk menekankan bahwa penggunaan intermiten praktik keamanan apa pun sebagai buruk sebagai tidak menggunakan salah satu sama sekali. Sekali Anda mengembangkan model ancaman dan strategi untuk mengalahkan itu, Anda harus menerapkan strategi bahwa setiap kali Anda terlibat dalam kegiatan-kegiatan pribadi. -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Setiap pengguna harus memahami grup Anda ancaman Model dan konsisten menggunakan praktik keamanan yang sama. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Untuk informasi lebih lanjut tentang ancaman model, silakan merujuk ke ini primer yang sangat baik yang diproduksi oleh EFF. -
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
Ketika Anda pertama kali masuk, kenalan ngobrol Anda di sisi kanan layar akan kosong. Dari menu di bawah Anda dapat menambahkan kontak. Hanya mulai mengetik dan akan secara otomatis mencari untuk pengguna yang ada di server, atau Anda dapat mengetik dalam alamat XMPP pengguna eksternal. -
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Untuk tetap terhubung ketika Anda tidak login ke Gibberfish, Anda juga dapat menghubungkan ke server secara langsung menggunakan klien XMPP-kompatibel seperti Adium, Pidgin atau salah satu dari banyak aplikasi mobile. -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
Server obrolan dicapai sebagai Tor "bawang Layanan" pada port 5222. Meminta administrator server Anda Tor alamat. -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
Namun, ketika mengobrol dengan pengguna di luar server Anda, Anda memiliki tidak menjamin privasi kecuali Anda dan kontak Anda menggunakan enkripsi end-to-end plugin seperti "OTR". Kebanyakan klien chat mendukung enkripsi end-to-end, dan memiliki panduan untuk membantu Anda memahami dan mengaktifkannya. -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
Hal ini sulit, tetapi mungkin, untuk data Anda dapat dicegat oleh akal musuh saat di persinggahan. Untuk alasan ini kami tidak merekomendasikan untuk menyinkronkan data tanpa hati-hati mempertimbangkan Model ancaman dan praktik keamanan Anda.