Gibberfish, Inc./Gibberfish User Documentation
-
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
初回ログイン時には、画面の右側にあるチャットリストは空になっています。下部メニューから連絡先を追加することができます。入力開始後、自動的にサーバー上の既存のユーザーの検索が開始されます。あるいは、外部ユーザーの XMPP アドレスを入力することも可能です。 -
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Gibberfish 未ログイン時の接続維持のために、Adium、PidginなどのXMPP互換クライアントまたは多くのモバイルアプリを利用して、直接サーバーに接続することも可能です。 -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
チャットサーバーは Tor ポート 5222 の「onionサービス」としてもアクセスできます。Torのアドレスについては管理者に問い合わせてください。 -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
ただし、サーバー外でのチャット時には、あなたとあなたの連絡先が「OTR」のようなエンドツーエンド暗号化プラグインを使用しない限り、プライバシーの保証はありません。ほとんどのチャットクライアントはエンド ツー エンド暗号化をサポートし、あなたがそれを理解し、有効にするためのガイドを有しています。 -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
臨機応変な敵がデータ送信中にあなたのデータを傍受することは、困難ではありますが可能です。そのため、脅威モデル、セキリュティ対策の慎重な考慮なしでのデータ同期は推奨しません。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理者自身も、管理マニュアルをよく把握しているべきです。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最後に、私たちからの最新の重要なお知らせとカナリア・リリースを常に把握するために、News App上でのGibberfishのブログ購読を推奨させていただきます。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
私たちの存続はあなたの寄付に懸かっています。もし余裕があれば、https://gibberfish.org/donate への慈善寄付をご検討のほど宜しくお願い申し上げます。一同誠に感謝いたします。ご協力ありがとうございます! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
セキュリティ上の理由から、私たちは登録管理者からのリクエストのみに応答します。サービス関連の質問がある場合は、管理者にお問い合わせください。 -
PROFILE
PROFILE
プロフィール -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
もし今回が一番最初のログインである場合には、すぐにプロフィールを記入し、パスフレーズの変更をしましょう!右上隅の色のついた丸のボタンをクリックし、「パーソナル」の編集を選択します。 -
PASSPHRASES
PASSPHRASES
パスフレーズ -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
2要素認証 -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
パスフレーズを変更したら、2 要素認証 (「2FA」) を有効にすることを強く推奨します。ログイン時に毎回入力する必要がある6桁のコードを生成する、モバイルデバイスのアプリケーションをインストールする際に使用されます。あなたのアカウントをハックする者にとっては、パスフレーズに加え正に物理的にあなたの携帯を所有している必要があります。この組み合わせはあなたをより安全に保ちます。GibberfishがNextcloudのエコシステムの一部であるために、Nextcloud 2FAアプリケーションが使用可能です。このアプリは、FreeOTP をサポートしていて、Android と iOS デバイスのためのApp Storeにてダウンロード可能です。 -
KEY VAULTS
KEY VAULTS
KEY VALUTS -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
パスフレーズを保存するための習慣がまだないのであれば、パスフレーズをKeePassのようなKey vaultに保管しておくのは良いアイデアです。Key vaultsのお陰で、全てのキーを記憶するのが安心かつ簡単になります。パスフレーズを生成したDicewareによってKey vault自身をロックしておく必要があります。加えて、あなたのkey vaultを管理しているデバイスにフルディスク暗号化を有効にしておくことを強く推奨します。 -
DIGITAL HYGIENE
DIGITAL HYGIENE
デジタル・ハイジーン:デジタルの衛生管理 -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
良いデジタルの衛生とは、一貫した頑丈なセキュリティの実施です。 -
THREATS
THREATS
脅威 -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
あなたとあなたのグループが遭遇する脅威を理解することは、有用なセキュリティ戦略の確立の重要なステップです。目標は、あなたの潜在的な敵から保護するための必要最小限のテクニックのみを使用することです。これが、セキュリティ体制があなたに使用を中止させるほどの負担になることを阻止します。あなたの管理者は予想されるセキュリティへの挑戦を説明する脅威モデルを既に作成しているかもしれません。不明な場合は、彼らに連絡して問い合わせてください。