Gibberfish, Inc./Gibberfish User Documentation
-
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
臨機応変な敵がデータ送信中にあなたのデータを傍受することは、困難ではありますが可能です。そのため、脅威モデル、セキリュティ対策の慎重な考慮なしでのデータ同期は推奨しません。 -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
管理者自身も、管理マニュアルをよく把握しているべきです。 -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
最後に、私たちからの最新の重要なお知らせとカナリア・リリースを常に把握するために、News App上でのGibberfishのブログ購読を推奨させていただきます。 -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
私たちの存続はあなたの寄付に懸かっています。もし余裕があれば、https://gibberfish.org/donate への慈善寄付をご検討のほど宜しくお願い申し上げます。一同誠に感謝いたします。ご協力ありがとうございます! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
セキュリティ上の理由から、私たちは登録管理者からのリクエストのみに応答します。サービス関連の質問がある場合は、管理者にお問い合わせください。 -
PROFILE
PROFILE
プロフィール -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while you’re there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
もし今回が一番最初のログインである場合には、すぐにプロフィールを記入し、パスフレーズの変更をしましょう!右上隅の色のついた丸のボタンをクリックし、「パーソナル」の編集を選択します。 -
PASSPHRASES
PASSPHRASES
パスフレーズ -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
2要素認証 -
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once you’ve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (“2FA”). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
パスフレーズを変更したら、2 要素認証 (「2FA」) を有効にすることを強く推奨します。ログイン時に毎回入力する必要がある6桁のコードを生成する、モバイルデバイスのアプリケーションをインストールする際に使用されます。あなたのアカウントをハックする者にとっては、パスフレーズに加え正に物理的にあなたの携帯を所有している必要があります。この組み合わせはあなたをより安全に保ちます。GibberfishがNextcloudのエコシステムの一部であるために、Nextcloud 2FAアプリケーションが使用可能です。このアプリは、FreeOTP をサポートしていて、Android と iOS デバイスのためのApp Storeにてダウンロード可能です。 -
KEY VAULTS
KEY VAULTS
KEY VALUTS -
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If you’re not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
パスフレーズを保存するための習慣がまだないのであれば、パスフレーズをKeePassのようなKey vaultに保管しておくのは良いアイデアです。Key vaultsのお陰で、全てのキーを記憶するのが安心かつ簡単になります。パスフレーズを生成したDicewareによってKey vault自身をロックしておく必要があります。加えて、あなたのkey vaultを管理しているデバイスにフルディスク暗号化を有効にしておくことを強く推奨します。 -
DIGITAL HYGIENE
DIGITAL HYGIENE
デジタル・ハイジーン:デジタルの衛生管理 -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
良いデジタルの衛生とは、一貫した頑丈なセキュリティの実施です。 -
THREATS
THREATS
脅威 -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
あなたとあなたのグループが遭遇する脅威を理解することは、有用なセキュリティ戦略の確立の重要なステップです。目標は、あなたの潜在的な敵から保護するための必要最小限のテクニックのみを使用することです。これが、セキュリティ体制があなたに使用を中止させるほどの負担になることを阻止します。あなたの管理者は予想されるセキュリティへの挑戦を説明する脅威モデルを既に作成しているかもしれません。不明な場合は、彼らに連絡して問い合わせてください。 -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
既存の通信 -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
おそらくあなたはGibberfishを様々な既存のアカウントやオンライン上のアクティビティに関連したサービスに追加しようとすることでしょう。これらの古いアカウントとサービスは危険に晒されています。Gibberfishサーバー、そこに格納されているコンテンツ、あるいは関連したアクティビティ等、どのようなアクティビティに対しても新しいアカウントの使用を推奨します。 -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
私たちは、これが全てのユーザーにとって必ずしも利便性があり適切なものではないと認識しています。この場合には、プライベートなアクティビティで使用しようとしている全てのアカウントやサービスの安全を再確保する時間をとってください。あなたに関する知識なくアクセスを得た、権利を有していないユーザーを締め出すためにパスフレーズを変更してください。どこでも可能な限り、2要素認証を有効にしてください。あなたの携帯電話を含むあなたのすべてのデバイスのソフトウェア更新プログラムを確認し、それらをインストールしてください。 -
TOR
TOR
TOR