Gibberfish, Inc./Gibberfish User Documentation
-
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
๋ชจ๋ ์๋น์ค, ๊ณ์ ํน์ ๊ธฐ๊ธฐ์ ํ์ํ ์ ์ผํ 1๊ฐ์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ง๋์ญ์์ค. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
์ด ๋ฐฉ๋ฒ์ผ๋ก ํ๋์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๊ธฐ์ตํ์ฌ ํค ๋ณด๊ด์๋ฅผ ์ ๊ธํด์ ํฉ๋๋ค. -
By โrobustโ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By โrobustโ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
'๊ฐ๋ ฅํ ์ํธ'์ ์๋ฏธ๋ ๊ฒ์ฆ๋ ๋ณด์ ์ ๋ฌธ๊ฐ๋ค์ด ์ธ์ฐ๊ฑฐ๋ ๊ฒ์ฆ๋์๋ค๋ ๋ง์ ๋๋ค. ์ด๋ EFF(Electronic Frontier Foundation), the Guardian ํ๋ก์ ํธ ๊ทธ๋ฆฌ๊ณ Tor ํ๋ก์ ํธ๋ฅผ ํฌํจํ ์ฌ๋ฌ ๋ณด์์ ์ฐจ๋ฅผ ์๋ฏธํฉ๋๋ค. -
We use โconsistentโ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use โconsistentโ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
์ผ์์ ์ธ ๋ณด์ ํ๋์ ์ํด '์ง์์ ์ธ' ์กฐ์น๋ ์์ ์๋๋๋ณด๋ค ๋ชปํ๋ค๋ ์ ์ ์ ํด๋๋ฆฝ๋๋ค. ํํผ๋ฒ์ผ๋ก ์ํ ๋ชจ๋ธ๋ง๊ณผ ๋ณด์ ์ ๋ต์ ์ ์ฉํ๋ฉด ๊ฐ์ธ ํ๋์ ํ ๋๋ง๋ค ์ฌ์ฉํด์ผ ํฉ๋๋ค. -
Every user must understand your groupโs Threat Model and consistently use the same security practices.
Every user must understand your groupโs Threat Model and consistently use the same security practices.
๊ทธ๋ฃน์ ์ํ๋ชจ๋ธ์ ๋ชจ๋ ์ฌ์ฉ์๊ฐ ์ดํดํ์ฌ์ผ ํ๊ณ ๋์ผํ ๋ณด์์ ์ฐจ๋ฅผ ๊ณ์ ๊ฑฐ์ณ์ผํฉ๋๋ค. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
์ํ ๋ชจ๋ธ์ ๊ดํด ๋ ๋ง์ ์ ๋ณด๋ฅผ ์ป๊ณ ์ถ์ผ์๋ค๋ฉด EFF๊ฐ ๋ง๋ ์ ๋ฌธ์๋ฅผ ์ฐธ๊ณ ํ์ญ์์ค. -
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
์ฒ์ ๋ก๊ทธ์ธํ ๋ ํ๋ฉด ์ค๋ฅธ์ชฝ์ ์ฑํ ๋ชฉ๋ก์ด ๋น์ด์์ ๊ฒ์ ๋๋ค. ํ๋จ ๋ฉ๋ด์์ ์ฐ๋ฝ์ฒ๋ฅผ ์ถ๊ฐํ ์ ์์ต๋๋ค. ์ผ๋จ ์ ๋ ฅํ๋ฉด ์๋ฒ์ ๊ธฐ์กด ์ฌ์ฉ์๋ฅผ ์๋๊ฒ์ํ๊ณ ํ์ํ๋ค๋ฉด ์ธ๋ถ ์ฌ์ฉ์์ XMPP ์ฃผ์์ ์ ๋ ฅํ ์ ์์ต๋๋ค. -
To stay connected when youโre not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when youโre not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Gibberfish์ ๋ก๊ทธ์ธ์ด ์๋์ด ์์ ๋ ์ฐ๊ฒฐ์ ์ ์งํ๊ธฐ ์ํด Adium, Pidgin ํน์ ๋ค์ํ ๋ชจ๋ฐ์ผ ์ฑ๊ณผ ๊ฐ์ XMPP ํธํ ํด๋ผ์ด์ธํธ๋ฅผ ์ฌ์ฉํ์ฌ ์๋ฒ์ ์ง์ ์ฐ๊ฒฐํ ์ ์์ต๋๋ค. -
The chat server is also reachable as a Tor โonion serviceโ on port 5222. Ask your administrator for your serverโs Tor address.
The chat server is also reachable as a Tor โonion serviceโ on port 5222. Ask your administrator for your serverโs Tor address.
์ฑํ ์๋ฒ๋ ํฌํธ 5222์์ ํ ๋ฅด์ "Onion ์๋น์ค"๋ก ์ฐ๊ฒฐํ ์ ๋ ์์ต๋๋ค. ๊ด๋ฆฌ์์๊ฒ ๊ทํ์ ์๋ฒ์ ๋ํ ํ ๋ฅด ์ฃผ์๋ฅผ ์์ฒญํ์ญ์์ค. -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as โOTRโ. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as โOTRโ. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
์๋ฒ ์ธ๋ถ ์ฌ์ฉ์์ ์ฑํ ์ "OTR" ๊ฐ์ ์ฌ์ฉ์๊ฐ ์ํธํ ํ๋ฌ๊ทธ์ธ์ ์ฌ์ฉํ์ฌ์ผ ๊ฐ์ธ ์ ๋ณด๊ฐ ๋ณด์ฅ๋ฉ๋๋ค. ๋๋ถ๋ถ์ ์ฑํ ํด๋ผ์ด์ธํธ๋ ์ฌ์ฉ์๊ฐ ์ํธํ๋ฅผ ์ง์ํ๊ณ ๊ฐ์ด๋๊ฐ ์์ด ์ดํดํ์ฌ ํ์ฑํํ๋๋ฐ ๋์์ ์ค ๊ฒ์ ๋๋ค. -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
์ค๋น๊ฐ ์ฒ ์ ํ ์ ์ ๋ฐ์ดํฐ๋ฅผ ์ ์ก ์ค์ ๊ฐ๋ก์ฑ๋ ๊ฒฝ์ฐ๊ฐ ๊ฐํน ์์ต๋๋ค. ์ด๋ฌํ ์ด์ ๋ก ๋ถ์ฃผ์๋ก ๊ทํ์ ์ํ๋ชจ๋ธ์ด๋ ๋ณด์ ํ๋์ ์ฌ์ฉํ์ง ์๋๋ค๋ฉด ๋ฐ์ดํฐ๋ฅผ ๋๊ธฐํํ์ง ๋ง์๊ธธ ๊ถ์ฅํฉ๋๋ค. -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
๊ด๋ฆฌ์๋ ๊ด๋ฆฌ์ ์ค๋ช ์๋ฅผ ์์งํด์ผ ํฉ๋๋ค. -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
๋ง์ง๋ง์ผ๋ก, ๋ด์ค ์ฑ์์ Gibberfish ๋ธ๋ก๊ทธ๋ฅผ ๊ตฌ๋ ํ์ฌ ์ค์ํ ๊ณต์ง ์ฌํญ์ ๋ณด๊ฑฐ๋ ์นด๋๋ฆฌ์ ์๋ฆฌ์ ๊ท๊ธฐ์ธ์ด์๊ธธ ์ถ์ฒ๋๋ฆฝ๋๋ค. -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
์ฌ๋ฌ๋ถ์ ๊ธฐ๋ถ๋ก ์ ํฌ๊ฐ ๊ฐ๋ฐ์ ํ ์ ์์ต๋๋ค. ์ก์์ ๊ด๊ณ์์ด ๋์์ ์ฃผ๊ณ ์ถ์ผ์๋ค๋ฉด https://gibberfish.org/donate์์ ์์ ๊ธฐ์ฌ๋ฅผ ํด๋ณด์ฌ์ด ์ด๋จ๊น์. ์ ํฌ๋ ๋๋จํ ๊ฐ์ฌํ ์๊ฐํ๊ฒ ์ต๋๋ค. ๊ณ ๋ง์ต๋๋ค! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
๋ณด์์์ ์ด์ ๋ก ์ ํฌ๋ ๊ทํ์ ๋ฑ๋ก๋ ๊ด๋ฆฌ์์ ์์ฒญ์๋ง ์๋ตํฉ๋๋ค. ์๋น์ค ๊ฐ์ ์ฌํญ์ด ์์ผ์๋ค๋ฉด ๊ด๋ฆฌ์์๊ฒ ์์ฒญํด์ฃผ์ญ์์ค. -
PROFILE
PROFILE
ํ๋กํ -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while youโre there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while youโre there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
์ฒ์์ผ๋ก ๋ก๊ทธ์ธํ๊ณ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ฐ๊พธ๋ ๋์ ๋ช ๋ถ ์๊ฐ์ ๋ด์ ์ ํ๋กํ ๋ด์ฉ์ ์ฑ์์ฃผ์ญ์์ค. ์ค๋ฅธ์ชฝ ์๋จ ์ฝ๋์ ์์ด ์น ํด์ง ๋๊ทธ๋ผ๋ฏธ๋ฅผ ํด๋ฆญํ์ฌ ๊ฐ์ธ์ ๋ณด ๋์ ํ๋กํ ๋ฐ๊พธ๊ธฐ๋ฅผ ์ ํํด์ฃผ์ญ์์ค. -
PASSPHRASES
PASSPHRASES
์ํธ๋ฌธ๊ตฌ -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
2๋จ๊ณ ์ธ์ฆ -
Once youโve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (โ2FAโ). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once youโve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (โ2FAโ). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
์ฐ์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ณ๊ฒฝํ์ จ์ผ๋ฉด 2๋จ๊ณ ์ธ์ฆ(2FA)์ ํ์ฑํํ์๊ธฐ๋ฅผ ์ ๊ทน ์ถ์ฒ๋๋ฆฝ๋๋ค. ์ด๋ ๊ธฐ๊ธฐ์ ์ฑ์ ์ค์นํ์ฌ 6์๋ฆฌ์ ๊ณ ์ ํ ์ฝ๋๋ฅผ ์์ฑํ๋๋ฐ ๋ก๊ทธ์ธํ ๋๋ง๋ค ๋ฐ๋์ ์ ๋ ฅํด์ผ ํฉ๋๋ค. ๋๊ตฐ๊ฐ ๊ณ์ ์ ํดํนํ๋ค๋ฉด ์ํธ๋ฌธ๊ตฌ๋ฅผ ์์์ผ ํ ๋ฟ๋ง ์๋๋ผ ์ค๋งํธํฐ๊น์ง ๋บ์ด์ผ ํฉ๋๋ค. ์ด์ค ์ ๊ธ์ผ๋ก ๋ณด์์ ๋ฌธ์ ์์ต๋๋ค. Gibberfish๋ Nextcloud ์์คํ ์ ์ผ๋ถ์ด๊ธฐ์ Nextcloud 2๋จ๊ณ ์ธ์ฆ ์ฑ์ ์ฌ์ฉํ ์ ์์ต๋๋ค. ์ด ์ ํ๋ฆฌ์ผ์ด์ ์ FreeOTP๋ฅผ ์ง์ํ๊ณ Android ๋ iOS ๊ธฐ๊ธฐ ์ฑ ์คํ ์ด์ ๋ค์ด๋ก๋ํ ์ ์์ต๋๋ค.