Gibberfish, Inc./Gibberfish User Documentation
-
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
๊ด๋ฆฌ์๋ ๊ด๋ฆฌ์ ์ค๋ช ์๋ฅผ ์์งํด์ผ ํฉ๋๋ค. -
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
Finally, we recommend subscribing to the Gibberfish Blog in the News app to keep up to date on important announcements and our canary statement.
๋ง์ง๋ง์ผ๋ก, ๋ด์ค ์ฑ์์ Gibberfish ๋ธ๋ก๊ทธ๋ฅผ ๊ตฌ๋ ํ์ฌ ์ค์ํ ๊ณต์ง ์ฌํญ์ ๋ณด๊ฑฐ๋ ์นด๋๋ฆฌ์ ์๋ฆฌ์ ๊ท๊ธฐ์ธ์ด์๊ธธ ์ถ์ฒ๋๋ฆฝ๋๋ค. -
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
We rely on donations to survive. If you can afford it, please consider making a charitable contribution of any amount at https://gibberfish.org/donate. We will appreciate it immensely. Thanks!
์ฌ๋ฌ๋ถ์ ๊ธฐ๋ถ๋ก ์ ํฌ๊ฐ ๊ฐ๋ฐ์ ํ ์ ์์ต๋๋ค. ์ก์์ ๊ด๊ณ์์ด ๋์์ ์ฃผ๊ณ ์ถ์ผ์๋ค๋ฉด https://gibberfish.org/donate์์ ์์ ๊ธฐ์ฌ๋ฅผ ํด๋ณด์ฌ์ด ์ด๋จ๊น์. ์ ํฌ๋ ๋๋จํ ๊ฐ์ฌํ ์๊ฐํ๊ฒ ์ต๋๋ค. ๊ณ ๋ง์ต๋๋ค! -
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
For security reasons, we only respond to requests from your registered Administrator. If you have service-related questions, please ask your administrator.
๋ณด์์์ ์ด์ ๋ก ์ ํฌ๋ ๊ทํ์ ๋ฑ๋ก๋ ๊ด๋ฆฌ์์ ์์ฒญ์๋ง ์๋ตํฉ๋๋ค. ์๋น์ค ๊ฐ์ ์ฌํญ์ด ์์ผ์๋ค๋ฉด ๊ด๋ฆฌ์์๊ฒ ์์ฒญํด์ฃผ์ญ์์ค. -
PROFILE
PROFILE
ํ๋กํ -
If this is your first time logging in, you should take a few minutes to fill out your profile, and while youโre there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
If this is your first time logging in, you should take a few minutes to fill out your profile, and while youโre there change your passphrase! Click on the colored circle in the upper right corner and choose Personal to edit your profile.
์ฒ์์ผ๋ก ๋ก๊ทธ์ธํ๊ณ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ฐ๊พธ๋ ๋์ ๋ช ๋ถ ์๊ฐ์ ๋ด์ ์ ํ๋กํ ๋ด์ฉ์ ์ฑ์์ฃผ์ญ์์ค. ์ค๋ฅธ์ชฝ ์๋จ ์ฝ๋์ ์์ด ์น ํด์ง ๋๊ทธ๋ผ๋ฏธ๋ฅผ ํด๋ฆญํ์ฌ ๊ฐ์ธ์ ๋ณด ๋์ ํ๋กํ ๋ฐ๊พธ๊ธฐ๋ฅผ ์ ํํด์ฃผ์ญ์์ค. -
PASSPHRASES
PASSPHRASES
์ํธ๋ฌธ๊ตฌ -
TWO-FACTOR AUTHENTICATION
TWO-FACTOR AUTHENTICATION
2๋จ๊ณ ์ธ์ฆ -
Once youโve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (โ2FAโ). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
Once youโve changed your passphrase, we also strongly encourage you to enable Two-Factor authentication (โ2FAโ). This involves installing an app on your mobile device that generates a unique 6-digit code you must enter each time you log in. For someone to hack your account, they would need to know your passphrase and physically possess your phone. This combination keeps you more secure. Because Gibberfish is part of the Nextcloud ecosystem, you can use the Nextcloud 2FA app. This app supports FreeOTP, which can be downloaded in the app store for Android and iOS devices.
์ฐ์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ณ๊ฒฝํ์ จ์ผ๋ฉด 2๋จ๊ณ ์ธ์ฆ(2FA)์ ํ์ฑํํ์๊ธฐ๋ฅผ ์ ๊ทน ์ถ์ฒ๋๋ฆฝ๋๋ค. ์ด๋ ๊ธฐ๊ธฐ์ ์ฑ์ ์ค์นํ์ฌ 6์๋ฆฌ์ ๊ณ ์ ํ ์ฝ๋๋ฅผ ์์ฑํ๋๋ฐ ๋ก๊ทธ์ธํ ๋๋ง๋ค ๋ฐ๋์ ์ ๋ ฅํด์ผ ํฉ๋๋ค. ๋๊ตฐ๊ฐ ๊ณ์ ์ ํดํนํ๋ค๋ฉด ์ํธ๋ฌธ๊ตฌ๋ฅผ ์์์ผ ํ ๋ฟ๋ง ์๋๋ผ ์ค๋งํธํฐ๊น์ง ๋บ์ด์ผ ํฉ๋๋ค. ์ด์ค ์ ๊ธ์ผ๋ก ๋ณด์์ ๋ฌธ์ ์์ต๋๋ค. Gibberfish๋ Nextcloud ์์คํ ์ ์ผ๋ถ์ด๊ธฐ์ Nextcloud 2๋จ๊ณ ์ธ์ฆ ์ฑ์ ์ฌ์ฉํ ์ ์์ต๋๋ค. ์ด ์ ํ๋ฆฌ์ผ์ด์ ์ FreeOTP๋ฅผ ์ง์ํ๊ณ Android ๋ iOS ๊ธฐ๊ธฐ ์ฑ ์คํ ์ด์ ๋ค์ด๋ก๋ํ ์ ์์ต๋๋ค. -
KEY VAULTS
KEY VAULTS
์ํธํค ๋ณด๊ด -
If youโre not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
If youโre not already in the habit of doing so, it would be a good idea to store your passphrases in a key vault like KeePass. Key vaults make it easy to securely remember all your passphrases. You will need to lock your key vault itself with a Diceware generated passphrase. In addition, we strongly recommend you enable full-disk encryption on the device storing your key vault.
ํค๋ฅผ ๋ณด๊ดํ๋ ์ต๊ด์ด ์๋ค๋ฉด KeePass ๊ฐ์ ํค ๋ณด๊ด์์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ์ ์ฅํ๋ ๊ฒ๋ ์ข์ ๋ฐฉ๋ฒ์ ๋๋ค. ํค๋ณด๊ด์๋ก ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ชจ๋ ์์ ํ๊ฒ ๋ ์ฌ๋ฆฌ๊ธฐ ์ฝ์ต๋๋ค. ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ง๋๋ Diceware๋ก ํค ๋ณด๊ด์์ ์ ๊ถ์ผ ํ ๊ฒ์ ๋๋ค. ๋ํ ํค ๋ณด๊ด์๋ฅผ ์ ์ฅํ ๊ธฐ๊ธฐ ์์ ๋ชจ๋ ๋์คํฌ ์ํธํ๋ฅผ ํ์ฑํํ๋ ๊ฒ์ ๊ฐ๋ ฅํ๊ฒ ์ถ์ฒํฉ๋๋ค. -
DIGITAL HYGIENE
DIGITAL HYGIENE
๋ณด์ ์ต๊ดํ -
Good Digital Hygiene is the consistent use of robust security practices.
Good Digital Hygiene is the consistent use of robust security practices.
๋ณด์์ ์ต๊ดํํ์ฌ ๊ฐ๋ ฅํ ๋ณด์ ํ๋์ ์ง์ํฉ์๋ค. -
THREATS
THREATS
์ ์ฌ์ํ -
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
์ํ์ ๋ฏธ๋ฆฌ ์ธ์งํ๋ฉด ์ ์ฉํ ๋ณด์ ์ ๋ต์ ์ธ์ฐ๋ ์ฒซ๊ฑธ์์ด ๋ ๊ฒ์ ๋๋ค. ๊ทธ ๋ชฉํ๋ก ์ ์ฌ ์ํ๊ตฐ์ ๋ง์ ๊ธฐ์ ์ ํ๋ณดํด์ผ ํฉ๋๋ค. ์ด๋ก์จ ๋ณด์ ์ ์ฐจ๋ฅผ ๊ฐ์ํํ์ฌ ํ์ฉํ ์ ์์ต๋๋ค. ๊ด๋ฆฌ์๊ฐ ์ด๋ฏธ ๊ทํ๋ ๊ทํ์ ๋จ์ฒด๊ฐ ๊ธฐ๋ํ๋ ์ํ ๋ชจ๋ธ๋ง์ ์ค๊ณํ์ ์ง๋ ๋ชจ๋ฆ ๋๋ค. ๊ด๋ฆฌ์์๊ฒ ์ฐ๋ฝํ์ฌ ๋ฌธ์ํ์๊ธธ ๋ฐ๋๋๋ค. -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
๊ธฐ์กด ํต์ ์ ๋์ฒดํ๊ธธ ๊ถ์ฅํฉ๋๋ค -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
Gibberfish๋ฅผ ๊ธฐ์กด ๊ณ์ ์ ์ถ๊ฐํ๊ณ ์จ๋ผ์ธ ํ๋ ์๋น์ค๋ฅผ ์ถ๊ฐํ ์ฌ์ฉ์๊ฐ ์๋ค๊ณ ์์ํฉ๋๋ค. ์๋ง ๊ธฐ์กด ๊ณ์ ๊ณผ ์๋น์ค๋ ์์ ํ์ง ์์ ๊ฒ์ ๋๋ค. Gibberfish ์๋ฒ๋ ์ ์ฅ๋ ๋ด์ฉ ํน์ ๊ด๋ จ๋ ํ๋์ ์ํด ์๋ก์ด ๊ณ์ ์ ์ฌ์ฉํ์๊ธธ ์ถ์ฒ๋๋ฆฝ๋๋ค. -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
๋๋๋ก ๋ค์ ๋ง๋๋ ๋ฐ ๋ถํธํจ์ด๋ ๋ถ์ ์ ํจ์ ๋๋ผ๋ ์ฌ์ฉ์๊ฐ ์๊ธฐ๋ ํฉ๋๋ค. ์ด๋ฌํ ๊ฒฝ์ฐ์ ์ฌ์ฉ์์ ํ๋์ ์ํ ๊ณ์ ์ด๋ ์๋น์ค๋ฅผ ๋ค์ ๋ณดํธํ๊ธฐ์ํด ์ผ์ ๊ธฐ๊ฐ ๊ฑธ๋ฆฌ๋ ๊ธฐ๋ค๋ ค ์ฃผ์ญ์์ค. ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ณ๊ฒฝํ์ฌ ๊ถํ ์์ด ๋ชฐ๋ ์ ๊ทผํ๋ ์ฌ์ฉ์๋ฅผ ๊ฒฉ๋ฆฌํ์ญ์์ค. ๊ฐ๋ฅํ๋ค๋ฉด 2๋จ๊ณ ์ธ์ฆ์ ์ถ์ฒํฉ๋๋ค. ์ค๋งํธํฐ์ ํฌํจํ ๋ชจ๋ ๊ธฐ๊ธฐ์ ์ํํธ์จ์ด ์ ๋ฐ์ดํธ๋ฅผ ํ๋์ง ํ์ธํ๊ณ ์ค์นํฉ๋๋ค. -
TOR
TOR
ํ ๋ฅด -
VIDEO CALLS
VIDEO CALLS
์์ ํตํ