Gibberfish, Inc./Gibberfish User Documentation
-
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
Understanding the threats you and your group will encounter is an important step in establishing a useful security strategy. The goal is to use only the techniques necessary to protect against your likely adversaries. This will prevent your security regime from becoming so burdensome that you stop using it. Your administrator may have already created a Threat Model describing the security challenges you and your group may expect. If you are unsure, please contact them and ask.
์ํ์ ๋ฏธ๋ฆฌ ์ธ์งํ๋ฉด ์ ์ฉํ ๋ณด์ ์ ๋ต์ ์ธ์ฐ๋ ์ฒซ๊ฑธ์์ด ๋ ๊ฒ์ ๋๋ค. ๊ทธ ๋ชฉํ๋ก ์ ์ฌ ์ํ๊ตฐ์ ๋ง์ ๊ธฐ์ ์ ํ๋ณดํด์ผ ํฉ๋๋ค. ์ด๋ก์จ ๋ณด์ ์ ์ฐจ๋ฅผ ๊ฐ์ํํ์ฌ ํ์ฉํ ์ ์์ต๋๋ค. ๊ด๋ฆฌ์๊ฐ ์ด๋ฏธ ๊ทํ๋ ๊ทํ์ ๋จ์ฒด๊ฐ ๊ธฐ๋ํ๋ ์ํ ๋ชจ๋ธ๋ง์ ์ค๊ณํ์ ์ง๋ ๋ชจ๋ฆ ๋๋ค. ๊ด๋ฆฌ์์๊ฒ ์ฐ๋ฝํ์ฌ ๋ฌธ์ํ์๊ธธ ๋ฐ๋๋๋ค. -
EXISTING COMMUNICATIONS
EXISTING COMMUNICATIONS
๊ธฐ์กด ํต์ ์ ๋์ฒดํ๊ธธ ๊ถ์ฅํฉ๋๋ค -
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it.
Gibberfish๋ฅผ ๊ธฐ์กด ๊ณ์ ์ ์ถ๊ฐํ๊ณ ์จ๋ผ์ธ ํ๋ ์๋น์ค๋ฅผ ์ถ๊ฐํ ์ฌ์ฉ์๊ฐ ์๋ค๊ณ ์์ํฉ๋๋ค. ์๋ง ๊ธฐ์กด ๊ณ์ ๊ณผ ์๋น์ค๋ ์์ ํ์ง ์์ ๊ฒ์ ๋๋ค. Gibberfish ์๋ฒ๋ ์ ์ฅ๋ ๋ด์ฉ ํน์ ๊ด๋ จ๋ ํ๋์ ์ํด ์๋ก์ด ๊ณ์ ์ ์ฌ์ฉํ์๊ธธ ์ถ์ฒ๋๋ฆฝ๋๋ค. -
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them.
๋๋๋ก ๋ค์ ๋ง๋๋ ๋ฐ ๋ถํธํจ์ด๋ ๋ถ์ ์ ํจ์ ๋๋ผ๋ ์ฌ์ฉ์๊ฐ ์๊ธฐ๋ ํฉ๋๋ค. ์ด๋ฌํ ๊ฒฝ์ฐ์ ์ฌ์ฉ์์ ํ๋์ ์ํ ๊ณ์ ์ด๋ ์๋น์ค๋ฅผ ๋ค์ ๋ณดํธํ๊ธฐ์ํด ์ผ์ ๊ธฐ๊ฐ ๊ฑธ๋ฆฌ๋ ๊ธฐ๋ค๋ ค ์ฃผ์ญ์์ค. ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ณ๊ฒฝํ์ฌ ๊ถํ ์์ด ๋ชฐ๋ ์ ๊ทผํ๋ ์ฌ์ฉ์๋ฅผ ๊ฒฉ๋ฆฌํ์ญ์์ค. ๊ฐ๋ฅํ๋ค๋ฉด 2๋จ๊ณ ์ธ์ฆ์ ์ถ์ฒํฉ๋๋ค. ์ค๋งํธํฐ์ ํฌํจํ ๋ชจ๋ ๊ธฐ๊ธฐ์ ์ํํธ์จ์ด ์ ๋ฐ์ดํธ๋ฅผ ํ๋์ง ํ์ธํ๊ณ ์ค์นํฉ๋๋ค. -
TOR
TOR
ํ ๋ฅด -
VIDEO CALLS
VIDEO CALLS
์์ ํตํ -
The Nextcloud โTalkโ app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the โNextcloud Talkโ mobile app, which is available from iTunes, Google Play, and F-Droid.
The Nextcloud โTalkโ app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the โNextcloud Talkโ mobile app, which is available from iTunes, Google Play, and F-Droid.
Nextcloud "Talk" ์ฑ์ผ๋ก ์น๋ธ๋ผ์ฐ์ ์ ์์ ํตํ๋ฅผ ๊ฑธ๊ฑฐ๋ ์ฐธ์ฌํ ์ ์์ต๋๋ค. ๋ชจ๋ฐ์ผ ๊ธฐ๊ธฐ์ ์ต์ ํ๋ฅผ ์ํ์ฌ iTunes๋ Google Play ํน์ F-Droid์์ "Nextcloud Talk" ๋ชจ๋ฐ์ผ ์ฑ์ ์ค์น ํ ์ฌ์ฉํ์๊ธธ ์ถ์ฒ๋๋ฆฝ๋๋ค. -
CHAT
CHAT
์ฑํ -
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is <your username>@<your gibberfish server>. For example,
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is
<your username>
@<your gibberfish server>
. For example,์ฑํ ์์คํ ์ ํ์ค XMPP ํ๋กํ ์ฝ์ ์ฌ์ฉํ์ฌ Gibberfish ์ฌ์ฉ์๋ฟ๋ง ์๋๋ผ XMPP ์๋ฒ๋ฅผ ์ฌ์ฉํ๋ ๋๊ตฌ๋ผ๋ ์ฐ๋ฝํ ์ ์์ต๋๋ค. XMPP ์ฃผ์์ ์๋<your username>
@<your gibberfish server>
์ ๋๋ค. -
FURTHER READING
FURTHER READING
๋ ์ฝ๊ธฐ -
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
ํต์ฌ ๊ธฐ๋ฅ์ ๋ํด ํ๋ถํ ์ค๋ช ์ ์ํ์ ๋ค๋ฉด Nextcloud ์ฌ์ฉ ์ค๋ช ์๋ฅผ ์ฐธ์กฐํ์๊ธธ ๋ฐ๋๋๋ค. ์์น๋ Gibberfish home ํด๋์ ์์ต๋๋ค. -
FINAL NOTES
FINAL NOTES
์ค๋ช ์ ๋ง๋ฌด๋ฆฌํ๋ฉฐ... -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
Gibberfish๋ฅผ ์์ ๋กญ๊ฒ ์ฌ์ฉํ์๊ธธ ๋ฐ๋๋๋ค. ๋ค์ํ ์คํ์์ค ํ๋ก์ ํธ๋ฅผ ๊ฐ์ ํ์ฌ ์ฐ๋ฆฌ์ ์๋น์ค๋ก ๋ฐ๊พธ์ด ๋ง์ ๋ ๋ฆฝ์ ์ธ ์ฐธ์ฌ์๋ฅผ ํ๋ณดํ๊ณ ๋ถ๋จํ ๋ ธ๋ ฅ์ ๊ฒฐ๊ณผ๋ก ๋ณด์์ ๊พํ์ฌ ์ฌ์ฉ์ ํธ์๋ฅผ ์ํ ํ๋ซํผ์ ๋ง๋ค์์ต๋๋ค. Nextcloud์ ์ฌ์ฉ์๋ค ๋์ ํ๋ซํผ์ ๋ง๋ค๊ฒ ๋์ด ๊ฐ์ฌ์ ๋ง์์ ์ ํฉ๋๋ค. -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
๋ฐ์คํฌํฑ ๋ฐ ๋ชจ๋ฐ์ผ ํด๋ผ์ด์ธํธ -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish๋ Nextcloud ๋ฐ์คํฌํฑ ๋ฐ ๋ชจ๋ฐ์ผ ํด๋ผ์ด์ธํธ์ ์ํธ์์ฉํ์ฌ ์๋ฒ์์ ํ์ผ ๋๊ธฐํ๋ฅผ ์๋์ผ๋ก ์ผญ๋๋ค. ๋ณด์ ์กฐ์น๋ฅผ ์ํด ์ด ๊ธฐ๋ฅ์ ๊ธฐ๋ณธ์ ์ผ๋ก ๋นํ์ฑํ์ต๋๋ค. ์ด ํด๋ผ์ด์ธํธ๋ฅผ ์ฌ์ฉํ์๋ ค๋ฉด ๊ด๋ฆฌ์์๊ฒ ์์ฒญํ์ฌ ํ์ผ ์ ๊ทผ ๊ท์น์ ๋ฐ๊พธ์ญ์์ค. ๋ก์ปฌ ํ์ผ์ ๋๊ธฐํํ์๋ ค๋ฉด ๊ธฐ๊ธฐ์ ๋ชจ๋ ๋์คํฌ์ ์ํธํ๋ฅผ ์ ์ฉํ์ ์ผ ๊ฐ๋ฅํฉ๋๋ค. ๊ธฐ๊ธฐ๋ฅผ ๋ถ์ค, ๋๋, ํดํน๋นํ์ ์์ ํ์ผ์ ๋ณดํธํ๋ ค ํจ์ ๋๋ค. -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
๋งํ์์ ๊ธฐ๋ณธ ๊ฐ๋ ์ ์ค๋ช ํ๋ ๋์ Diceware ๋ฉ์๋๋ฅผ ์ฌ์ฉํ์ฌ ์ต์ ์ ๋ณด์์ ํ์ํ 5๊ฐ ๋จ์ด ์ด์์ ์ํธ๋ฅผ ๊ถ์ฅ๋๋ฆฝ๋๋ค. -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Tor๋ ๊ทํ์ ์จ๋ผ์ธ ๊ฐ์ธ ์ ๋ณด๋ฅผ ๋ณดํธํ๊ธฐ ์ํ ์ต์ ์ ๋ฐฉ๋ฒ์ ๋๋ค. ๊ทธ๋ ๊ธฐ์ ์ฌ์ฉ์์ ์๋ฒ๋ฅผ ๋ฐฐํฌํ๊ธฐ์ ์์ Tor๋ฅผ ์ฌ์ฉํฉ๋๋ค. Onion ๋ผ์ฐํฐ ํ๋ก์ ํธ๊ฐ ํต์ฌ์ธ Tor๋ ์ ์ ์ ์จ๋ผ์ธ ํ๋ ๋ณดํธ๋ฅผ ์ํ ๋ค์ํ ๋ฌด๋ฃ ์๋น์ค๋ฅผ ๋ด๊ฒ ๋์์ต๋๋ค. Tor ๋ธ๋ผ์ฐ์ ๋ฅผ ์ฌ์ฉํ์ฌ ์จ๋ผ์ธ ์ถ์ฒ๋ฅผ ์จ๊ธฐ๋๋ฐ ๋์์ด ๋๊ธฐ๋ฅผ ๋ฐ๋๋๋ค. -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
์ค๋ช ์์ ์ง์๋ฌธ๋ต์์ Tor๊ฐ ๋คํธ์ํฌ ํ๋์ ์ ๊ณตํ๋ ์ ์ ์ฃผ์ ๊น๊ฒ ์ฝ์ด๋ณด์๊ธธ ๋ฐ๋๋๋ค. ๊ฐ์ธ ์ ๋ณด ์ ์ง๋ฅผ ์ํ ์ค์ํ ์ ๋ณด๋ฅผ ์๊ธฐ์ํต๋๋ค. ์ค์ํ ์ ์ Tor ๋ธ๋ผ์ฐ์ ๋ฅผ ์ฌ์ฉํ๋ค๊ณ ํด์ ๊ทํ์ ๋ชจ๋ ์จ๋ผ์ธ ํ๋์ด ์ต๋ช ์ด ๋๋ค๋ ๋ณด์ฅ์ ์์ต๋๋ค. -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
๋ณด์์ ํ๋ํ๊ณ ์ถ์ ๋ Tor๊ฐ ๋ฌด๋ฃ ํด๋ก์ ๋์์ด ๋ ๊ฒ์ ๋๋ค. ์ํ ๋ชจ๋ธ๋ง์ ์์ ๋ธ๋ฆฌ์ง ์๋ฒ์ Tails๋ฅผ ์ดํ ํ์์ฑ์ ๋๋ผ์ค ๊ฒ๋๋ค. ๋ธ๋ฆฌ์ง ์๋ฒ๋ ์ ๊ทผ์ ์ ํํ ๊ตญ๊ฐ์ ์ฌ์ฉ์๊ฐ Tor์ ์ ๊ทผํ๋๋ก ๋์ต๋๋ค. Tails๋ ๋ฆฌ๋ ์ค ์ด์์ฒด์ ์ด๋ฉฐ ์ฃผ๋ก ์ฌ์ฉ๋๋ ๋ชจ๋ ํ๋ก๊ทธ๋จ์ด USB์ ๋ด๊ฒจ ๋ง๋ฌด๋ฆฌ๋ฉ๋๋ค. ๊ทธ๋ฆฌํ์ฌ ์ฐ์ฐ์ ๋ณด์์ ๋งค์ฐ ๊ฐ๋ ฅํด์ง๋๋ค. -
Discover these and other Tor services at:
Discover these and other Tor services at:
์ด๋ค๊ณผ ๋ค๋ฅธ ํ ๋ฅด ์๋น์ค์์ ๋ฐ๊ฒฌ: