Gibberfish, Inc./Gibberfish User Documentation
-
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
์ฐ์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ์ ํ์ จ์ผ๋ฉด KeePass์ ๊ฐ์ ์์ ํ ์ํธ ๊ด๋ฆฌ์์๊ฒ ์ ์ฅํ๊ณ ๋ณต์ฌ๋ณธ์ ๋ฐฑ์ ํ์ญ์์ค. ์๋ฒ๊ฐ ์ฌ๋ถํ ๋๋ฉด ๋ก๊ทธ์ธํ ๋ ํ์ผ์ ์ ๊ธํด์ ํ๊ธฐ ์ํด ์ํธ๋ฌธ๊ตฌ๋ฅผ ์ฌ์ ๋ ฅํด์ผ ํฉ๋๋ค. ์ํธ๋ฌธ๊ตฌ๋ฅผ ์์ด๋ฒ๋ฆฌ๋ฉด ๋ฐ์ดํฐ์ ์ ๊ทผํ์ง ๋ชปํฉ๋๋ค. ์ ํฌ์กฐ์ฐจ ์ฌ์ค์ ํ๊ฑฐ๋ ๋ณต๊ตฌํด๋๋ฆฌ์ง ๋ชปํฉ๋๋ค. ์งํํ๊ธฐ ์ ์ ์ ์ ํ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ง๋๋ ์๊ฐ์ ๊ฐ๊ธฐ ๋ฐ๋๋๋ค. -
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. ๊ทํ์ ๊ฐ์ธ ์ ๋ณด๋ฅผ ๋ณดํธํ๊ธฐ ์ํด ๊ด๋ฆฌ ํฌํธ์ ์ต๋ช ์ Tor ๋คํธ์ํฌ๋ฅผ ํตํด์๋ง ์ ๊ทผํฉ๋๋ค. Tor์ ์ ๊ทผํ๊ธฐ ์ํด Tor ๋ธ๋ผ์ฐ์ ๋ฅผ ์ค์นํ์ ์ผ ํ๋๋ฐ ์ด๋ Firefox๋ฅผ ๊ธฐ๋ฐํ ์์ ๋ ๋ฒ์ ์ ๋๋ค. ๋ค์ด๋ก๋๋ ์ฌ๊ธฐ์ ๊ฐ๋ฅํฉ๋๋ค. -
2. Open the Tor browser and type the following into the address bar:
2. Open the Tor browser and type the following into the address bar:
2. Tor ๋ธ๋ผ์ฐ์ ๋ฅผ ์ด๊ณ ์ฃผ์ ํ์์ค์ ๋ค์์ ์ ๋ ฅํ์ญ์์ค. -
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
๋ณด์๋ค์ํผ ์ด url์ ๋ณด์ ์น ๋ธ๋ผ์ฐ์ง์ ํ์ค์ธ HTTPS์ ์ฌ์ฉํ์ง ์์ต๋๋ค. Tor๋ฅผ ํตํด ํธ๋ํฝ์ด ์ฌ๋ฌ๊ฒน์ ์ํธํ๋ฅผ ํตํด ๋ณดํธ๋์ด HTTPS๊ฐ ํ์ํ์ง ์๊ธฐ ๋๋ฌธ์ ๋๋ค. -
3. Log in to the management portal:
3. Log in to the management portal:
3. ๊ด๋ฆฌ ํฌํธ์ ๋ก๊ทธ์ธํฉ๋๋ค. -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staple์ฌ์ฉ์ ์ด๋ฆ: portal_admin
์ํธ: correct horse battery staple -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting โEnterโ. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting โEnterโ. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. ๋ค์ ํ๋ฉด์ผ๋ก ๋์ด๊ฐ๋ฉด ๋ฐ์ดํฐ๋ฅผ ๋ณดํธํ๊ธฐ ์ํด ๋ฏธ๋ฆฌ ์ ํํด๋ ์ํธ๋ฌธ๊ตฌ๋ฅผ ์ ๋ ฅํ์ญ์์ค. 'Enter'๋ฅผ ์ ๋ ฅํ๊ธฐ ์ ์ ๋ค์ ํ๋ฒ ์ํธ๋ฅผ ํ์ธํ์ญ์์ค. ์ด์ ์ํธํ ๊ณผ์ ์ด ์์๋๊ณ ์๋ก์ด ํด๋ผ์ฐ๋๋ฅผ ์ค์นํฉ๋๋ค. ์๋ฃ๋ง ๋๋ค๋ฉด ์ด ๊ธ์ ์๋จ ๋์ด๋ ์ฃผ์์ ํด๋ผ์ฐ๋์ ์ ๊ทผํ๊ธฐ ์ํ ์ํธ์ ์ฌ์ฉ์์ด๋ฆ์ด ํ์๋ ๊ฒ์ ๋๋ค. ์ด ์๊ฐ๋ถํฐ Tor ๋ธ๋ผ์ฐ์ ๋ฅผ ๊ณ์ ์ฌ์ฉํ๊ฑฐ๋ ์ผ๋ฐ ๋ธ๋ผ์ฐ์ ๋ก ๋ฐ๊ฟ ์ ์์ต๋๋ค. ๋ก๊ทธ์ธ ํ์๋ ์ํธ๋ฅผ ๋ฐ๊พธ์๊ธธ ๋ฐ๋๋๋ค. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
๋ถํธํ ์ ์ด ์์ผ์๋ฉด info@gibberfish.org์ ๋ฌธ์ํ์๊ธฐ ๋ฐ๋๋๋ค. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH๋ฅผ ์์ํ๊ธฐ์ ์์... -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Gibberfish์ ์ค์ ๊ฒ์ ํ์ํฉ๋๋ค! ๊ทํ์ ๊ฐ์ธ์ ๋ณด๋ฅผ ๋ณดํธํ๋ ๊ฒ์ด ์ ํฌ์ ์๋ฌด์ด์ง๋ง ์ฌ๋ฌ๋ถ๋ ์ฐธ์ฌํด์ฃผ์๊ธฐ๋ฅผ ๋ฐ๋๋๋ค. ์์ํ๊ธฐ ์์ ์๋์ ๋ช๊ฐ์ง ์ ์์ ํ๋ ค ํฉ๋๋ค. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
ํ ์น์ฌ์ดํธ์ ๋ค๋ฅธ Gibberfish ์ํธ๋ฌธ๊ตฌ๋ฅผ ์ฌ์ฉํ์ฌ ๋ก๊ทธ์ธํ์ญ์์ค. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
๋ชจ๋ ์๋น์ค, ๊ณ์ ํน์ ๊ธฐ๊ธฐ์ ํ์ํ ์ ์ผํ 1๊ฐ์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๋ง๋์ญ์์ค. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
์ด ๋ฐฉ๋ฒ์ผ๋ก ํ๋์ ์ํธ๋ฌธ๊ตฌ๋ฅผ ๊ธฐ์ตํ์ฌ ํค ๋ณด๊ด์๋ฅผ ์ ๊ธํด์ ํฉ๋๋ค. -
By โrobustโ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By โrobustโ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
'๊ฐ๋ ฅํ ์ํธ'์ ์๋ฏธ๋ ๊ฒ์ฆ๋ ๋ณด์ ์ ๋ฌธ๊ฐ๋ค์ด ์ธ์ฐ๊ฑฐ๋ ๊ฒ์ฆ๋์๋ค๋ ๋ง์ ๋๋ค. ์ด๋ EFF(Electronic Frontier Foundation), the Guardian ํ๋ก์ ํธ ๊ทธ๋ฆฌ๊ณ Tor ํ๋ก์ ํธ๋ฅผ ํฌํจํ ์ฌ๋ฌ ๋ณด์์ ์ฐจ๋ฅผ ์๋ฏธํฉ๋๋ค. -
We use โconsistentโ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use โconsistentโ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
์ผ์์ ์ธ ๋ณด์ ํ๋์ ์ํด '์ง์์ ์ธ' ์กฐ์น๋ ์์ ์๋๋๋ณด๋ค ๋ชปํ๋ค๋ ์ ์ ์ ํด๋๋ฆฝ๋๋ค. ํํผ๋ฒ์ผ๋ก ์ํ ๋ชจ๋ธ๋ง๊ณผ ๋ณด์ ์ ๋ต์ ์ ์ฉํ๋ฉด ๊ฐ์ธ ํ๋์ ํ ๋๋ง๋ค ์ฌ์ฉํด์ผ ํฉ๋๋ค. -
Every user must understand your groupโs Threat Model and consistently use the same security practices.
Every user must understand your groupโs Threat Model and consistently use the same security practices.
๊ทธ๋ฃน์ ์ํ๋ชจ๋ธ์ ๋ชจ๋ ์ฌ์ฉ์๊ฐ ์ดํดํ์ฌ์ผ ํ๊ณ ๋์ผํ ๋ณด์์ ์ฐจ๋ฅผ ๊ณ์ ๊ฑฐ์ณ์ผํฉ๋๋ค. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
์ํ ๋ชจ๋ธ์ ๊ดํด ๋ ๋ง์ ์ ๋ณด๋ฅผ ์ป๊ณ ์ถ์ผ์๋ค๋ฉด EFF๊ฐ ๋ง๋ ์ ๋ฌธ์๋ฅผ ์ฐธ๊ณ ํ์ญ์์ค. -
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
์ฒ์ ๋ก๊ทธ์ธํ ๋ ํ๋ฉด ์ค๋ฅธ์ชฝ์ ์ฑํ ๋ชฉ๋ก์ด ๋น์ด์์ ๊ฒ์ ๋๋ค. ํ๋จ ๋ฉ๋ด์์ ์ฐ๋ฝ์ฒ๋ฅผ ์ถ๊ฐํ ์ ์์ต๋๋ค. ์ผ๋จ ์ ๋ ฅํ๋ฉด ์๋ฒ์ ๊ธฐ์กด ์ฌ์ฉ์๋ฅผ ์๋๊ฒ์ํ๊ณ ํ์ํ๋ค๋ฉด ์ธ๋ถ ์ฌ์ฉ์์ XMPP ์ฃผ์์ ์ ๋ ฅํ ์ ์์ต๋๋ค. -
To stay connected when youโre not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when youโre not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Gibberfish์ ๋ก๊ทธ์ธ์ด ์๋์ด ์์ ๋ ์ฐ๊ฒฐ์ ์ ์งํ๊ธฐ ์ํด Adium, Pidgin ํน์ ๋ค์ํ ๋ชจ๋ฐ์ผ ์ฑ๊ณผ ๊ฐ์ XMPP ํธํ ํด๋ผ์ด์ธํธ๋ฅผ ์ฌ์ฉํ์ฌ ์๋ฒ์ ์ง์ ์ฐ๊ฒฐํ ์ ์์ต๋๋ค. -
The chat server is also reachable as a Tor โonion serviceโ on port 5222. Ask your administrator for your serverโs Tor address.
The chat server is also reachable as a Tor โonion serviceโ on port 5222. Ask your administrator for your serverโs Tor address.
์ฑํ ์๋ฒ๋ ํฌํธ 5222์์ ํ ๋ฅด์ "Onion ์๋น์ค"๋ก ์ฐ๊ฒฐํ ์ ๋ ์์ต๋๋ค. ๊ด๋ฆฌ์์๊ฒ ๊ทํ์ ์๋ฒ์ ๋ํ ํ ๋ฅด ์ฃผ์๋ฅผ ์์ฒญํ์ญ์์ค.