Gibberfish, Inc./Gibberfish User Documentation
-
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Anda mungkin sudah perhatikan bahawa url ini tidak gunakan HTTPS, yang merupakan standard bagi melayari web kami yang selamat. Ini adalah kerana Tor telah melindungi trafik anda dengan pelbagai lapisan penyulitan, membuat HTTPS unneccessary. -
3. Log in to the management portal:
3. Log in to the management portal:
3. log masuk ke portal pengurusan: -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staplenama pengguna: kata laluan portal_admin: Kuda betul bateri ruji -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. pada skrin berikutnya, taip dalam ungkapan laluan penyulitan awda telah memilih untuk melindungi data anda. Sila semak semula ia untuk ketepatan sebelum memukul 'Enter'. Ini akan memulakan proses yang menyulitkan dan memasang awan baru anda. Sebaik sahaja selesai, ia akan memaparkan nama pengguna dan kata laluan yang anda boleh gunakan untuk mencapai awan anda ke alamat yang disenaraikan di atas Surat ini. Anda boleh terus menggunakan pelayar Tor dari sudut ini, atau beralih kepada pelayar yang biasa. Sila tukar kata laluan anda sebaik sahaja anda telah log masuk. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Jika anda menghadapi sebarang masalah, sila hubungi kami di info@gibberfish.org. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
PANDUAN GIBBERFISH -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Selamat datang ke Gibberfish! Tumpuan kami adalah privasi dan Keselamatan anda, tetapi kita perlu anda untuk menjadi peserta yang sama. Berikut adalah beberapa cadangan untuk anda bermula. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Jangan sekali-kali menggunakan frasa laluan untuk Gibberfish log masuk anda yang anda gunakan di mana-mana lagi. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Sentiasa menjana frasa laluan yang unik untuk mana-mana perkhidmatan, akaun atau peranti. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Kaedah ini memastikan anda hanya perlu ingat satu frasa laluan: satu untuk membuka kunci ruang simpan. -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
'Memberangsangkan' ertinya prosedur-prosedur yang telah ditubuhkan atau diperiksa oleh pakar keselamatan yang boleh dipercayai. Ini termasuk, tetapi tidak terhad kepada, Electronic Frontier Foundation (keberkesanan), projek penjaga dan Tor projek. -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Kami menggunakan 'konsisten' untuk menekankan yang berselang seli penggunaan mana-mana amalan keselamatan adalah sama buruk seperti tidak menggunakan salah satu sekali. Sebaik sahaja anda membangunkan model ancaman dan strategi untuk mengalahkan ia, anda mesti menggunakan strategi tersebut setiap kali anda terlibat dalam aktiviti-aktiviti peribadi. -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Setiap pengguna mestilah memahami Model ancaman Kumpulan anda dan secara konsisten menggunakan amalan-amalan keselamatan yang sama. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Untuk maklumat lanjut mengenai ancaman model, sila rujuk kepada buku asas ini sangat baik yang dihasilkan oleh EFF. -
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
When you first log in, your chat roster on the right side of the screen will be empty. From the menu at the bottom you can Add Contact. Just start typing and it will automatically search for existing users on the server, or you can type in the XMPP address of external users.
Apabila anda mula-mula log masuk, anda Jadual sembang di sebelah kanan skrin akan kosong. Dari menu di bahagian bawah, anda boleh menambah orang hubungan. Cuma mulakan menaip dan ia akan secara automatik mencari untuk pengguna sedia ada pada pelayan, atau anda boleh menaip alamat XMPP pengguna luar. -
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
To stay connected when you’re not logged in to Gibberfish, you can also connect to the server directly using an XMPP-compatible client such as Adium, Pidgin, or one of many mobile apps.
Untuk terus berhubung apabila anda tidak log masuk ke Gibberfish, anda juga boleh menyambung ke pelayan secara langsung menggunakan klien XMPP serasi seperti Adium, pijin atau salah satu daripada aplikasi telefon mudah alih yang banyak. -
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
The chat server is also reachable as a Tor “onion service” on port 5222. Ask your administrator for your server’s Tor address.
Pelayan sembang ini juga dicapai sebagai Tor yang "bawang Perkhidmatan" pada port 5222. Minta pentadbir anda untuk pelayan anda Tor alamat. -
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
However, when chatting with users outside your server, you have no guarantee of privacy unless you and your contacts use an end-to-end encryption plugin such as “OTR”. Most chat clients support end-to-end encryption, and have guides to help you understand and enable it.
Walau bagaimanapun, apabila berbual dengan pengguna di luar pelayan anda, anda mempunyai jaminan privasi melainkan anda dan kenalan anda menggunakan plugin penyulitan hujung-ke-hujung yang seperti "OTR". Kebanyakan pelanggan sembang menyokong enskripsi hujung-ke-hujung, dan mempunyai panduan untuk membantu anda memahami dan mendayakannya. -
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
It is difficult, but possible, for your data to be intercepted by resourceful adversaries while in transit. For this reason we do not recommend syncing your data without carefully considering your Threat Model and your security practices.
Memang sukar, tetapi mungkin, bagi data anda boleh dipintas oleh segala akal semasa dalam transit penerbangan. Atas sebab ini kami tidak mengesyorkan menyegerak data anda tanpa berhati-hati mempertimbangkan Model ancaman anda dan amalan-amalan keselamatan. -
Administrators should also familiarize themselves with the Admin Manual.
Administrators should also familiarize themselves with the Admin Manual.
Pentadbir juga perlu membiasakan diri dengan Admin Manual.