Gibberfish, Inc./Gibberfish User Documentation
-
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is <your username>@<your gibberfish server>. For example,
The chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is
<your username>
@<your gibberfish server>
. For example,聊天系統使用標準的 XMPP 協定, 它不僅允許您與其他 Gibberfish 使用者聊天, 還可以與使用 XMPP 伺服器的世界上的任何人進行交談。您的 XMPP 位址為<your username>
@<your gibberfish server>
。例如, -
FURTHER READING
FURTHER READING
進一步閱讀 -
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder.
有關核心功能的更廣泛文檔, 請參閱 Nextcloud 使用者手冊, 它也位於您的 Gibberfish 主資料夾中。 -
FINAL NOTES
FINAL NOTES
最後說明 -
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible.
我們希望你喜歡使用 Gibberfish。我們努力使它成為一個安全和便於使用的平臺, 以及許多獨立的貢獻者, 我們已經集成到我們的服務的各種開源專案。特別感謝 Nextcloud 的鄉親們, 沒有他們我們的平臺是不可能的。 -
DESKTOP AND MOBILE CLIENTS
DESKTOP AND MOBILE CLIENTS
桌上型電腦和移動用戶端 -
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked
Gibberfish 與 Nextcloud 桌面和移動用戶端一起工作, 允許您自動將檔與伺服器同步。預設情況下, 此選項被禁用為安全措施。如果希望使用這些用戶端, 請與管理員聯繫以更改檔訪問規則。如果您決定在本地同步檔, 則只有在打開設備的全磁片加密時才這樣做。如果您的設備丟失、被盜或被駭客攻擊, 這將保護您的檔 -
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security.
雖然上面的漫畫解釋的概念, Diceware 方法建議一個密碼長度為5或更多的詞, 以獲得最佳的安全性。 -
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence.
使用 Tor 是保護您的線上隱私的唯一最佳方式。這就是為什麼我們使用 Tor 部署您的 Gibberfish 伺服器。雖然它具體地提到了洋蔥路由器專案, Tor 已經包括了各種各樣的免費產品和服務, 人們可以用來維護他們的線上活動。我們建議每個人都使用 Tor 瀏覽器來説明匿名他們的線上存在。 -
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous.
請仔細閱讀 Tor 提供的關於在他們的網路上流覽的文檔和常見問題。他們對維護你的隱私有重要的建議。重要的是, 使用 Tor 瀏覽器並不保證所有的線上活動都是匿名的。 -
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing.
由於您的安全需要升級 Tor 有其他的免費工具來説明。評估威脅模型時, 您可能希望調查橋頭伺服器和尾部。橋式伺服器允許人們在阻止它的國家訪問 Tor。尾部是一個 Linux 作業系統, 用通用的程式完成, 所有的 USB 棒。它允許極私人計算。 -
Discover these and other Tor services at:
Discover these and other Tor services at:
在下列情況下發現這些和其他 Tor 服務: -
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries.
好的密碼對於維護您的資料非常重要。我們 (和許多安全專家) 建議使用 Diceware 方法創建密碼。這是我們認為安全的唯一的密碼生成方法。它很容易做, 它提供了超強的密碼, 甚至可以擊敗最足智多謀的對手。 -
Image courtesy xkcd.com.
Image courtesy xkcd.com.
圖像禮貌 xkcd.com。 -
Hello,
Hello,
你好 -
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
Your Gibberfish server is ready to be deployed. To do so you must first install the Tor Browser (Orfox on mobile) and download the instructions using this link, which will automatically self destruct after the first visit:
您的 Gibberfish 伺服器已準備就緒, 可以部署。要做到這一點, 您必須首先安裝 Tor 瀏覽器 (Orfox 在移動) 和下載指令使用此連結, 這將自動自毀後, 第一次訪問: -
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
The installation should take approximately 30 minutes to complete. If the installation does not start properly, please close your browser and try again in a new session.
安裝大約需要30分鐘才能完成。如果安裝未正確啟動, 請關閉瀏覽器, 然後在新會話中重試。 -
Some important reminders:
Some important reminders:
一些重要提醒: -
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
- Before deploying your server, please read our Quick-start guide. It contains important suggestions for maintaining your privacy and security.
-在部署伺服器之前, 請閱讀我們的快速入門手冊。它包含了維護您的隱私和安全的重要建議。 -
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
- Do not lose your encryption passphrase. Without it all of your data will become permanently lost when the system is rebooted.
-不要丟失加密密碼。如果沒有它, 當系統重新開機時, 您的所有資料將會永久丟失。