Gibberfish, Inc./Gibberfish User Documentation
-
ããããããªãã¯Gibberfishãæ§ã ãªæ¢åã®ã¢ã«ãŠã³ãããªã³ã©ã€ã³äžã®ã¢ã¯ãã£ããã£ã«é¢é£ãããµãŒãã¹ã«è¿œå ããããšããããšã§ãããããããã®å€ãã¢ã«ãŠã³ããšãµãŒãã¹ã¯å±éºã«æãããŠããŸããGibberfishãµãŒããŒãããã«æ ŒçŽãããŠããã³ã³ãã³ãããããã¯é¢é£ããã¢ã¯ãã£ããã£çãã©ã®ãããªã¢ã¯ãã£ããã£ã«å¯ŸããŠãæ°ããã¢ã«ãŠã³ãã®äœ¿çšãæšå¥šããŸãã
ããããããªãã¯Gibberfishãæ§ã ãªæ¢åã®ã¢ã«ãŠã³ãããªã³ã©ã€ã³äžã®ã¢ã¯ãã£ããã£ã«é¢é£ãããµãŒãã¹ã«è¿œå ããããšããããšã§ãããããããã®å€ãã¢ã«ãŠã³ããšãµãŒãã¹ã¯å±éºã«æãããŠããŸããGibberfishãµãŒããŒãããã«æ ŒçŽãããŠããã³ã³ãã³ãããããã¯é¢é£ããã¢ã¯ãã£ããã£çãã©ã®ãããªã¢ã¯ãã£ããã£ã«å¯ŸããŠãæ°ããã¢ã«ãŠã³ãã®äœ¿çšãæšå¥šããŸãã
It is likely that you are adding Gibberfish to a variety of existing accounts and services associated with your online activities. These older accounts and services may already be compromised. We recommend using fresh accounts for any activity that involves your Gibberfish server, the content stored there, or the activities associated with it. -
ç§ãã¡ã¯ããããå šãŠã®ãŠãŒã¶ãŒã«ãšã£ãŠå¿ ãããå©äŸ¿æ§ãããé©åãªãã®ã§ã¯ãªããšèªèããŠããŸãããã®å Žåã«ã¯ããã©ã€ããŒããªã¢ã¯ãã£ããã£ã§äœ¿çšããããšããŠããå šãŠã®ã¢ã«ãŠã³ãããµãŒãã¹ã®å®å šãå確ä¿ããæéããšã£ãŠãã ãããããªãã«é¢ããç¥èãªãã¢ã¯ã»ã¹ãåŸããæš©å©ãæããŠããªããŠãŒã¶ãŒãç· ãåºãããã«ãã¹ãã¬ãŒãºãå€æŽããŠãã ãããã©ãã§ãå¯èœãªéããïŒèŠçŽ èªèšŒãæå¹ã«ããŠãã ãããããªãã®æºåž¯é»è©±ãå«ãããªãã®ãã¹ãŠã®ããã€ã¹ã®ãœãããŠã§ã¢æŽæ°ããã°ã©ã ã確èªããããããã€ã³ã¹ããŒã«ããŠãã ããã
ç§ãã¡ã¯ããããå šãŠã®ãŠãŒã¶ãŒã«ãšã£ãŠå¿ ãããå©äŸ¿æ§ãããé©åãªãã®ã§ã¯ãªããšèªèããŠããŸãããã®å Žåã«ã¯ããã©ã€ããŒããªã¢ã¯ãã£ããã£ã§äœ¿çšããããšããŠããå šãŠã®ã¢ã«ãŠã³ãããµãŒãã¹ã®å®å šãå確ä¿ããæéããšã£ãŠãã ãããããªãã«é¢ããç¥èãªãã¢ã¯ã»ã¹ãåŸããæš©å©ãæããŠããªããŠãŒã¶ãŒãç· ãåºãããã«ãã¹ãã¬ãŒãºãå€æŽããŠãã ãããã©ãã§ãå¯èœãªéããïŒèŠçŽ èªèšŒãæå¹ã«ããŠãã ãããããªãã®æºåž¯é»è©±ãå«ãããªãã®ãã¹ãŠã®ããã€ã¹ã®ãœãããŠã§ã¢æŽæ°ããã°ã©ã ã確èªããããããã€ã³ã¹ããŒã«ããŠãã ããã
We recognize that this is not always convenient or appropriate for every user. In this case, please take the time to re-secure any account or service you intend to use for private activities. Change your passphrases in order to lock-out unauthorized users who may have gained access without your knowledge. Wherever possible, enable two-factor authorization. Check for software updates for all your devices, including your phone, and install them. -
TOR
TOR
TOR -
ãããªé話
ãããªé話
VIDEO CALLS -
NextcloudãTalkãã¢ããªã䜿çšããweb ãã©ãŠã¶ãŒã§ãããªé話ã®äœæã»åå ãå¯èœã§ããæé«ã®ããã©ãŒãã³ã¹ã®ããã«ãITunes, Google Playããã³F-Droidã§å©çšå¯èœãªãNextcloud Talkãã¢ãã€ã«ã¢ããªãã€ã³ã¹ããŒã«ã»äœ¿çšããããšãæšå¥šããŸãã
NextcloudãTalkãã¢ããªã䜿çšããweb ãã©ãŠã¶ãŒã§ãããªé話ã®äœæã»åå ãå¯èœã§ããæé«ã®ããã©ãŒãã³ã¹ã®ããã«ãITunes, Google Playããã³F-Droidã§å©çšå¯èœãªãNextcloud Talkãã¢ãã€ã«ã¢ããªãã€ã³ã¹ããŒã«ã»äœ¿çšããããšãæšå¥šããŸãã
The Nextcloud âTalkâ app allows you to create and join video calls in your web browser. For best performance on mobile devices, we recommend that you install and use the âNextcloud Talkâ mobile app, which is available from iTunes, Google Play, and F-Droid. -
ãã£ãã
ãã£ãã
CHAT -
ãã£ãã ã·ã¹ãã ã¯ãæšæºXMPPãããã³ã«ã䜿çšããŠãä»ã®GibberfishãŠãŒã¶ãŒã ãã§ãªããäžçã§XMPPãµãŒããŒã䜿çšããŠãã人ã ãšãã£ãããå¯èœã«ããŸããããªãã®XMPP ã¢ãã¬ã¹ã¯ <your username>@<your gibberfidh server> ã§ããäŸãã°ã
ãã£ãã ã·ã¹ãã ã¯ãæšæºXMPPãããã³ã«ã䜿çšããŠãä»ã®GibberfishãŠãŒã¶ãŒã ãã§ãªããäžçã§XMPPãµãŒããŒã䜿çšããŠãã人ã ãšãã£ãããå¯èœã«ããŸããããªãã®XMPP ã¢ãã¬ã¹ã¯
<your username>
@<your gibberfidh server>
ã§ããäŸãã°ãThe chat system uses the standard XMPP protocol, which will allow you to chat not only with fellow Gibberfish users, but also with anyone else in the world using an XMPP server. Your XMPP address is<your username>
@<your gibberfish server>
. For example, -
åç §ããæç®
åç §ããæç®
FURTHER READING -
ã³ã¢æ©èœã®ãã詳现ãªããã¥ã¡ã³ãã«ã€ããŠã¯ãGibberfishããŒã ãã©ã«ãå ã«ãããNextcloudã®ãŠãŒã¶ãŒããã¥ã¢ã«ãåç §ããŠãã ããã
ã³ã¢æ©èœã®ãã詳现ãªããã¥ã¡ã³ãã«ã€ããŠã¯ãGibberfishããŒã ãã©ã«ãå ã«ãããNextcloudã®ãŠãŒã¶ãŒããã¥ã¢ã«ãåç §ããŠãã ããã
For more extensive documentation of the core features, please refer to the Nextcloud User Manual, which is also located in your Gibberfish home folder. -
æçµåç¥
æçµåç¥
FINAL NOTES -
Gibberfishã®äœ¿çšãã楜ãã¿ããã ããããšãé¡ã£ãŠãããŸããç§ãã¡ã¯ãç§ãã¡ã®ãµãŒãã¹ã«çµ±åããæ§ã ãªãªãŒãã³ãœãŒã¹ãããžã§ã¯ãã«é¢ãã£ãã®å€ãã®ç¬ç«ããè²¢ç®è ãã¡ã®åãåããŠãGibberfishãå®å šãã€äœ¿ãããããã©ãããã©ãŒã ã«ããããåªåããŠããŸãããNextcloudã®çããŸã«ã¯å¿ããæè¬ããããŸãã圌ããªãã§ã¯ç§ãã¡ã®ãã©ãããã©ãŒã ã¯å®çŸäžå¯èœã§ãã£ãã§ãããã
Gibberfishã®äœ¿çšãã楜ãã¿ããã ããããšãé¡ã£ãŠãããŸããç§ãã¡ã¯ãç§ãã¡ã®ãµãŒãã¹ã«çµ±åããæ§ã ãªãªãŒãã³ãœãŒã¹ãããžã§ã¯ãã«é¢ãã£ãã®å€ãã®ç¬ç«ããè²¢ç®è ãã¡ã®åãåããŠãGibberfishãå®å šãã€äœ¿ãããããã©ãããã©ãŒã ã«ããããåªåããŠããŸãããNextcloudã®çããŸã«ã¯å¿ããæè¬ããããŸãã圌ããªãã§ã¯ç§ãã¡ã®ãã©ãããã©ãŒã ã¯å®çŸäžå¯èœã§ãã£ãã§ãããã
We hope you enjoy using Gibberfish. We have worked hard make it a secure and easy-to use platform, as have the many independent contributors to the various open source projects that we have integrated into our service. Special thanks goes to the folks at Nextcloud, without whom our platform would not be possible. -
ãã¹ã¯ãããããã³ã¢ãã€ã«ã¯ã©ã€ã¢ã³ã
ãã¹ã¯ãããããã³ã¢ãã€ã«ã¯ã©ã€ã¢ã³ã
DESKTOP AND MOBILE CLIENTS -
Gibberfish ã¯ããµãŒããŒãããŸãã¯ãµãŒããŒãžã®èªåçãªãã¡ã€ã«ã®åæãå¯èœã«ããããã«Nextcloudã®ãã¹ã¯ãããããã³ã¢ãã€ã«ã¯ã©ã€ã¢ã³ããšååããŠããŸããã»ãã¥ãªãã£å¯ŸçãšããŠãæ¢å®ã§ã¯ç¡å¹ã«ãªã£ãŠããŸãããããã®ã¯ã©ã€ã¢ã³ãã®äœ¿çšãåžæããå Žåã¯ããã¡ã€ã«ã®ã¢ã¯ã»ã¹èŠåã®å€æŽã«ã€ããŠã管çè ã«ãåãåãããã ãããããŒã«ã«ã§ãã¡ã€ã«ãåæããå Žåã¯ãããã€ã¹ã®ãã« ã» ãã£ã¹ã¯æå·åããªã³ããå Žåã«ã®ã¿å®è¡ããŠãã ãããããã¯ãããã€ã¹ã®çŽå€±ãçé£ãŸãã¯ãããã³ã°ãããå Žåã«ãã¡ã€ã«ãä¿è·ããŸãã
Gibberfish ã¯ããµãŒããŒãããŸãã¯ãµãŒããŒãžã®èªåçãªãã¡ã€ã«ã®åæãå¯èœã«ããããã«Nextcloudã®ãã¹ã¯ãããããã³ã¢ãã€ã«ã¯ã©ã€ã¢ã³ããšååããŠããŸããã»ãã¥ãªãã£å¯ŸçãšããŠãæ¢å®ã§ã¯ç¡å¹ã«ãªã£ãŠããŸãããããã®ã¯ã©ã€ã¢ã³ãã®äœ¿çšãåžæããå Žåã¯ããã¡ã€ã«ã®ã¢ã¯ã»ã¹èŠåã®å€æŽã«ã€ããŠã管çè ã«ãåãåãããã ãããããŒã«ã«ã§ãã¡ã€ã«ãåæããå Žåã¯ãããã€ã¹ã®ãã« ã» ãã£ã¹ã¯æå·åããªã³ããå Žåã«ã®ã¿å®è¡ããŠãã ãããããã¯ãããã€ã¹ã®çŽå€±ãçé£ãŸãã¯ãããã³ã°ãããå Žåã«ãã¡ã€ã«ãä¿è·ããŸãã
Gibberfish works with the Nextcloud desktop and mobile clients to allow you to automatically sync files to and from the server. This is disabled by default as a security measure. If you wish to use these clients, talk to your Administrator about changing the file access rules. If you decide to sync files locally, only do so if you have turned on full-disk encryption for your device. This protects your files if your device is lost, stolen or hacked -
äžèšã®ã³ããã¯ã¯ã³ã³ã»ããã説æããŠããŸãããDicewareã¯ïŒæåé·ã®ãã¹ãã¬ãŒãºãããã¯æé©ãªã»ãã¥ãªãã£ã®ããã«ããé·ãåèªã®ãã¹ãã¬ãŒãºã®äœ¿çšãæšå¥šããŠããŸãã
äžèšã®ã³ããã¯ã¯ã³ã³ã»ããã説æããŠããŸãããDicewareã¯ïŒæåé·ã®ãã¹ãã¬ãŒãºãããã¯æé©ãªã»ãã¥ãªãã£ã®ããã«ããé·ãåèªã®ãã¹ãã¬ãŒãºã®äœ¿çšãæšå¥šããŠããŸãã
While the comic above explains the concept, the Diceware method recommends a passphrase length of 5 or more words for optimal security. -
Torã®äœ¿çšãããªãã®ãªã³ã©ã€ã³ãã©ã€ãã·ãŒãä¿è·ããæåã®æ¹æ³ã§ããããããããç§ãã¡ãTorã䜿çšããŠGibberfish ãµãŒããŒãå±éããçç±ã§ããThe Onion Router ãããžã§ã¯ãã«å ·äœçã«èšåãããŠããŸãããTor ã¯ã人ã ããªã³ã©ã€ã³äžã®ã¢ã¯ãã£ããã£ãä¿è·ããããã®æ§ã ãªç¡æã®è£œåããµãŒãã¹ãç¶²çŸ ããããã«ãªããŸãããçããã®ãªã³ã©ã€ã³äžã®ååšãå¿ååããTor ã®ãã©ãŠã¶ã䜿çšããããšãæšå¥šããŸãã
Torã®äœ¿çšãããªãã®ãªã³ã©ã€ã³ãã©ã€ãã·ãŒãä¿è·ããæåã®æ¹æ³ã§ããããããããç§ãã¡ãTorã䜿çšããŠGibberfish ãµãŒããŒãå±éããçç±ã§ããThe Onion Router ãããžã§ã¯ãã«å ·äœçã«èšåãããŠããŸãããTor ã¯ã人ã ããªã³ã©ã€ã³äžã®ã¢ã¯ãã£ããã£ãä¿è·ããããã®æ§ã ãªç¡æã®è£œåããµãŒãã¹ãç¶²çŸ ããããã«ãªããŸãããçããã®ãªã³ã©ã€ã³äžã®ååšãå¿ååããTor ã®ãã©ãŠã¶ã䜿çšããããšãæšå¥šããŸãã
Using Tor is the single best way to guard your online privacy. This is why we use Tor to deploy your Gibberfish server. While it specifically refers to The Onion Router project, Tor has come to encompass a variety of free products and services people can use to safeguard their online activities. We recommend that everyone use the Tor browser to help anonymize their online presence. -
Torãã©ãŠãžã³ã°ã«é¢ããããã¥ã¡ã³ããšãããã質åã泚ææ·±ããèªã¿ãã ãããTorã«ã¯ããªãã®ãã©ã€ãã·ãŒãä¿è·ããããã®éèŠãªæšå¥šäºé ããããŸããéèŠãªã®ã¯ãTor ã®ãã©ãŠã¶ã§ã¯ããã¹ãŠã®ãªã³ã©ã€ã³æŽ»åãå¿åã§ããããšãä¿èšŒãããªãããšã§ãã
Torãã©ãŠãžã³ã°ã«é¢ããããã¥ã¡ã³ããšãããã質åã泚ææ·±ããèªã¿ãã ãããTorã«ã¯ããªãã®ãã©ã€ãã·ãŒãä¿è·ããããã®éèŠãªæšå¥šäºé ããããŸããéèŠãªã®ã¯ãTor ã®ãã©ãŠã¶ã§ã¯ããã¹ãŠã®ãªã³ã©ã€ã³æŽ»åãå¿åã§ããããšãä¿èšŒãããªãããšã§ãã
Please carefully read the documentation and FAQ that Tor provides about browsing on their network. They have important recommendations for maintaining your privacy. Importantly, using the Tor browser does not guarantee that all your online activities are anonymous. -
ã»ãã¥ãªãã£ã®éèŠãé«ãŸãã®ã«äŒŽããTor ã«ã¯ãã®ä»ã®ç¡æããŒã«ããããŸããããªããè åšã¢ãã«ãè©äŸ¡ãããšããããªããžãµãŒããŒãšTailsã調æ»ããããããããŸãããããªããžãµãŒããŒã¯ãTorããããã¯ããŠããåœã®äººã ã«ãTorãžã®ã¢ã¯ã»ã¹ãå¯èœãšããŸããTailsã¯ãå šãŠUSB ã¹ãã£ãã¯äžã«ãããäžè¬çã«äœ¿çšãããããã°ã©ã ãåããLinuxã®ãªãã¬ãŒãã£ã³ã°ã·ã¹ãã ã§ããéåžžã«é«åºŠãªãã©ã€ããŒãã³ã³ãã¥ãŒãã£ã³ã°å¯èœã§ãã
ã»ãã¥ãªãã£ã®éèŠãé«ãŸãã®ã«äŒŽããTor ã«ã¯ãã®ä»ã®ç¡æããŒã«ããããŸããããªããè åšã¢ãã«ãè©äŸ¡ãããšããããªããžãµãŒããŒãšTailsã調æ»ããããããããŸãããããªããžãµãŒããŒã¯ãTorããããã¯ããŠããåœã®äººã ã«ãTorãžã®ã¢ã¯ã»ã¹ãå¯èœãšããŸããTailsã¯ãå šãŠUSB ã¹ãã£ãã¯äžã«ãããäžè¬çã«äœ¿çšãããããã°ã©ã ãåããLinuxã®ãªãã¬ãŒãã£ã³ã°ã·ã¹ãã ã§ããéåžžã«é«åºŠãªãã©ã€ããŒãã³ã³ãã¥ãŒãã£ã³ã°å¯èœã§ãã
As your security needs escalate Tor has other free tools to help. When you evaluate your Threat Model, you may wish to investigate Bridge servers and Tails. Bridge servers allow people to access Tor in countries that block it. Tails is a Linux operating system, complete with commonly used programs, all on a USB stick. It allows extremely private computing. -
ä»ã®TorãµãŒãã¹ãçºèŠã§ããå ŽæïŒ
ä»ã®TorãµãŒãã¹ãçºèŠã§ããå ŽæïŒ
Discover these and other Tor services at: -
ãããã¹ãã¬ãŒãºã¯ãããªãã®ããŒã¿ãä¿è·ããããéåžžã«éèŠã§ããç§ãã¡ (ããã³å€ãã®ã»ãã¥ãªãã£å°é家) ã¯ãDicewareã®æ¹æ³ã䜿çšãããã¹ã¯ãŒãã®äœæãæšå¥šããŸããããã¯ç§ãã¡ãå¯äžå®å šãšèãããã¹ãã¬ãŒãºçææ¹æ³ã§ããéåžžã«ç°¡æã§ããã€æãèšæ©å¿å€ãªæµãåãããšãã§ããè¶ åŒ·åãªãã¹ãã¬ãŒãºãæäŸããŸãã
ãããã¹ãã¬ãŒãºã¯ãããªãã®ããŒã¿ãä¿è·ããããéåžžã«éèŠã§ããç§ãã¡ (ããã³å€ãã®ã»ãã¥ãªãã£å°é家) ã¯ãDicewareã®æ¹æ³ã䜿çšãããã¹ã¯ãŒãã®äœæãæšå¥šããŸããããã¯ç§ãã¡ãå¯äžå®å šãšèãããã¹ãã¬ãŒãºçææ¹æ³ã§ããéåžžã«ç°¡æã§ããã€æãèšæ©å¿å€ãªæµãåãããšãã§ããè¶ åŒ·åãªãã¹ãã¬ãŒãºãæäŸããŸãã
Good passphrases are extremely important for safeguarding your data. We (and many security experts) recommend creating passwords using the Diceware method. This is the only method of passphrase generation we consider secure. Its easy to do, and it provides ultra-strong passphrases that can defeat even the most resourceful adversaries. -
ç»åã¯xkcd.comæ§ã®å¥œæã«ããæäŸã§ãã
ç»åã¯xkcd.comæ§ã®å¥œæã«ããæäŸã§ãã
Image courtesy xkcd.com.