Gibberfish, Inc./Gibberfish User Documentation
-
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
-
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
-
DIFFICULTY TO GUESS:
DIFFICULTY TO GUESS:
-
EASY
EASY
-
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
-
DIFFICULTY TO REMEMBER:
DIFFICULTY TO REMEMBER:
-
HARD
HARD
-
correct
correct
-
horse
horse
-
battery
battery
-
staple
staple
-
FOUR RANDOM COMMON WORDS
FOUR RANDOM COMMON WORDS
-
~44 BITS OF ENTROPY
~44 BITS OF ENTROPY
-
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
-
This sentence is somewhat nonsensical, but a "battery staple" would be a hypothetical staple for batteries. See here: https://imgs.xkcd.com/comics/password_strength.png
THAT'S A BATTERY STAPLETHAT'S A BATTERY STAPLE
-
YOU'VE ALREADY MEMORIZED IT
YOU'VE ALREADY MEMORIZED IT
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
-
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
-
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
-
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.