Gibberfish, Inc./Gibberfish User Documentation
-
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
-
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
-
DIFFICULTY TO GUESS:
DIFFICULTY TO GUESS:
-
EASY
EASY
-
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
-
DIFFICULTY TO REMEMBER:
DIFFICULTY TO REMEMBER:
-
HARD
HARD
-
correct
correct
-
horse
horse
-
battery
battery
-
staple
staple
-
FOUR RANDOM COMMON WORDS
FOUR RANDOM COMMON WORDS
-
~44 BITS OF ENTROPY
~44 BITS OF ENTROPY
-
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
-
This sentence is somewhat nonsensical, but a "battery staple" would be a hypothetical staple for batteries. See here: https://imgs.xkcd.com/comics/password_strength.png
THAT'S A BATTERY STAPLETHAT'S A BATTERY STAPLE
-
YOU'VE ALREADY MEMORIZED IT
YOU'VE ALREADY MEMORIZED IT
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
-
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Gibberfish, Inc에 가입해주셔서 감사합니다! 여러분을 위해 개인 서버를 설정 하고 웹 주소를 할당하였습니다. -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
시작하기 전에 서버 관리자 포털에 로그인하여 데이터를 암호화하는데 사용될 암호문구를 입력하십시오. 강력한 암호문구를 선택하셔야 합니다. 암호문구가 강력할 수록 침입자가 파일에 접근하기가 어려워집니다. Diceware 메서드를 사용하여 최소 6 단어 길이의 암호문구를 만드시길 추천드립니다. -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
우선 암호문구를 정하셨으면 KeePass와 같은 안전한 암호 관리자에게 저장하고 복사본을 백업하십시오. 서버가 재부팅되면 로그인할 때 파일을 잠금해제하기 위해 암호문구를 재입력해야 합니다. 암호문구를 잊어버리면 데이터에 접근하지 못합니다. 저희조차 재설정하거나 복구해드리지 못합니다. 진행하기 전에 적절한 암호문구를 만드는 시간을 갖기 바랍니다.