Gibberfish, Inc./Gibberfish User Documentation
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
AO LONGO DE 20 ANOS DE ESFORÇOS, CONSEGUIMOS TREINAR AS PESSOAS PARA USAREM SENHAS DIFÍCEIS DE UM SER HUMANO LEMBRAR, MAS FÁCEIS DE UM COMPUTADOR ADIVINHAR. -
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Nós do Gibberfish, Inc., agradecemos seu cadastro! Configuramos um servidor privado para você e a ele atribuímos o endereço: -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Antes de começar a usá-lo, você deve acessar o portal de controle do seu servidor e definir a frase secreta que será usada para criptografar seus dados. É essencial escolher uma senha forte. Quanto mais forte a frase secreta, mais difícil para um invasor ganhar acesso aos seus arquivos. Recomendamos o método Diceware para gerar uma frase secreta com pelo menos seis palavras. -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Definida a frase secreta, salve-a em um gerenciador de senhas seguro, como o KeePass, e guarde uma cópia dela por segurança. Caso seu servidor seja reinicializado, será necessário entrar no sistema e reinserir a frase secreta para desbloquear seus arquivos. Se você perder sua frase, não poderá mais acessar seus dados. Não podemos redefini-la ou recuperá-la. Por favor, tire um momento para criar uma frase secreta adequada antes de prosseguir. -
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. Pensando na sua privacidade, tornamos o portal de controle acessível apenas pela rede de anonimato Tor. Para usá-la você precisa instalar o Tor Browser, uma modificação do Firefox. Ele pode ser baixado no endereço -
2. Open the Tor browser and type the following into the address bar:
2. Open the Tor browser and type the following into the address bar:
2. Abra o navegador do Tor e digite o seguinte na barra de endereços: -
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Você deve ter notado que essa URL não usa HTTPS, que é o padrão para uma navegação segura. Isso ocorre porque o Tor já protege seu tráfego com múltiplas camadas de criptografia, tornando o protocolo desnecessário. -
3. Log in to the management portal:
3. Log in to the management portal:
3. Entre no portal de controle: -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staplenome de usuário: portal_admin
senha: correto cavalo bateria grampo -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. Na tela seguinte, digite a frase secreta de criptografia que você escolheu para proteger seus dados. Por favor, corrija quaisquer erros antes de apertar ‘Enter’. Isso dará início ao processo de criptografia e instalação da sua nova nuvem. Quando concluído, serão exibidos o nome de usuário e senha que você poderá usar para acessar a nuvem no endereço informado acima. Você pode então continuar a usar o Tor Browser ou mudar para um navegador normal. Por favor, altere sua senha assim que se logar. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Se houver qualquer problema, entre em contato conosco pelo e-mail info@gibberfish.org. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
INTRODUÇÃO RÁPIDA AO GIBBERFISH -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Olá! Estamos focados em garantir sua privacidade e segurança, mas, para isso, precisamos da sua colaboração. Abaixo, algumas sugestões iniciais. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Nunca registre como sua frase secreta no Gibberfish uma senha que você use em outro lugar. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Crie sempre uma senha única para cada serviço, conta ou dispositivo que usar. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Esse método garante que você precise lembrar de somente uma frase secreta: aquela que abre o seu cofre de chaves. -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
Por "robustas" queremos dizer procedimentos que tenham sido estabelecidos ou analisados por especialistas em segurança confiáveis. Estes incluem, mas não se limitam a, a Electronic Frontier Foundation (EFF), o Guardian Project e o projeto Tor. -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Falamos de "consistente" para enfatizar que empregar qualquer prática de segurança intermitentemente é tão ineficaz quanto não usá-la nunca. Uma vez que tiver desenvolvido um modelo de ameaças e uma estratégia para derrotá-las, siga a estratégia sempre que quiser navegar com privacidade. -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Cada usuário deve compreender o Modelo de Ameaças do grupo e usar consistentemente mesmas as práticas de segurança. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Para mais informações sobre Modelos de Ameaças, consulte esta excelente cartilha produzida pela EFF.