Gibberfish, Inc./Gibberfish User Documentation
-
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
-
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
-
DIFFICULTY TO GUESS:
DIFFICULTY TO GUESS:
-
EASY
EASY
-
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
-
DIFFICULTY TO REMEMBER:
DIFFICULTY TO REMEMBER:
-
HARD
HARD
-
correct
correct
-
horse
horse
-
battery
battery
-
staple
staple
-
FOUR RANDOM COMMON WORDS
FOUR RANDOM COMMON WORDS
-
~44 BITS OF ENTROPY
~44 BITS OF ENTROPY
-
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
-
This sentence is somewhat nonsensical, but a "battery staple" would be a hypothetical staple for batteries. See here: https://imgs.xkcd.com/comics/password_strength.png
THAT'S A BATTERY STAPLETHAT'S A BATTERY STAPLE
-
YOU'VE ALREADY MEMORIZED IT
YOU'VE ALREADY MEMORIZED IT
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
-
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
感谢您注册 Gibberfish, 公司!我们已经为您设置了专用服务器, 并为您分配了 web 地址: -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
在开始使用它之前, 您必须登录到服务器上的管理门户, 然后输入用于加密数据的密码。选择一个强大的加密密码是必不可少的。密码越强, 攻击者访问文件的难度就越大。我们建议使用 Diceware 方法生成至少六字长的密码。 -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
选择密码后, 请将其保存到安全密码管理器 (如 KeePass) 中, 并制作备份副本。如果您的服务器重新启动, 将需要登录并重新输入您的密码, 以解锁您的文件。如果您丢失了密码, 您将失去对数据的访问权限。我们不能为您重置或恢复它。请花一点时间来创建一个合适的密码, 然后再继续。