Gibberfish, Inc./Gibberfish User Documentation
-
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
2²⁸ = 3 DAYS AT 1000 GUESSES PER SECOND
-
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
PLAUSIBLE ATTACK ON A WEAK REMOTE WEB SERVICE. YES, CRACKING A STOLEN HASH IS FASTER, BUT IT'S NOT WHAT THE AVERAGE USER SHOULD WORRY ABOUT
-
DIFFICULTY TO GUESS:
DIFFICULTY TO GUESS:
-
EASY
EASY
-
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
WAS IT "TROMBONE"? NO, "TROUBADOR". AND ONE OF THE Os WAS A ZERO? AND THERE WAS SOME SYMBOL...
-
DIFFICULTY TO REMEMBER:
DIFFICULTY TO REMEMBER:
-
HARD
HARD
-
correct
correct
-
horse
horse
-
battery
battery
-
staple
staple
-
FOUR RANDOM COMMON WORDS
FOUR RANDOM COMMON WORDS
-
~44 BITS OF ENTROPY
~44 BITS OF ENTROPY
-
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
2⁴⁴ = 550 YEARS AT 1000 GUESSES PER SECOND
-
This sentence is somewhat nonsensical, but a "battery staple" would be a hypothetical staple for batteries. See here: https://imgs.xkcd.com/comics/password_strength.png
THAT'S A BATTERY STAPLETHAT'S A BATTERY STAPLE
-
YOU'VE ALREADY MEMORIZED IT
YOU'VE ALREADY MEMORIZED IT
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
-
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
感謝您註冊 Gibberfish, 公司!我們已經為您設置了專用伺服器, 並為您分配了 web 位址: -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
在開始使用它之前, 您必須登錄到伺服器上的監管中心, 然後輸入用於加密資料的密碼。選擇一個強大的加密密碼是必不可少的。密碼越強, 攻擊者訪問檔的難度就越大。我們建議使用 Diceware 方法生成至少六字長的密碼。 -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
選擇密碼後, 請將其保存到安全密碼管理器 (如 KeePass) 中, 並製作備份副本。如果您的伺服器重新開機, 將需要登錄並重新輸入您的密碼, 以解鎖您的檔。如果您丟失了密碼, 您將失去對資料的存取權限。我們不能為您重置或恢復它。請花一點時間來創建一個合適的密碼, 然後再繼續。