Gibberfish, Inc./Gibberfish User Documentation
-
THAT'S A BATTERY STAPLE
THAT'S A BATTERY STAPLE
-
YOU'VE ALREADY MEMORIZED IT
YOU'VE ALREADY MEMORIZED IT
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
-
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Kiitos rekisteröitymisestä Gibberfish, Inc! Olemme perustaneet yksityinen palvelin ja määritetty www-osoite: -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Ennen kuin voit alkaa käyttää sitä, kirjaudu management Portal-portaalin palvelimen ja kirjoittaa salasanan, jota käytetään tietojen salaamiseen. Vahva salaus tunnuslause on välttämätöntä. Mitä vahvempi salasana on, sitä vaikeampaa on hyökkääjä voi käyttää tiedostoja. Suosittelemme Diceware menetelmä tuottaa tunnuslauseen vähintään kuusi sanaa. -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Kun valinnut tunnuslauseen, haluta tallentaa salasanan hallintaohjelma, kuten KeePass, ja tee siitä varmuuskopio. Jos palvelin käynnistetään uudelleen, olla tarpeen kirjautua sisään ja kirjoita uudelleen salasana avata tiedostot. Jos salasana katoaa, menetät pääsyn tietoihisi. Emme voi palauttaa tai palauttaa tiedot. Ota hetki luoda sopiva salasana, ennen kuin jatkat. -
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. yksityisyyden management Portal-portaalin on vain saatavilla kautta Tor nimettömyys verkko. Jotta voit käyttää Tor sinun asentaa Tor-selain, joka on erityisesti muutettu versio Firefox. Se kanisteri olla downloaded aikaa -
2. Open the Tor browser and type the following into the address bar:
2. Open the Tor browser and type the following into the address bar:
2. Avaa Tor-selain ja kirjoita osoiteriville: -
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Olet ehkä huomannut, että tämä URL-osoite ei käytä HTTPS, joka on standardi turvallinen web-selailu. Tämä johtuu jo se suojaa liikennettä useita kerroksia salausta, varauksen HTTPS turhia. -
3. Log in to the management portal:
3. Log in to the management portal:
3. Kirjaudu management Portal-portaalin: -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery stapleKäyttäjätunnus: portal_admin salasana: oikea hevonen akku niitti -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. Seuraavassa näytössä Kirjoita salaus tunnuslause, olet valinnut tietojen suojaamiseksi. Tarkista sen tarkkuus ennen lyömällä ”Enter”. Tämä käynnistää salaaminen ja asentaminen uusi pilvi. Kun olet valmis, se näyttää käyttäjänimen ja salasanan avulla voit käyttää pilvi tämän kirjeen yläreunassa olevaan osoitteeseen. Voit jatkaa tästä Tor-selaimella tai vaihtaa normaalia selainta. Vaihda salasanasi, kun olet kirjautunut sisään. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Jos kohtaat ongelmia, ota yhteyttä osoitteeseen info@gibberfish.org. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Tervetuloa Gibberfish! Tavoitteenamme on yksityisyyttä ja turvallisuutta, mutta tarvitsemme voit olla tasavertainen osapuoli. Alla on muutamia ehdotuksia, joilla pääset alkuun. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Älä koskaan käytä tunnuslauseen Gibberfish-kirjautumistunnus, jonka avulla missä tahansa muualla. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Aina luoda ainutlaatuinen tunnuslause palvelu, tilin tai laite. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Tätä menetelmää käyttämällä varmistaa tarvitsee vain muistaa yksi salasana: yksi aukaista avain vault. -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
”Vahva” tarkoitetaan menettelyjä, jotka ovat perustaneet tai tarkastamia trusted turvallisuus asiantuntijoita. Näitä ovat, mutta eivät rajoitu Electronic Frontier Foundation (EKTR), Guardian projekti- ja Tor-projektia. -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Käytämme ”johdonmukainen” korostaa, että turvallisuuden käytännössä ajoittainen käyttö yhtä huono kuin ei käytä lainkaan. Kun olet kehittää uhka toimintamallia ja strategiaa voittaa se, sovelletaan tätä strategiaa, joka kerta, kun voit osallistua yksityisen toiminnan.
This sentence is somewhat nonsensical, but a "battery staple" would be a hypothetical staple for batteries. See here: https://imgs.xkcd.com/comics/password_strength.png