Gibberfish, Inc./Gibberfish User Documentation
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
SELAMA 20 TAHUN KAMI BERHASIL MELATIH SEMUA ORANG UNTUK MENGGUNAKAN KODE SANDI YANG SULIT DIINGAT MANUSIA, TAPI MUDAH DITEBAK KOMPUTE -
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Terima kasih telah mendaftar untuk Gibberfish, Inc! Kami telah menyiapkan server pribadi untuk Anda dan ditugaskan menjadi alamat web: -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Sebelum Anda dapat mulai menggunakannya, Anda harus log in ke portal manajemen pada server Anda dan memasukkan sebuah passphrase yang akan digunakan untuk mengenkripsi data. Memilih sandi enkripsi yang kuat sangat penting. Semakin kuat sandi, semakin sulit adalah untuk penyerang untuk mengakses file Anda. Kami menyarankan menggunakan metode Diceware untuk menghasilkan sebuah passphrase setidaknya enam kata-kata yang panjang. -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Sekali Anda telah memilih sebuah passphrase, silahkan menyimpannya ke manajer password yang aman, seperti KeePass, dan membuat salinan cadangan. Jika server Anda reboot, maka akan diperlukan untuk login dan masukkan kembali sandi untuk membuka file. Jika Anda kehilangan sandi, Anda akan kehilangan akses ke data Anda. Kami tidak dapat membuat ulang atau memulihkannya untuk Anda. Harap luangkan waktu untuk menciptakan sebuah passphrase yang cocok sebelum melanjutkan. -
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. untuk privasi portal manajemen ini hanya dapat diakses melalui Tor anonimitas jaringan. Untuk mengakses Tor, Anda akan perlu untuk memasang Tor peramban, yang merupakan versi khusus diubah Firefox. Ini dapat didownload di -
2. Open the Tor browser and type the following into the address bar:
2. Open the Tor browser and type the following into the address bar:
2. Buka Tor browser dan ketik berikut ke address bar: -
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Anda mungkin telah memperhatikan bahwa url ini tidak menggunakan HTTPS, yang merupakan standar untuk browsing web aman. Hal ini karena Tor sudah melindungi lalu lintas dengan beberapa lapisan enkripsi, membuat HTTPS unneccessary. -
3. Log in to the management portal:
3. Log in to the management portal:
3. masuk ke portal manajemen: -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staplenama pengguna: portal_admin password: kuda benar baterai pokok -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. pada layar berikutnya, ketik kata sandi enkripsi ubahsuaian Anda telah memilih untuk melindungi data Anda. Harap Tinjau untuk akurasi sebelum menekan tombol 'Enter'. Ini akan memulai proses enkripsi dan menginstal awan baru Anda. Setelah selesai, ia akan menampilkan username dan password yang dapat Anda gunakan untuk mengakses internet Anda di alamat yang tercantum di bagian atas Surat ini. Anda dapat terus menggunakan Tor browser dari titik ini, atau beralih ke browser yang normal. Ubah sandi setelah Anda login. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Jika Anda mengalami kesulitan, silahkan hubungi kami di info@gibberfish.org. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Selamat datang di Gibberfish! Fokus kami adalah pada privasi dan keamanan Anda, tetapi kami membutuhkan Anda untuk menjadi peserta sama. Berikut adalah beberapa saran untuk Anda mulai. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Pernah menggunakan sebuah passphrase untuk login Gibberfish Anda yang Anda gunakan di mana saja lain. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Selalu menghasilkan sebuah passphrase yang unik untuk setiap layanan, akun atau perangkat. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Menggunakan metode ini menjamin Anda hanya perlu ingat satu passphrase: satu untuk membuka vault kunci Anda. -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
Dengan 'kuat' berarti prosedur yang telah didirikan atau Diperiksa oleh pakar keamanan terpercaya. Ini termasuk, tetapi tidak terbatas pada, proyek Electronic Frontier Foundation (EFF), wali proyek dan Tor. -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Kami menggunakan 'konsisten' untuk menekankan bahwa penggunaan intermiten praktik keamanan apa pun sebagai buruk sebagai tidak menggunakan salah satu sama sekali. Sekali Anda mengembangkan model ancaman dan strategi untuk mengalahkan itu, Anda harus menerapkan strategi bahwa setiap kali Anda terlibat dalam kegiatan-kegiatan pribadi. -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Setiap pengguna harus memahami grup Anda ancaman Model dan konsisten menggunakan praktik keamanan yang sama. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Untuk informasi lebih lanjut tentang ancaman model, silakan merujuk ke ini primer yang sangat baik yang diproduksi oleh EFF.