Gibberfish, Inc./Gibberfish User Documentation
-
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS.
-
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address:
Terima kasih kerana mendaftar untuk Gibberfish, Inc! Kami telah menyediakan pelayan peribadi untuk anda dan diberikan alamat web: -
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long.
Sebelum anda boleh mula menggunakannya, anda mesti log masuk ke portal pengurusan pada pelayan anda dan masukkan frasa laluan yang akan digunakan untuk menyulitkan data anda. Memilih frasa laluan enkripsi kukuh adalah penting. Adalah frasa laluan anda semakin kukuh, semakin sukar ia bagi penyerang untuk mengakses fail anda. Kami mengesyorkan menggunakan kaedah Diceware untuk menjana frasa laluan sekurang-kurangnya enam perkataan-perkataan yang panjang. -
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding.
Sekali anda telah memilih frasa laluan, sila Simpan ke Pengurus kata laluan yang selamat, seperti KeePass, dan membuat salinan sandaran. Jika pelayan anda dibut semula, ia akan perlu untuk log masuk dan masukkan semula frasa laluan anda untuk membuka fail-fail anda. Jika anda kehilangan frasa laluan anda, anda akan kehilangan akses kepada data anda. Kita tidak boleh set semula atau mendapatkannya untuk anda. Sila luangkan masa untuk Cipta frasa laluan yang sesuai sebelum meneruskan. -
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at
1. untuk privasi anda, portal pengurusan ini hanya boleh diakses melalui rangkaian tanpa nama Tor. Untuk mengakses Tor, anda akan perlu untuk memasang pelayar Tor, itulah Khas versi Firefox. Ia boleh dimuat turun di -
2. Open the Tor browser and type the following into the address bar:
2. Open the Tor browser and type the following into the address bar:
2. Buka pelayar Tor dan taipkan perkara-perkara berikut ke dalam bar Alamat: -
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary.
Anda mungkin sudah perhatikan bahawa url ini tidak gunakan HTTPS, yang merupakan standard bagi melayari web kami yang selamat. Ini adalah kerana Tor telah melindungi trafik anda dengan pelbagai lapisan penyulitan, membuat HTTPS unneccessary. -
3. Log in to the management portal:
3. Log in to the management portal:
3. log masuk ke portal pengurusan: -
username: portal_admin password: correct horse battery staple
username: portal_admin
password: correct horse battery staplenama pengguna: kata laluan portal_admin: Kuda betul bateri ruji -
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in.
4. pada skrin berikutnya, taip dalam ungkapan laluan penyulitan awda telah memilih untuk melindungi data anda. Sila semak semula ia untuk ketepatan sebelum memukul 'Enter'. Ini akan memulakan proses yang menyulitkan dan memasang awan baru anda. Sebaik sahaja selesai, ia akan memaparkan nama pengguna dan kata laluan yang anda boleh gunakan untuk mencapai awan anda ke alamat yang disenaraikan di atas Surat ini. Anda boleh terus menggunakan pelayar Tor dari sudut ini, atau beralih kepada pelayar yang biasa. Sila tukar kata laluan anda sebaik sahaja anda telah log masuk. -
If you run into any trouble, please contact us at info@gibberfish.org.
If you run into any trouble, please contact us at info@gibberfish.org.
Jika anda menghadapi sebarang masalah, sila hubungi kami di info@gibberfish.org. -
GIBBERFISH QUICKSTART
GIBBERFISH QUICKSTART
PANDUAN GIBBERFISH -
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started.
Selamat datang ke Gibberfish! Tumpuan kami adalah privasi dan Keselamatan anda, tetapi kita perlu anda untuk menjadi peserta yang sama. Berikut adalah beberapa cadangan untuk anda bermula. -
Never use a passphrase for your Gibberfish login that you use anywhere else.
Never use a passphrase for your Gibberfish login that you use anywhere else.
Jangan sekali-kali menggunakan frasa laluan untuk Gibberfish log masuk anda yang anda gunakan di mana-mana lagi. -
Always generate a unique passphrase for any service, account or device.
Always generate a unique passphrase for any service, account or device.
Sentiasa menjana frasa laluan yang unik untuk mana-mana perkhidmatan, akaun atau peranti. -
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault.
Kaedah ini memastikan anda hanya perlu ingat satu frasa laluan: satu untuk membuka kunci ruang simpan. -
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project.
'Memberangsangkan' ertinya prosedur-prosedur yang telah ditubuhkan atau diperiksa oleh pakar keselamatan yang boleh dipercayai. Ini termasuk, tetapi tidak terhad kepada, Electronic Frontier Foundation (keberkesanan), projek penjaga dan Tor projek. -
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities.
Kami menggunakan 'konsisten' untuk menekankan yang berselang seli penggunaan mana-mana amalan keselamatan adalah sama buruk seperti tidak menggunakan salah satu sekali. Sebaik sahaja anda membangunkan model ancaman dan strategi untuk mengalahkan ia, anda mesti menggunakan strategi tersebut setiap kali anda terlibat dalam aktiviti-aktiviti peribadi. -
Every user must understand your group’s Threat Model and consistently use the same security practices.
Every user must understand your group’s Threat Model and consistently use the same security practices.
Setiap pengguna mestilah memahami Model ancaman Kumpulan anda dan secara konsisten menggunakan amalan-amalan keselamatan yang sama. -
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
For more information on Threat Models, please refer to this excellent primer produced by the EFF.
Untuk maklumat lanjut mengenai ancaman model, sila rujuk kepada buku asas ini sangat baik yang dihasilkan oleh EFF.