Gibberfish, Inc./Gibberfish User Documentation
-
0a6dbecde00542a9e2f92f45638203739fa814d8
0a6dbecde00542a9e2f92f45638203739fa814d8
THROUGH 20 YEARS OF EFFORT, WE'VE SUCCESSFULLY TRAINED EVERYONE TO USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS. -
568aa2c5892c501e97797c8d8a0d9f8246291ab9
568aa2c5892c501e97797c8d8a0d9f8246291ab9
Thank you for signing up for Gibberfish, Inc! We have set up a private server for you and assigned it the web address: -
716591daf830db92139664709a4c157a38da56ce
716591daf830db92139664709a4c157a38da56ce
Before you can start using it, you must log in to the management portal on your server and enter a passphrase which will be used to encrypt your data. Choosing a strong encryption passphrase is essential. The stronger your passphrase is, the harder it is for an attacker to access your files. We recommend using the Diceware method to generate a passphrase at least six words long. -
cca17e9f8f0e29a3c3d6ea40026f59ed4557162f
cca17e9f8f0e29a3c3d6ea40026f59ed4557162f
Once you have selected a passphrase, please save it to a secure password manager, such as KeePass, and make a backup copy. If your server is rebooted, it will be necessary to log in and re-enter your passphrase to unlock your files. If you lose your passphrase, you will lose access to your data. We cannot reset or recover it for you. Please take a moment to create a suitable passphrase before proceeding. -
b9bbcc65c022b12c70818ed9c6d5a2ce92228ff5
b9bbcc65c022b12c70818ed9c6d5a2ce92228ff5
1. For your privacy, the management portal is only accessible through the Tor anonymity network. In order to access Tor you will need to install the Tor Browser, which is a specially modified version of Firefox. It can be downloaded at -
cc23ce34b94f660fae906317a0b0ce37ccaca7fd
cc23ce34b94f660fae906317a0b0ce37ccaca7fd
2. Open the Tor browser and type the following into the address bar: -
aff032a3de54cd7a4f0e0ddb06af612db0f3b3a5
aff032a3de54cd7a4f0e0ddb06af612db0f3b3a5
You may have noticed that this url does not use HTTPS, which is the standard for secure web browsing. This is because Tor already protects your traffic with multiple layers of encryption, making HTTPS unneccessary. -
0d08fd0b29528946967540eb91e91a7368964c44
0d08fd0b29528946967540eb91e91a7368964c44
3. Log in to the management portal: -
6ba00e05fe2ec8e8513186be725e17302bdc5dfa
6ba00e05fe2ec8e8513186be725e17302bdc5dfa
username: portal_admin
password: correct horse battery staple -
747e9557b804172d84bdf56090f04aabebb4e47b
747e9557b804172d84bdf56090f04aabebb4e47b
4. On the next screen, type in the encryption passphrase you have chosen to protect your data. Please review it for accuracy before hitting ‘Enter’. This will initiate the process of encrypting and installing your new cloud. Once complete, it will display the username and password you can use to access your cloud at the address listed at the top of this letter. You may continue to use the Tor browser from this point, or switch to a normal browser. Please change your password once you have logged in. -
d07785c939b323ca47103b533d8b43bf7f26a6c4
d07785c939b323ca47103b533d8b43bf7f26a6c4
If you run into any trouble, please contact us at info@gibberfish.org. -
5f7d480fa4927514008e72f3eb035e96233bffcc
5f7d480fa4927514008e72f3eb035e96233bffcc
GIBBERFISH QUICKSTART -
996ffebf87ef51e60cae4d598df5784f5ca8a480
996ffebf87ef51e60cae4d598df5784f5ca8a480
Welcome to Gibberfish! Our focus is on your privacy and security, but we need you to be an equal participant. Below are a couple of suggestions to get you started. -
bba61671ae04178b5b924e0030d9488d37187b59
bba61671ae04178b5b924e0030d9488d37187b59
Never use a passphrase for your Gibberfish login that you use anywhere else. -
720b984734aa10c5b048d61127c47ffa80bab954
720b984734aa10c5b048d61127c47ffa80bab954
Always generate a unique passphrase for any service, account or device. -
25a37467560719ff9074bfbc4bb3494f790ea761
25a37467560719ff9074bfbc4bb3494f790ea761
Using this method ensures you only need to remember one passphrase: the one to unlock your key vault. -
17d3ca2ac782ac79e8b6fc981177f266feb18301
17d3ca2ac782ac79e8b6fc981177f266feb18301
By ‘robust’ we mean procedures that have been established or vetted by trusted security experts. These include, but are not limited to, the Electronic Frontier Foundation (EFF), the Guardian Project and Tor project. -
1e19aa6796ef3abfdf38c00741b6a023425de6c8
1e19aa6796ef3abfdf38c00741b6a023425de6c8
We use ‘consistent’ to emphasize that the intermittent use of any security practice is as bad as not using one at all. Once you develop a threat model and a strategy to defeat it, you must apply that strategy every time you engage in private activities. -
dfac53482355c6d785945a68220e958ad0613511
dfac53482355c6d785945a68220e958ad0613511
Every user must understand your group’s Threat Model and consistently use the same security practices. -
045754cc8c7e2af2888bddc4ba5e1d2b2f13a993
045754cc8c7e2af2888bddc4ba5e1d2b2f13a993
For more information on Threat Models, please refer to this excellent primer produced by the EFF.