Conversation:
Notices
-
Had a bad experience once where a bad block on an encrypted backup invalidated the entire backup. Now I'm a big proponent of UNencrypted backups stored in a physically secured area.
-
I was using Duplicity when I experienced the bad encrypted backup. I blamed it on CBC. But the real lesson is to verify backups and test a restore, well before you need those backups in a real disaster recovery situation. And I'm in theoretical agreement, backups *should* be encrypted *and* stored securely.
-
!ownCloud and !Nextcloud need access to the encryption key, but the offsite storage provider does not. So, if you keep your ownClould/Nextcloud server securely on your premises then you can use an offsite storage provider and get some additional security from encrypted storage.
-
I did not know that !ownCloud uses file-based encryption. I would like to see external storage as a single LUKS blob with its own internal filesystem.