Conversation:
Notices
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 04-Aug-2016 12:05:38 EDT
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
Had a bad experience once where a bad block on an encrypted backup invalidated the entire backup. Now I'm a big proponent of UNencrypted backups stored in a physically secured area. -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 04-Aug-2016 13:04:51 EDT
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
I was using Duplicity when I experienced the bad encrypted backup. I blamed it on CBC. But the real lesson is to verify backups and test a restore, well before you need those backups in a real disaster recovery situation. And I'm in theoretical agreement, backups *should* be encrypted *and* stored securely. -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 04-Aug-2016 13:37:11 EDT
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
!ownCloud and !Nextcloud need access to the encryption key, but the offsite storage provider does not. So, if you keep your ownClould/Nextcloud server securely on your premises then you can use an offsite storage provider and get some additional security from encrypted storage. -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 04-Aug-2016 13:40:06 EDT
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
I did not know that !ownCloud uses file-based encryption. I would like to see external storage as a single LUKS blob with its own internal filesystem.
-