
filtered_open ( self, mode )) File "/usr/lib64/python3.8/site-packages/duplicity/path.py", line 802, in filtered_open return gpg. filtered_open_with_delete ( u "rb" ) File "/usr/lib64/python3.8/site-packages/duplicity/dup_temp.py", line 125, in filtered_open_with_delete fh = FileobjHooked ( path. backend, File "/usr/lib64/python3.8/site-packages/duplicity/dup_main.py", line 804, in restore_get_enc_fileobj fileobj = tdp. fileobj_iter ) File "/usr/lib64/python3.8/site-packages/duplicity/dup_main.py", line 759, in get_fileobj_iter yield restore_get_enc_fileobj ( backup_set. set_tarfile () File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 348, in set_tarfile self. local_path, File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 578, in Write_ROPaths for ropath in rop_iter : File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 541, in integrate_patch_iters for patch_seq in collated : File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 407, in yield_tuples setrorps ( overflow, elems ) File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 396, in setrorps elems = next ( iter_list ) File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 126, in difftar2path_iter tarinfo_list = File "/usr/lib64/python3.8/site-packages/duplicity/patchdir.py", line 355, in _next_ self. Traceback ( innermost last ) : File "/usr/bin/duplicity", line 100, in with_tempdir ( main ) File "/usr/bin/duplicity", line 86, in with_tempdir fn () File "/usr/lib64/python3.8/site-packages/duplicity/dup_main.py", line 1538, in main do_backup ( action ) File "/usr/lib64/python3.8/site-packages/duplicity/dup_main.py", line 1618, in do_backup restore ( col_stats ) File "/usr/lib64/python3.8/site-packages/duplicity/dup_main.py", line 723, in restore if not patchdir. gpg -> temp / duplicity - a7n2sb9u - tempdir / mktemp - alqkws80 - 254 In the end GPG also encrypts the bulk of the data with AES such thatīasically the following invocation just does the trick:
BACKBLAZE UNLIMITED LINUX PASSWORD
That I only need to remember the password and not also have a GPG key to keep I have opted for symmetric encryption (AES) such But when using duplicity I can either use symmetric or asymmetricĮncryption right on my device.

The regular service thatīackblaze offers is not encrypted on the devices, so I really would not use I want to show how I did it with duplicity and why I am now back withįor my backup I really want encryption on my device.

Paying a few EUR/month for the service, so it was cheaper than SpiderOak. Unlimited data there and is billed proportional to the amount. Rates are really affordable and so I had a look at that. My friend Simon, who had the same problem, discovered that one could also use It took a while before it actually started to upload things.Īnd it seemed to use quite a bit of resources, I guess for encryption and file Their client looks nice to use and I quickly had set it up with I just needed around 150 GB of space, they used to charge 10 USD/monthįor that tier.

It works with Linux and has encryption already on my

The SpiderOak service was recommended by Edward
BACKBLAZE UNLIMITED LINUX SOFTWARE
For everything else I need somethingĮlse, so I started researching this a couple years ago.īackblaze offers a software client and unlimitedĬloud space for 5 USD/month, but just for Windows and macOS. My PhD thesisĭraft is in a private GitHub repository, so I can just push to that and have aīackup in the Microsoft cloud somewhere. The directory hierarchy had aĭirectory with time as filename and your whole directory tree below that.Īs I only do these backups every couple of weeks, there is a gap of time during Restoring is super easy,Įither use the tool or copy files manually. Hard links to create snapshots with deduplication. I routinely do backups on external hard drives using
