You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One feature that has been helpful when it comes to security on Duplicacy is that the actual chunk data is encrypted, even though the hashes are still available to use for deduplication. This ensures that host A can back up to the repository, but doesn't have the ability to restore, so it can't see what other hosts can do. This is useful, especially if the key could be moved to a hardware device like a Yubikey, to ensure a solid layer of security even if the backup repository password is compromised.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
One feature that has been helpful when it comes to security on Duplicacy is that the actual chunk data is encrypted, even though the hashes are still available to use for deduplication. This ensures that host A can back up to the repository, but doesn't have the ability to restore, so it can't see what other hosts can do. This is useful, especially if the key could be moved to a hardware device like a Yubikey, to ensure a solid layer of security even if the backup repository password is compromised.
Beta Was this translation helpful? Give feedback.
All reactions