Hi Harold,

sorry for the late response.

On Fri, 15 Jun 2012 08:52:56 -0500
h...@ancell-ent.com wrote:

>   From: Shlomi Fish <shlo...@shlomifish.org>
>   Date: Fri, 15 Jun 2012 12:48:08 +0300
> 
>   [...]
> 
>   I've become interested in it because I recently decided to
>   use remote backups on http://rsync.net/ and want to keep
>   my backups' secure....
> 
> I do exactly this and it came in real handy when the 2011 Joplin
> tornado trashed my apartment, one of my systems next to my balcony
> window and my backup disks but fortunately not my main systems:
> 
> http://www.ancell-ent.com/1715_Rex_Ave_127B_Joplin/images/
> 

Sorry to hear about that.

>   Otherwise I wanted to ask a question: what I want to do is
>   have the encoded data encrypted by a password, which I
>   enter for encrypting and for decrypting, so that I can
>   still unpack/decode it if I just have access to the
>   encoded data. How can this be achieved while still making
>   the encoded data rsync-friendly? Does rsyncrypto support
>   something like that? Should I look for something else?
> 
> Well, while I didn't need it since the private key was on my
> main systems, my last ditch retrival contingency was simply
> a printout of the private key which I put copies of elsewhere. 
> As an alternative, you could encrypt that with something like
> gpg, e.g.:
> 
> gpg -c --symmetric --cipher-algo AES --passphrase "supply your own" 
> the-key-file
> 
> And then store that on rsync.net.
> 

Ah, interesting - I misunderstood you at first and thought you suggested to
encrypt the entire tarball using this method (which would beat the point
because the GPG encryption is not rsync-friendly). Thanks for the tip.

Regards,

        Shlomi Fish

> - Harold
> 
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Rsyncrypto-devel mailing list
> Rsyncrypto-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/rsyncrypto-devel



-- 
-----------------------------------------------------------------
Shlomi Fish       http://www.shlomifish.org/
List of Portability Libraries - http://shlom.in/port-libs

There are no deletionists. Only Wikipedia articles which Chuck Norris allows
to live. (By: joeyadams)

Please reply to list if it's a mailing list post - http://shlom.in/reply .

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Rsyncrypto-devel mailing list
Rsyncrypto-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rsyncrypto-devel

Reply via email to