Matsa:
> Hi CustaiCo, hi all,
>
> I've been testing persistent backups with Grsync, and reported this on
> the blueprint.
>
> Would you like to have a look there?
>
> https://tails.boum.org/blueprint/backups/#index5h2
If I understand correctly, our idea so far was to write a dedicated
interface wi
Hi CustaiCo, hi all,
I've been testing persistent backups with Grsync, and reported this on
the blueprint.
Would you like to have a look there?
https://tails.boum.org/blueprint/backups/#index5h2
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.or
intrigeri:
>> Would this be worth a Discuss or Research ticket in Redmine?
>
> Sounds like it's probably worth a Research ticket + a blueprint.
Done:
https://tails.boum.org/blueprint/backups/
https://labs.riseup.net/code/issues/7049
--
sajolida
signature.asc
Description: OpenPGP digital si
Hi,
CustaiCo wrote (04 Apr 2014 09:15:06 GMT) :
> What about something like DAR ( http://dar.linux.free.fr/ )? It already
> supports ACL backups. It already supports encrypting the archive with a
> symmentric key and a strong algorithm, and it looks like it should be
> configurable pretty easily w
sajol...@pimienta.org wrote (04 Apr 2014 09:28:28 GMT) :
> I also thought about a loopback LUKS device in a file.
This addresses the "how to encrypt the backups" problem, but I don't
see how it addresses the "how to backup the files in the first place"
one. May you please elaborate what you have i
intrigeri:
> Hi,
>
> CustaiCo wrote (17 Mar 2014 23:00:10 GMT) :
>> The backup step would ensure that persistence has been enabled and mounted,
>> and then go into /live/persistence/TailsData_unlocked/ then run something
>> that
>> would be the equivalent of something like this
>
>> tar cjf - .
On Thu, 03 Apr 2014 11:20:47 +0200
intrigeri wrote:
> CustaiCo wrote (01 Apr 2014 11:08:44 GMT) :
> > Ok, so I took a look at this. It seems mainly focused on doing
> > differential backups and backing up to cloud based storage
> > services. Is this something that one wants to do?
>
> JFTR, I
Hi,
CustaiCo wrote (01 Apr 2014 11:08:44 GMT) :
> Ok, so I took a look at this. It seems mainly focused on doing
> differential backups and backing up to cloud based storage services. Is
> this something that one wants to do?
JFTR, I would not say it's focused on the cloud. The cloud backends
wer
Sun, 30 Mar 2014 17:33:30 +0200
intrigeri wrote:
> I agree with the general idea, and will only discuss its
> implementation here.
>
> I'm wary of having to maintain yet another shiny new piece of code
> that does basically tar|gpg. I'm sure the initial implementation would
> be very straightfor
Hi,
On Sun, 30 Mar 2014 17:23:39 +0200
intrigeri wrote:
> >> > I'll admit to never having touched a line of
> >> > gtk2 in my life untill I started in on this, but the only way I
> >> > saw based on the documentation would be to fork the file picker
> >> > dialog box as the amnesia user to preven
Alan:
>>> Here the user should be prompted about where to save the backup.
>>> Because there might not be enough RAM on the computer to handle
>>> that, so they might prefer to write that file directly in some
>>> other place, like an external hard drive or USB stick.
>>
>> I was thinking about tha
Hi,
CustaiCo wrote (17 Mar 2014 23:00:10 GMT) :
> The backup step would ensure that persistence has been enabled and mounted,
> and then go into /live/persistence/TailsData_unlocked/ then run something that
> would be the equivalent of something like this
> tar cjf - . | gpg --cipher-algo AES -c
Hi,
Alan wrote (28 Mar 2014 23:34:08 GMT) :
>> I was thinking two seperate items: Backup persistent volume and
>> Restore Persistent Volume. In fact, I was wondering if restore was
>> even going to be worth it considering how little it would be used
>> compared to backup. I would certainly hope on
CustaiCo wrote (28 Mar 2014 14:30:49 GMT) :
> Hrm, the apt cache is a pretty big part of my current backups. I'm not
> sure this would make it into the first version, however. If you have
> the apt list and packages stored, it's likely for a reason. Honestly, I
> like 'backup all the things' approa
Hi,
CustaiCo wrote (29 Mar 2014 16:44:27 GMT) :
> On Fri, 28 Mar 2014 23:34:08 +
> Alan wrote:
>> I would avoid running a GUI as root and rather running the GUI as
>> amensia or a dedicated user and execute precise actions through
>> policykit (execute a command with pkexec or implement a db
On Fri, 28 Mar 2014 23:34:08 +
Alan wrote:
> > > Here the user should be prompted about where to save the backup.
> > > Because there might not be enough RAM on the computer to handle
> > > that, so they might prefer to write that file directly in some
> > > other place, like an external hard
Hi,
On Fri, 28 Mar 2014 14:30:49 +
CustaiCo wrote:
> Thu, 27 Mar 2014 13:51:32 +
> From: sajol...@pimienta.org
>
> > > The backup step would ensure that persistence has been enabled and
> > > mounted, and then go into /live/persistence/TailsData_unlocked/
> > > then run something that wo
Thu, 27 Mar 2014 13:51:32 +
From: sajol...@pimienta.org
> > The backup step would ensure that persistence has been enabled and
> > mounted, and then go into /live/persistence/TailsData_unlocked/
> > then run something that would be the equivalent of something like
> > this
> >
> > tar cjf - .
CustaiCo:
> I am interested in working on getting https://labs.riseup.net/code/issues/5301
> "Clone or Backup Persistent Volume" implemented.
Thanks a lot for starting that discussion and sorry for the delay. This
would definitely be a nice feature to have but the people in the core
team, we won't
I am interested in working on getting https://labs.riseup.net/code/issues/5301
"Clone or Backup Persistent Volume" implemented. My current process is to just
make an encrypted tarball as root while offline, but that's a real pain
because there are lots of times I want to get a backup of something
20 matches
Mail list logo