[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Duplicity-talk] Encrypted Diffs

From: Michael Orlitzky
Subject: [Duplicity-talk] Encrypted Diffs
Date: Fri, 15 Jan 2010 15:00:24 -0500
User-agent: Thunderbird (X11/20090817)

So, incremental encrypted backups are supposed to be hard. I've searched through all of the documentation I can find (short of digging into the source), and haven't been able to locate a good description of how Duplicity solves the problem. If possible, can someone explain the sequence of events that takes place when one creates an incremental encrypted backup?

In particular, the question I'm trying to answer is, "how do we calculate the difference between two encrypted blobs?". Do GPG/tar provide random access within an archive? Or does Duplicity just diff whatever comes out of the stream? Etc.

Since we can't send the encryption key to the server, does the entire backup history need to be downloaded during this process?

reply via email to

[Prev in Thread] Current Thread [Next in Thread]