[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Duplicity-talk] Encrypted Diffs

From: Gabriel Ambuehl
Subject: Re: [Duplicity-talk] Encrypted Diffs
Date: Sat, 16 Jan 2010 18:59:38 +0100
User-agent: KMail/1.13.0 (Linux/2.6.31-18-generic; KDE/4.3.90; i686; ; )

On 16.1.10 Michael Orlitzky wrote:
> So, incremental encrypted backups are supposed to be hard. I've searched 
> through all of the documentation I can find (short of digging into the 
> source), and haven't been able to locate a good description of how 
> Duplicity solves the problem. If possible, can someone explain the 
> sequence of events that takes place when one creates an incremental 
> encrypted backup?
> In particular, the question I'm trying to answer is, "how do we 
> calculate the difference between two encrypted blobs?". Do GPG/tar 
> provide random access within an archive? Or does Duplicity just diff 
> whatever comes out of the stream? Etc.

As far as I understand: Duplicity downloads the encrypted rsync data stored on 
the other side (that would usually be transmitted when using rsync but 
generated on the fly by the rsync on the other end) and runs rsync algo against 
it. Works surprisingy well.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]