[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Duplicity-talk] recovering
From: |
Kenneth Loafman |
Subject: |
Re: [Duplicity-talk] recovering |
Date: |
Thu, 17 Jan 2008 06:28:11 -0600 |
User-agent: |
Thunderbird 2.0.0.6 (X11/20071022) |
Olivier Croquette wrote:
> Michael Baierl wrote, On 17/01/08 7:59:
>> Nope, that's the benefit of having GPG encryption - your backups are
>> safe. And the tutorials mention many times that you should store your
>> key also in a safe location...
>
> One alternative is to use a passphrase and no key, I am not sure how
> safe it is, but a passphrase can be remembered.
If you have a long enough passphrase, then it should be secure. The
advantage of a key is that it can be used to authenticate when a human
is not present.
So, unless you have friends at NSA who are willing to admit to and use
their cracking abilities, I would say there is no way.
One suggestion I would make is to get a USB memory stick, install an
encrypted filesystem, with a passphrase, then store a copy of all your
keys on that.
...Ken
signature.asc
Description: OpenPGP digital signature
- [Duplicity-talk] recovering, Ingrid Lohmann, 2008/01/16
- Re: [Duplicity-talk] recovering, Jacob, 2008/01/16
- Re: [Duplicity-talk] recovering, Michael Baierl, 2008/01/17
- Re: [Duplicity-talk] recovering, Olivier Croquette, 2008/01/17
- Re: [Duplicity-talk] recovering,
Kenneth Loafman <=
- Re: [Duplicity-talk] recovering, Ingrid Lohmann, 2008/01/18
- Re: [Duplicity-talk] recovering, Ingrid Lohmann, 2008/01/18
- Re: [Duplicity-talk] recovering, Peter Schuller, 2008/01/18
- Re: [Duplicity-talk] recovering, Peter Schuller, 2008/01/19
- Re: [Duplicity-talk] recovering, Peter Schuller, 2008/01/19