restic 0.8.1-1 source package in Ubuntu

Changelog

restic (0.8.1-1) unstable; urgency=medium

  * New upstream version 0.8.1
  * generate zsh completion (Closes: #883446)
  * bump Standards-Version to 4.1.3 (no change required)
  * move to salsa.debian.org

 -- FĂ©lix Sipma <email address hidden>  Fri, 05 Jan 2018 11:47:08 +0100

Upload details

Uploaded by:
Debian Go Packaging Team
Uploaded to:
Sid
Original maintainer:
Debian Go Packaging Team
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
restic_0.8.1-1.dsc 2.6 KiB 4be47566dccd402204180638963093bb50584a135c4bb752e0bb98e313e21c47
restic_0.8.1.orig.tar.gz 22.8 MiB 7e51fa0ef9bdbfdffead21cfe91cb576d0b38791e0eea279b3840b966908ecac
restic_0.8.1-1.debian.tar.xz 14.4 KiB d167032863b614b1576f24210c0e7d814534b2c1750bad0872d82337959bd5b6

Available diffs

No changes file available.

Binary packages built by this source

restic: backup program with multiple revisions, encryption and more

 restic is a program that does backups right and was designed with the following
 principles in mind:
    - Easy: Doing backups should be a frictionless process, otherwise you might
 be tempted to skip it. Restic should be easy to configure and use, so
 that, in the event of a data loss, you can just restore it. Likewise,
 restoring data should not be complicated.
    - Fast: Backing up your data with restic should only be limited by your
 network or hard disk bandwidth so that you can backup your files every day.
 Nobody does backups if it takes too much time. Restoring backups should
 only transfer data that is needed for the files that are to be restored, so
 that this process is also fast.
    - Verifiable: Much more important than backup is restore, so restic enables
 you to easily verify that all data can be restored.
    - Secure: Restic uses cryptography to guarantee confidentiality and
 integrity of your data. The location the backup data is stored is assumed
 not to be a trusted environment (e.g. a shared space where others like
 system administrators are able to access your backups). Restic is
 built to secure your data against such attackers.
    - Efficient: With the growth of data, additional snapshots should only take
 the storage of the actual increment. Even more, duplicate data should be
 de-duplicated before it is actually written to the storage back end to save
 precious backup space.

restic-dbgsym: debug symbols for restic