restic 0.8.1-2 source package in Ubuntu

Changelog

restic (0.8.1-2) unstable; urgency=medium

  * Team upload.
  * point Vcs-* urls to salsa.d.o subproject

 -- Alexandre Viau <email address hidden>  Thu, 25 Jan 2018 16:55:55 -0500

Upload details

Uploaded by:
Debian Go Packaging Team
Uploaded to:
Sid
Original maintainer:
Debian Go Packaging Team
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
restic_0.8.1-2.dsc 2.6 KiB d0d88cf4a1a46a2b26ae6a27dc5d12aa740b1ba51036d310a41d4343a255b1ac
restic_0.8.1.orig.tar.gz 22.8 MiB 7e51fa0ef9bdbfdffead21cfe91cb576d0b38791e0eea279b3840b966908ecac
restic_0.8.1-2.debian.tar.xz 14.4 KiB c022658b004c6b79707478e4e63815a175661b362efadb29d67d959656eabf20

Available diffs

No changes file available.

Binary packages built by this source

restic: backup program with multiple revisions, encryption and more

 restic is a program that does backups right and was designed with the following
 principles in mind:
    - Easy: Doing backups should be a frictionless process, otherwise you might
 be tempted to skip it. Restic should be easy to configure and use, so
 that, in the event of a data loss, you can just restore it. Likewise,
 restoring data should not be complicated.
    - Fast: Backing up your data with restic should only be limited by your
 network or hard disk bandwidth so that you can backup your files every day.
 Nobody does backups if it takes too much time. Restoring backups should
 only transfer data that is needed for the files that are to be restored, so
 that this process is also fast.
    - Verifiable: Much more important than backup is restore, so restic enables
 you to easily verify that all data can be restored.
    - Secure: Restic uses cryptography to guarantee confidentiality and
 integrity of your data. The location the backup data is stored is assumed
 not to be a trusted environment (e.g. a shared space where others like
 system administrators are able to access your backups). Restic is
 built to secure your data against such attackers.
    - Efficient: With the growth of data, additional snapshots should only take
 the storage of the actual increment. Even more, duplicate data should be
 de-duplicated before it is actually written to the storage back end to save
 precious backup space.

restic-dbgsym: debug symbols for restic