restic 0.9.6+ds-2 source package in Ubuntu

Changelog

restic (0.9.6+ds-2) unstable; urgency=medium

  * dgit push-source failed with previous version, new try

 -- FĂ©lix Sipma <email address hidden>  Sun, 24 Nov 2019 14:43:28 +0100

Upload details

Uploaded by:
Debian Go Packaging Team
Uploaded to:
Sid
Original maintainer:
Debian Go Packaging Team
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Focal release universe misc

Downloads

File Size SHA-256 Checksum
restic_0.9.6+ds-2.dsc 2.3 KiB 64b34cb756e0ab84800c4c6e8b4a02eae835662439c2da02cabb8cbe4233ca5b
restic_0.9.6+ds.orig.tar.xz 19.9 MiB 56c7771aa6f714e083fff6f448767c68463c0833882aa7fa1508afc155ed41b4
restic_0.9.6+ds-2.debian.tar.xz 11.3 KiB d9f75a267991b51937d5b437df172cc2bdb3351e08a449e03c78e6a16a0ce75d

Available diffs

No changes file available.

Binary packages built by this source

restic: backup program with multiple revisions, encryption and more

 restic is a program that does backups right and was designed with the following
 principles in mind:
    - Easy: Doing backups should be a frictionless process, otherwise you might
 be tempted to skip it. Restic should be easy to configure and use, so
 that, in the event of a data loss, you can just restore it. Likewise,
 restoring data should not be complicated.
    - Fast: Backing up your data with restic should only be limited by your
 network or hard disk bandwidth so that you can backup your files every day.
 Nobody does backups if it takes too much time. Restoring backups should
 only transfer data that is needed for the files that are to be restored, so
 that this process is also fast.
    - Verifiable: Much more important than backup is restore, so restic enables
 you to easily verify that all data can be restored.
    - Secure: Restic uses cryptography to guarantee confidentiality and
 integrity of your data. The location the backup data is stored is assumed
 not to be a trusted environment (e.g. a shared space where others like
 system administrators are able to access your backups). Restic is
 built to secure your data against such attackers.
    - Efficient: With the growth of data, additional snapshots should only take
 the storage of the actual increment. Even more, duplicate data should be
 de-duplicated before it is actually written to the storage back end to save
 precious backup space.

restic-dbgsym: debug symbols for restic