Previous Entry Share Next Entry
Okay, who did that? (Oh, and thanks, BTW...)
Default
gemsling
I really only posted about rsync.net because I like their service, and I wasn't actually expecting any successful referral from it.

But judging by my increased quota, someone has bought some space. Either that, or rsync.net's six-monthly automatic quota increase has come around sooner than I thought... If it was you, I hope you enjoy the service. Not that there's anything to get excited about - you use it, it works, end of story.

By the way, if you're interested in the warrant canary, which warns of secret warrants, a simple script can be used to retrieve the canary notice, check the PGP signature and display the message and news headline (download the public key first):
#!/bin/tcsh
curl -s http://www.rsync.net/resources/notices/canary.txt > ~/.canary
gpgv --keyring ~/.gnupg/pubring.gpg ~/.canary
echo ' '
sed -n '/-----BEGIN PGP SIGNED MESSAGE-----/,/-----BEGIN PGP SIGNATURE-----/p' ~/.canary

With that said, if you're worried about US law enforcement getting access to your data, you should be encrypting it, and if you're encrypting it, you might not care if they do get access. rsync.net has suggested duplicity as a tool for encrypting files on-the-fly as you transfer them to your account and there are other options too, all supported by the rsync.net network engineers.

duplicity looks appealing (described as "encrypted bandwidth-efficient backup using the rsync algorithm"), but I'm not actually using it myself. Every security decision has a trade-off, and I figure that my online backup is already more secure than my actual computers. My data is not really that sensitive, and if it was, I should start by securing my local copies better.
Tags:

?

Log in

No account? Create an account