Nathan (gemsling) wrote,

Okay, who did that? (Oh, and thanks, BTW...)

I really only posted about because I like their service, and I wasn't actually expecting any successful referral from it.

But judging by my increased quota, someone has bought some space. Either that, or's six-monthly automatic quota increase has come around sooner than I thought... If it was you, I hope you enjoy the service. Not that there's anything to get excited about - you use it, it works, end of story.

By the way, if you're interested in the warrant canary, which warns of secret warrants, a simple script can be used to retrieve the canary notice, check the PGP signature and display the message and news headline (download the public key first):
curl -s > ~/.canary
gpgv --keyring ~/.gnupg/pubring.gpg ~/.canary
echo ' '
sed -n '/-----BEGIN PGP SIGNED MESSAGE-----/,/-----BEGIN PGP SIGNATURE-----/p' ~/.canary

With that said, if you're worried about US law enforcement getting access to your data, you should be encrypting it, and if you're encrypting it, you might not care if they do get access. has suggested duplicity as a tool for encrypting files on-the-fly as you transfer them to your account and there are other options too, all supported by the network engineers.

duplicity looks appealing (described as "encrypted bandwidth-efficient backup using the rsync algorithm"), but I'm not actually using it myself. Every security decision has a trade-off, and I figure that my online backup is already more secure than my actual computers. My data is not really that sensitive, and if it was, I should start by securing my local copies better.
Tags: tech
  • Post a new comment


    Anonymous comments are disabled in this journal

    default userpic

    Your reply will be screened

    Your IP address will be recorded