CLOUD BACKUP

CLOUD BACKUP

Anyone know of any cloud backup services that allow me to use a bare bones web service API rather than some proprietary desktop application that manages my backups for me?

I like to encrypt my own data before I send so that I can be sure I am the only entity ever that will have access to the contents.

I don't care if it's free or not. I'm willing to pay a reasonable monthly fee for a fast and reliable cloud backup service.

Attached: 415809e3898cb044881408b1cb83c959d3a09b2845a04a493e94b293e8f839d3.jpg (480x405, 18.35K)

Other urls found in this thread:

tarsnap.com/
duplicity.nongnu.org/
cryfs.org/
askubuntu.com/questions/2596/comparison-of-backup-tools
twitter.com/SFWRedditImages

TarSnap. Open source client, incremental compression before storage. Encrypted client side.

tarsnap.com/

Not interested in a client. Does TarSnap offer a web-based API?

Oh thought you meant like a remote rest api not a html interface.

Why do you want a web API when you can have the open source (heavily audited) client do the encrypted deduplication and etc for you

I am writing my own backup program that backs up to local drives and FTP. I want to include support for cloud services as well. I want to handle my own encryption.

No third-party software is safe. Look at what happened to TrueCrypt. It's always better to roll your own if at all possible.

Yes i'm sure if every person wrote their own programs that would somehow cause less critical errors

Anyways the answer is obvious. Amazon S3 buckets. Very simple API, cheap, replicated, etc.

...

As a software engineer, rolling my own solutions is a common thing for me. I wouldn't recommend everyone do it. All I want to do is stream-pre-encrypted bytes to an endpoint. This way, I lknow that I am in complete cpmtrp; pf ,u dya

Then you are a bad engineer wasting peoples time.

Not really. There are plenty of consumers will to use third party software. There will always be people like me who roll their own solutions. Plus. it has to integrate well with the other mechanics of my program like scheduling, version tracking, multiple back destinations, multiple configurable settings from which file nodes deeper in the file system hierarchy are inherited. It's a pretty nice program i have here. Just need to work on the UI with tree views and whatnot

javascript webshit retard "dev" detected

>still wants to rely on some proprietary (((cloud services))) where your account can get terminated instantly without notice, because you didn't suck enough of its tranny CEOs dick
cloud is the normalfaggot equivalent of just renting your own server and managing it on your own, basically what said

but I guess that's out of the question for some braindead monkey nigger like you

wew lad

I am a .NET developer. I do not see your point of contention with what I previously said.


>>still wants to rely on some proprietary (((cloud services))) where your account can get terminated instantly without notice, because you didn't suck enough of its tranny CEOs dick

That's a leap you went on there. If I can find a reputable service. the chances that the tranny CEO will request a dick suck would be minimal and I'd just move to another service.

Yes, I will build a UI for it. Make it easy to check boxes at any node in the file tree to customize settings for that node. Supports node inheritance where settings from parent nods flow down and are used by all child nodes unless one of the nosed wants to override a bit of inheritance

Hello pajeet.

and duplicity.nongnu.org/

install gentoo or gtfo

wew lad, you guys never heard of transparent encryption filesystems?
OP, go rent a cheap storage VPS in Europe. No "free" service will serve you truly free because they need money, ether paid directly or datamined through their web analytics web client and proprietary clients, yes some of them are even cli-based and support unix pipes but still proprietary.

cryfs.org/ and nextcloud on a VPS

rsync.net sounds like what you want.
SSH/SFTP/SCP is how you talk to it.
It gives you storage on a ZFS Z3 vol and nothing else.
I've been very happy with it personally.


TarSnap really is a good option to fall back on, it is heavily audited by BSD and security devs.

all of them. just scrap if you have to. the problem is if they require government ID such as phone number

Op here. Let me clarify something. I actually am fine with 3rd party software (earlier I said 8 wasn't), but I do not want a client as I am building my own client that backs up to local drives and ftp. I want to add support for additional support for additional destinations, hence why I was asking about a web service that I could just POST or PUT a filestream to. However, if any of these third party applications have local DLLs that I can reference in my code and access their apis directly then that would work as well.

tarsnap last I looked at it was a security joke. Most people are using it in a configuration where breaking into the system being backed up lets you delete the backups (I bet those of you using it are using it this way, be honest). The documentation points you towards setting it up like this as the standard way of using the system! It's only when you question what would happen that you might start looking deeper into the documentation for how such an attack would be prevented. To make it more secure you need a separate server that can handle pruning which means the effort and complexity of setting up a second server and keeping it secure since it's going to be running with elevated privileges nightly rather than in a much more secure design where the backups are immutable but limited so you don't have to frequently risk the use of elevated privileges. Since this is a task you only need run for a few minutes a night but has to be run on a highly secure system people look for a solution that doesn't involve wasting an entire machine and often script something up with EC2 to instantiate a VM nighty which exposes their keys to shared cloud servers running on Jewtel processors that have a new exploit every day.
It's a very OpenBSD type of "security" where it's unsafe by design, takes a huge amount of effort to make it safe, and security issues get blamed on the user for not writing half of the backup solution they're supposed to be paying for.

AWS Glacier
Backblaze B2

Attached: Untitled.png (554x254, 7.09K)

Consider one-zone-infrequent-access class (twice cheaper, but pay per access and less availability)

Go back to reddit, rails "engineer".

Good goy.

Your hosting company would be able to read your "encrypted" files though.

what the fuck is this thread

Put an ARM SBC with HDD at a relative or friend's house. Setup dyndns for it. Now you can backup your stuff over ssh.

Attached: HeavyOnTheMagick-ad.jpg (600x854, 230.73K)

Yes goy encryption is bad just use dropbox

you glow in the dark
A filesystem should be encrypted transparently thus mitigating file size and directory structure metadata, like LUKS partitions. Everything suggested in this thread aside from cryfs fucking glows in the dark 10 miles away.

Hes backing up files you idiot not encrypting his drive.

You don't have access to the box that it's on though. This means that it's possible to dump the decryption key from the machine. The encryption needs to be done locally.

You will remember this post when FBI comes after you after scanning your backed up "encrypted" files that look like this: /home/documents/loli.jpg.tar.gpg

You blind moron or what? This is exactly what transparent encryption is.

Did you not comprehend that OP wanted to back his stuff up on a remote server?
They can't prove what's inside. It's not illegal to name files things. You also could just use a generic name.

They don't care what's legal or what is not, it's still a metadata leak. Why use sub-par hacked-together amateur tools when you can mount remote encrypted partitions that don't leak file metadata.

fuck that
why the fuck would i give some company ALL my data if its already problem to share your private data

Unless the hosting company decides to dump the encryption / decryption key. Then you are leaking the whole file. Would you rather leak metadata or both the metaiata and the file itself.

Nice, didn't know about it.
It's basically what I said

You're a fucking moron. Remotely mounting a block device exposes access patterns regardless of if it's encrypted. It'd leak all sorts of details about what software you were using and what sites you were visiting and could be used to prove you were visiting a honeypot via time and size of writes. Please kill yourself before you spread your bad ideas to others.

tar c ~/gayniggers | gpg --encrypt > where-is-your-fucking-metadata\?\?\?\?.tar.gpg

Attached: 15061950750622.jpg (1358x1080, 137.25K)

Something tells me you don't understand what happened to Truecrypt. There's no evidence it was ever compromised.

Oh no, [s]it's retarded[/s] summer is starting

On average what this thread full of braindead cuckchanners suggests, it would look like this:
If you mean to pack all your files into one big archive and then send them to a remote server, you're double retarded. And it would look like this:
/backups/veryhugeassniggerfilegoodluckwithincrementallyupdatingit.tar.gpg

nice try lad

Attached: DWUw9veW0AAPSqt.jpg (1200x800, 157.16K)

duplicity.nongnu.org/
Because duplicity uses librsync, the incremental archives are space efficient and only record the parts of files that have changed since the last backup. Because duplicity uses GnuPG to encrypt and/or sign these archives, they will be safe from spying and/or modification by the server.

If you are using a VPS the host machine can take a memory dump of your server at anytime without your knowledge. For a dedicated server it will be much more secure against this, though the methods of doing so are more intrusive.

If mounted locally, what's wrong with that?

You have no clue what you are talking about, or it seems that previous poster did not elaborate more eloquently.

Well, I've read duplicity documentation and it appears to be similar to cryfs mentioned above, butt their project webpage has broken tls certificate (scares off normies) and according to my own tests, newest created tar archives spoil filesize metadata.
Although, it appears to be what is called deja dup in n00buntu. Shittiest piece of software I've dealt with back in those days of bliss ignorance.

askubuntu.com/questions/2596/comparison-of-backup-tools

That has been explained above

Even better: run Tor router with stealth hidden service address only your Tor router can read the descriptor. Stealth onions are not public so the chances of break-in are minimized. Saves you from relying on dyndns and adds a layer of security.