[ale] 26G to backup

Wolf Halton wolf.halton at gmail.com
Tue Jan 3 08:37:24 EST 2012


On Sat, Dec 31, 2011 at 5:29 PM, Scott Castaline <skotchman at gmail.com>wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 12/31/2011 12:06 PM, Jim Kinney wrote:
> >
> >
> > On Sat, Dec 31, 2011 at 11:53 AM, David Tomaschik
> > <david at systemoverlord.com <mailto:david at systemoverlord.com>>
> > wrote:
> >
> > On Sat, Dec 31, 2011 at 9:12 AM, Jim Kinney <jim.kinney at gmail.com
> > <mailto:jim.kinney at gmail.com>> wrote:
> >> The big headache is the time required to maintain the integrity
> >> of
> > the data.
> >> As was pointed out earlier, encryption is a problem looking to
> > happen. Save
> >> yourself the headache and buy a data safe instead and park the
> > archives
> >> there. Unless the data is clearance level stuff now and already
> >> stored encrypted, don't bother. If the media is stolen, the
> >> encryption
> > WILL be
> >> cracked so it only make the maintenance cycle worse.
> >
> > I've got to disagree here.  The most likely scenario for a theft
> > of your drives is a common house burglar.  They might plug a hard
> > drive in or see whats on a DVD, but they're certainly not going to
> > break encryption.  I have plenty of data I don't want anyone
> > perusing (mostly financial data -- 1040s, W2s, paystubs, etc.) and
> > LUKS encryption on the hard drives my backups reside on should be
> > plenty to deter "casual" snooping if the drive gets stolen.
> >
> >
> > Point taken. If they went through my safe to get the backups, they
> > are likely sophisticated enough to also use the wrench process to
> > get the key from as well. So I rely on physical security for
> > archives and encryption for mobile data.
> >
> >
> > Plus, if the drive is encrypted and later fails, you don't have to
> > worry about whether there's some data that's still recoverable,
> > etc.
> >
> >
> > Old drive platters make nice wind chimes :-)
>
> Also good analog clock faces
> >
> >
> > The only entities with the resources to break any currently decent
> > cryptosystem (e.g., 128-bit AES) are large corporations and
> > governments, and they'll just use the WRENCH method for
> > decryption: http://xkcd.com/538/
> >
> >
> > Thus all my pr0n is encrypted to give them something to sort
> > through :-D
> >
> >
> > -- David Tomaschik, RHCE, LPIC-1 System Administrator/Open Source
> > Advocate OpenPGP: 0x5DEA789B http://systemoverlord.com
> > david at systemoverlord.com <mailto:david at systemoverlord.com>
> > _______________________________________________ Ale mailing list
> > Ale at ale.org <mailto:Ale at ale.org>
> > http://mail.ale.org/mailman/listinfo/ale See JOBS, ANNOUNCE and
> > SCHOOLS lists at http://mail.ale.org/mailman/listinfo
> >
> >
> >
> >
> > -- -- James P. Kinney III
> >
> > As long as the general population is passive, apathetic, diverted
> > to consumerism or hatred of the vulnerable, then the powerful can
> > do as they please, and those who survive will be left to
> > contemplate the outcome. - ////2011 Noam Chomsky
> >
> > http://heretothereideas.blogspot.com/ ////
> >
> >
> > _______________________________________________ Ale mailing list
> > Ale at ale.org http://mail.ale.org/mailman/listinfo/ale See JOBS,
> > ANNOUNCE and SCHOOLS lists at http://mail.ale.org/mailman/listinfo
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iQIcBAEBAgAGBQJO/4yuAAoJEIefqZ0kni1dkPoQAKlq/8UxAYjr74DcRtdyqe0+
> O8WAdrzwpIr07dfxZvBvRUsuSDjzje1So/4J6HA0+GrI3YJFv5qXvLJ7SDvETzMB
> M/mnflnkdWuFSMtLf01THlEKLtAilUYNT1Zz3X1ZM/3xGq5wK88xWI8kNG8WFzeG
> jnU6RIUGJPcyTBV9neqLXzvYc3mhR1j/I+rQJwaqIYjSgoHwHfAJY4iV1JfHOaaz
> rCXa/Jrwlat1SqMPr+luBX3J4Tj0uAvF6mo5MNpnAiakgeOojOiCYJWp5H7kN1Pv
> zrjHH8alUQ/Ej593u+agw8YDF5a6Whi/cwk2vtGSl/Wy4coE97KRd+GCt4Cjk2Vd
> vCBAISynXE4IlUT4MXmgYUsUX6mixs4eI8LnAvXh1wHGMRUT3vP/naCoalx2FRBh
> 7yegd+iegY6tyDCZIs+IB4qzPTpn8A9JAZb3qFRVZ0db2MXx6Bi/Wmj1ykHj4yjR
> 5IBnkr/fyhYozwB2rVi7l4wNr6HhOratdEqBI15/3FWji19wVklAcWBiznJgApu5
> 0Kbh1dZNQrZsEF1eGvu5r+lggtWhBrlZivqAzW/QuxnLdIR3wjvn8OPv/9mwyyoo
> AerYEaBd4hU8VZvYNbpr/NJtZsbErYgdgADqye9lxjQQtKiepVUnQuyJ+6l4bGvO
> 4NcnFWxoQ+4cQZ1c2sq0
> =3mcm
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
>
I think tarballs and rsync to alternate machines is more straightforward
than any of the backup applications I have been looking at.  First tarball
the data and keep it locally, in case the problem is corrupted data, and
then weekly, run the stuff to a backup server or servers in case the whole
server goes down.

Wolf Halton
-- 
This Apt Has Super Cow Powers - http://sourcefreedom.com
Advancing Libraries Together - http://LYRASIS.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.ale.org/pipermail/ale/attachments/20120103/94e72ee3/attachment.html 


More information about the Ale mailing list