TW

Results 2663 comments of TW

> How does authenticated compare to none when it comes to accidental tampering (either by mistake, or possible hardware issues) with a repo? Is there a difference when it comes...

Additional to the above borg 1.x info, borg2 will use faster AEAD crypto algorithms (e.g. AES-OCB or Chacha20-Poly1305) that compose encryption and authentication internally, which can be faster than the...

Yes, i think it is reasonable to reconsider this. Did you see there is now also `borg benchmark cpu`? It's a more synthetic benchmark only for the misc. algorithms, but...

Thanks for the PR! Yes, guess this would be a good new feature, we even have a related ticket #4549. I only had a quick glance at the code: -...

Quite a lot of tests are failing. This is because fido2 related code gets used even if it was not explicitly requested (and there usually is no fido2 device while...

IIRC, the repo index and the usage of segments is an implementation detail of this k/v store implementation. if we had another backend for kv storage, it could work completely...

#8332 solved half of this: - a smart server is not needed any more, any kv store implemented as borgstore backend would do (currently there is sftp as a remote...

Well, I don't install pynacl directly, it is just a requirement for a requirement for ... Setting MAKE would change the make used for everything built, isn't that potentially causing...

https://github.com/jedisct1/libsodium/discussions/1492

Workaround: - even when doing local backups, use `wanteduser@localhost:repo`. - optionally, use BORG_RSH additionally to avoid everything going via ssh.