Ask someone at Humbug about getting access to these backups. They are available to everyone. See http://www.humbug.org.au/SysAdmin for information on what you can do with them.
Most recent backups, as of Tue Dec 12 03:47:25 UTC 2017:
|20171204-013903__base.tar.gz||712389040||2017-12-04 01:46:38.493373793 +0000|
|20171204-013903__base.tar.gz.sha1||71||2017-12-04 01:48:22.142328432 +0000|
|20171212-033903_20171204-013903_base.rdiff.gz||4731734||2017-12-12 03:47:24.063237230 +0000|
|20171212-033903_20171204-013903_base.rdiff.gz.sha1||88||2017-12-12 03:47:25.812236256 +0000|
|20171007-103905__secret.tar.gz.gpg||38132967||2017-10-07 10:56:39.416196539 +0000|
|20171007-103905__secret.tar.gz.gpg.sha1||77||2017-10-07 10:56:47.816206448 +0000|
|20171212-033903_20171007-103905_secret.rdiff.gz.gpg||45672||2017-12-12 03:47:25.744236294 +0000|
|20171212-033903_20171007-103905_secret.rdiff.gz.gpg.sha1||94||2017-12-12 03:47:25.765236283 +0000|
The secret- files contain the files with sensitive information in them. They are encrypted with the following gpg keys. You will need one of them to decrypt it:
Backups are also put on an account owned by Humbug on Amazon S3. A log in CSV format is kept on all activities. You can download the log from here:
The fields in the log are documented under on the man page. See: rdiff-image-s3(1).