Ask someone at Humbug about getting access to these backups. They are available to everyone. See http://www.humbug.org.au/SysAdmin for information on what you can do with them.
Most recent backups, as of Sat 26 Aug 15:43:33 UTC 2023:
| File | Size | Generated |
| 20230818-063901__base.tar.gz | 745648018 | 2023-08-18 06:42:59.056005095 +0000 |
| 20230818-063901__base.tar.gz.sha1 | 71 | 2023-08-18 06:43:52.118657757 +0000 |
| 20230826-153901_20230818-063901_base.rdiff.gz | 502140 | 2023-08-26 15:43:32.499760763 +0000 |
| 20230826-153901_20230818-063901_base.rdiff.gz.sha1 | 88 | 2023-08-26 15:43:33.091745582 +0000 |
| 20230813-233902__secret.tar.gz.gpg | 35450447 | 2023-08-13 23:43:34.490930898 +0000 |
| 20230813-233902__secret.tar.gz.gpg.sha1 | 77 | 2023-08-13 23:43:34.590928380 +0000 |
| 20230826-153901_20230813-233902_secret.rdiff.gz.gpg | 39091 | 2023-08-26 15:43:33.079745890 +0000 |
| 20230826-153901_20230813-233902_secret.rdiff.gz.gpg.sha1 | 94 | 2023-08-26 15:43:33.083745788 +0000 |
The secret- files contain the files with sensitive information in them. They are encrypted with the following gpg keys. You will need one of them to decrypt it:
Backups are also put on an account owned by Humbug on Amazon S3. A log in CSV format is kept on all activities. You can download the log from here:
The fields in the log are documented under on the man page. See: rdiff-image-s3(1).