Ask someone at Humbug about getting access to these backups. They are available to everyone. See http://www.humbug.org.au/SysAdmin for information on what you can do with them.
Most recent backups, as of Thu Feb 22 23:46:53 UTC 2018:
|20180217-213903__base.tar.gz||716480478||2018-02-17 21:46:11.305292134 +0000|
|20180217-213903__base.tar.gz.sha1||71||2018-02-17 21:48:09.369423805 +0000|
|20180222-233902_20180217-213903_base.rdiff.gz||2587416||2018-02-22 23:46:51.697435598 +0000|
|20180222-233902_20180217-213903_base.rdiff.gz.sha1||88||2018-02-22 23:46:53.544437517 +0000|
|20180220-023903__secret.tar.gz.gpg||35887647||2018-02-20 02:47:03.418651015 +0000|
|20180220-023903__secret.tar.gz.gpg.sha1||77||2018-02-20 02:47:03.759651294 +0000|
|20180222-233902_20180220-023903_secret.rdiff.gz.gpg||170160||2018-02-22 23:46:53.510437482 +0000|
|20180222-233902_20180220-023903_secret.rdiff.gz.gpg.sha1||94||2018-02-22 23:46:53.553437526 +0000|
The secret- files contain the files with sensitive information in them. They are encrypted with the following gpg keys. You will need one of them to decrypt it:
Backups are also put on an account owned by Humbug on Amazon S3. A log in CSV format is kept on all activities. You can download the log from here:
The fields in the log are documented under on the man page. See: rdiff-image-s3(1).