Ask someone at Humbug about getting access to these backups. They are available to everyone. See http://www.humbug.org.au/SysAdmin for information on what you can do with them.
Most recent backups, as of Sun Oct 22 02:49:23 UTC 2017:
|20171017-213902__base.tar.gz||708285616||2017-10-17 21:47:04.614293428 +0000|
|20171017-213902__base.tar.gz.sha1||71||2017-10-17 21:48:45.094364251 +0000|
|20171022-023903_20171017-213902_base.rdiff.gz||2712689||2017-10-22 02:49:21.623639534 +0000|
|20171022-023903_20171017-213902_base.rdiff.gz.sha1||88||2017-10-22 02:49:23.728641518 +0000|
|20171007-103905__secret.tar.gz.gpg||38132967||2017-10-07 10:56:39.416196539 +0000|
|20171007-103905__secret.tar.gz.gpg.sha1||77||2017-10-07 10:56:47.816206448 +0000|
|20171022-023903_20171007-103905_secret.rdiff.gz.gpg||36844||2017-10-22 02:49:23.660641453 +0000|
|20171022-023903_20171007-103905_secret.rdiff.gz.gpg.sha1||94||2017-10-22 02:49:23.698641489 +0000|
The secret- files contain the files with sensitive information in them. They are encrypted with the following gpg keys. You will need one of them to decrypt it:
Backups are also put on an account owned by Humbug on Amazon S3. A log in CSV format is kept on all activities. You can download the log from here:
The fields in the log are documented under on the man page. See: rdiff-image-s3(1).