Ask someone at Humbug about getting access to these backups. They are available to everyone. See http://www.humbug.org.au/SysAdmin for information on what you can do with them.
Most recent backups, as of Mon 25 Jun 03:45:56 UTC 2018:
|20180612-063903__base.tar.gz||534608947||2018-06-12 06:44:22.013179120 +0000|
|20180612-063903__base.tar.gz.sha1||71||2018-06-12 06:45:51.730394849 +0000|
|20180625-033904_20180612-063903_base.rdiff.gz||472414||2018-06-25 03:45:54.426060639 +0000|
|20180625-033904_20180612-063903_base.rdiff.gz.sha1||88||2018-06-25 03:45:56.053063166 +0000|
|20180610-093904__secret.tar.gz.gpg||35447016||2018-06-10 09:46:15.288147962 +0000|
|20180610-093904__secret.tar.gz.gpg.sha1||77||2018-06-10 09:46:15.567148536 +0000|
|20180625-033904_20180610-093904_secret.rdiff.gz.gpg||39581||2018-06-25 03:45:56.021063116 +0000|
|20180625-033904_20180610-093904_secret.rdiff.gz.gpg.sha1||94||2018-06-25 03:45:56.044063151 +0000|
The secret- files contain the files with sensitive information in them. They are encrypted with the following gpg keys. You will need one of them to decrypt it:
Backups are also put on an account owned by Humbug on Amazon S3. A log in CSV format is kept on all activities. You can download the log from here:
The fields in the log are documented under on the man page. See: rdiff-image-s3(1).