restic 0.9.2+ds-2 source package in Ubuntu

Changelog

restic (0.9.2+ds-2) unstable; urgency=medium

  * add golang-github-mattn-go-isatty-dev build-dependency (Closes: #909414)
  * bump Standards-Version to 4.2.1 (no change required)

 -- FĂ©lix Sipma <email address hidden>  Mon, 24 Sep 2018 10:01:51 +0200

Upload details

Uploaded by:
Debian Go Packaging Team on 2018-09-24
Uploaded to:
Sid
Original maintainer:
Debian Go Packaging Team
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Cosmic release on 2018-10-10 universe misc

Downloads

File Size SHA-256 Checksum
restic_0.9.2+ds-2.dsc 2.7 KiB 60080e4c8908b2d171dff9b2328484584278cf531114d77d916cda8a4fea53ef
restic_0.9.2+ds.orig.tar.gz 22.5 MiB 59376e2c6ca1754d025f623565b765dbd45677d143dedb5566dcaa035307da9e
restic_0.9.2+ds-2.debian.tar.xz 15.4 KiB 9714aefe9ab911c1f204ee0a89d98e26a222f8607d22ba62807893d1792bda47

No changes file available.

Binary packages built by this source

restic: backup program with multiple revisions, encryption and more

 restic is a program that does backups right and was designed with the following
 principles in mind:
    - Easy: Doing backups should be a frictionless process, otherwise you might
 be tempted to skip it. Restic should be easy to configure and use, so
 that, in the event of a data loss, you can just restore it. Likewise,
 restoring data should not be complicated.
    - Fast: Backing up your data with restic should only be limited by your
 network or hard disk bandwidth so that you can backup your files every day.
 Nobody does backups if it takes too much time. Restoring backups should
 only transfer data that is needed for the files that are to be restored, so
 that this process is also fast.
    - Verifiable: Much more important than backup is restore, so restic enables
 you to easily verify that all data can be restored.
    - Secure: Restic uses cryptography to guarantee confidentiality and
 integrity of your data. The location the backup data is stored is assumed
 not to be a trusted environment (e.g. a shared space where others like
 system administrators are able to access your backups). Restic is
 built to secure your data against such attackers.
    - Efficient: With the growth of data, additional snapshots should only take
 the storage of the actual increment. Even more, duplicate data should be
 de-duplicated before it is actually written to the storage back end to save
 precious backup space.

restic-dbgsym: debug symbols for restic