Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I use the same, just I sent incremental encrypted ZFS snapshots. These are a game changer since the target can import them and verify that they work without ever needing the key


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: