Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To me a live copy with delayed sync sounds like a backup. What defines a backup for you?


Consider the ransomware case - while all the files are being encrypted on your work machine, those encrypted versions are also syncing across live and overwriting your "backups". Or if it synchronizes deletes, accidentally deleting the file on your work machine also deletes the file from your "backup" once sync has completed.

File versioning / version history would help, if you have sufficient disk space for all the versions. But you can be more confident in the backup integrity if it is taken offline once completed - eg cloning a drive to an external drive, and then unplugging that external drive and putting it in storage until needed.


There is very little software that is ransom-safe. People talk of cloud object locking, but that's not worth anything if they just cancel the account with the vendor or go into the config and turn that lock off. For the versioning you mention, wouldn't it be possible to just cancel whatever storage you use for these versions? After how long do you delete the data then, can't an attacker encrypt all files that you haven't touched in a year (so you don't notice right away) and wait for all the old backups to be gone, then hold all your old pictures and tax documents you might still need etc. for ransom?

A pi is actually a great solution because it's quiet and tiny, so you can place it at a friend's place and use physical access whenever you need to work on it. No need for the backed-up (potentially ransomed) system to have any access to it, ever, beyond the append-only encryption/authentication key for adding new backup data.


Something that doesn't delete a file that I accidently deleted at source.


I have my syncthing configured to not do that.


What if the file is wrongly modified ?


You can configure Syncthing to keep X versions of a file for N amount of days, etc.

I don't disagree that Syncthing is not ideal as a backup solution but it can be a pretty decent one depending on your use-case.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: