Comparison of backup software: Difference between revisions

Content deleted Content added
Cyphar (talk | contribs)
Correctly describe how restic's error detection works.
Cyphar (talk | contribs)
m fix links in restic row
Line 315:
| {{yes}}; [[Rabin fingerprint|Rabbin]] [[Rolling hash|chunking]]<ref>{{Cite web|url=https://restic.net/blog/2015-09-12/restic-foundation1-cdc|title=Introducing Content Defined Chunking (CDC)|last=|first=|date=2015-09-12|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.
| {{yes}}; [[Advanced Encryption Standard|AES-256]]-[[Block cipher mode of operation|CTR]], [[Poly1305]], with [[scrypt]] encrypted keyfiles<ref>{{Cite web|url=https://blog.filippo.io/restic-cryptography/|title=Restic Cryptography|last=Valsorda|first=Filippo|date=2017-08-29|website=|archive-url=http://web.archive.org/web/20190511020857/https://blog.filippo.io/restic-cryptography/|archive-date=2019-05-11|dead-url=|access-date=2019-06-09}}</ref>
| {{yes}}; through [[Authenticated_encryption|Authenticated encryption|Authenticated_encryption]] and [[cryptographicallyContent-hashedaddressable_storage|Cryptographic_hash_function]] [[content-addressable storage]] using a [[Cryptographic_hash_function|Content-addressable_storagecryptographic hash function]]
| {{yes}}; supports both [[Object storage|object storage]] and [[Cloud storage|traditional cloud storage]]
| {{no}}