Update backup documentation to include the control panel
This commit is contained in:
parent
42403fbf6d
commit
ed183abeda
|
@ -24,12 +24,14 @@ As part of the Freedombone installation the GPG key used to encrypt backups will
|
|||
#+BEGIN_SRC bash
|
||||
ssh username@domainname -p 2222
|
||||
su
|
||||
freedombone-keydrive -u [username] --master
|
||||
control
|
||||
#+END_SRC
|
||||
|
||||
Select /Backup and Restore/ then /Backup GPG key to USB drive (master keydrive)/.
|
||||
|
||||
Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
|
||||
|
||||
A pro-tip for the best possible security is to create multiple USB drives containing key fragments, and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by ommitting the /--master/ option in the above command and then repeating the process with a number of different USB drives (typically 4 or more).
|
||||
A pro-tip for the best possible security is to create multiple USB drives containing key fragments (fragment keydrive), and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by selecting /fragment keydrive/ and then repeating the process with a number of different USB drives (typically 4 or more).
|
||||
* Backup to USB
|
||||
First and foremost - *encrypt your USB drives*! Even if you think you have "/nothing to hide/" if you accidentally lose a USB thumb drive (it's easy to lose small objects) and it's not encrypted then potentially someone might be able to obtain enough information about you to commit identity fraud, take out loans, open bank accounts, etc. Use LUKS encryption. In Ubuntu you can do this using the /Disk Utility/ application. Some instructions [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be found here]].
|
||||
|
||||
|
@ -40,10 +42,12 @@ Log into the system and become the root user, then run the /backup/ command.
|
|||
#+BEGIN_SRC bash
|
||||
ssh username@domainname -p 2222
|
||||
su
|
||||
backup
|
||||
control
|
||||
#+END_SRC
|
||||
|
||||
Type in the password for the USB drive, then the backup will begin.
|
||||
Select /Backup and Restore/ and then /Backup data to USB drive/.
|
||||
|
||||
Type in the LUKS password for the USB drive, then the backup will begin.
|
||||
|
||||
When the backup ends remove the USB drive and keep it somewhere safe. Even if it gets lost or falls into the wrong hands the content is encrypted and so is unlikely to become a source of leaks.
|
||||
* Restore from USB
|
||||
|
@ -52,27 +56,14 @@ Log into the system and become the root user:
|
|||
#+BEGIN_SRC bash
|
||||
ssh username@domainname -p 2222
|
||||
su
|
||||
control
|
||||
#+END_SRC
|
||||
|
||||
If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done as follows:
|
||||
If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting /Backup and Restore/ then /Restore GPG key from USB keydrive/. When that's done remove the keydrive and plug in the backup drive.
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
freedombone-recoverkey -u [username]
|
||||
#+END_SRC
|
||||
Select /Backup and Restore/ then /Restore data from USB drive/.
|
||||
|
||||
Or on a Beaglebone Black you can use the option:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
freedombone-recoverkey -u [username] --drive sda
|
||||
#+END_SRC
|
||||
|
||||
Remove any existing drive and insert the USB thumb drive containing your backup into the front socket of the Beaglebone Black, then run the command:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
restore
|
||||
#+END_SRC
|
||||
|
||||
Enter the password for the USB drive. When the restore is complete you can remove the USB drive.
|
||||
Enter the LUKS password for the USB drive. When the restore is complete you can remove the USB drive.
|
||||
* Distributed backups
|
||||
Distributed backups are a better way of ensuring the persistence of your data, such that even if your system gets stolen or destroyed then the data will still be recoverable from your friends. Since the backups are encrypted your friends (or anyone else with access to their systems) won't be able to read your backed up content even if their systems are subsequently compromised.
|
||||
|
||||
|
|
Loading…
Reference in New Issue