Hello,
Obviously, Duplicacy can protect against a ransomware attack where local files are encrypted and then a scheduled backup is made (which would now contain all of the newly encrypted files at a new backup revision) - the simple answer being to restore a previous version from a backup destination. But does Duplicacy offer any kind of protection against a ransomware attack that may get the app keys for, say, cloud storage from the local keyring or some other source and then encrypt or alter the cloud storage where the backup data is contained? My concern would be having my backup on the cloud encrypted as well and then having no access to perform the restore I previously mentioned. I haven’t seen any relevant discussion about this topic specifically on this forum or elsewhere. I understand this is more a question of securing the cloud app keys but I think this is a valid question and I’m curious about 1) what measures, if any, Duplicacy has to deal with this or prevent it, and 2) what others do to prevent such a situation or recover from it. A cold copy backup would work for this but I have no desire to burn 800 DVDs if you get what I mean.
Thank you
relies on hiding the files for fossil collection? Don’t hidden files on B2 get deleted after the retention policy days? And doesn’t this break the
)? I highly doubt. People who care to use duplicacy not only are minority, but likely have multiple other backups, or restrictive access to buckets, or bucket replication, etc, and generally make poor (high cost low reward) targets, and are less likely to get ransomware in the first place (if you know about backup you probably also know not to click random links and execute downloaded stuff indiscriminately, keep your machine patched, firewalls working, etc) . Unless you are targeted specifically – but then it’s a different story entirely.