Pārlūkot izejas kodu

Update backup documentation to include the control panel

Bob Mottram 9 gadus atpakaļ
vecāks
revīzija
ed183abeda
1 mainītis faili ar 12 papildinājumiem un 21 dzēšanām
  1. 12
    21
      doc/EN/backups.org

+ 12
- 21
doc/EN/backups.org Parādīt failu

24
 #+BEGIN_SRC bash
24
 #+BEGIN_SRC bash
25
 ssh username@domainname -p 2222
25
 ssh username@domainname -p 2222
26
 su
26
 su
27
-freedombone-keydrive -u [username] --master
27
+control
28
 #+END_SRC
28
 #+END_SRC
29
 
29
 
30
+Select /Backup and Restore/ then /Backup GPG key to USB drive (master keydrive)/.
31
+
30
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
32
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
31
 
33
 
32
-A pro-tip for the best possible security is to create multiple USB drives containing key fragments, and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by ommitting the /--master/ option in the above command and then repeating the process with a number of different USB drives (typically 4 or more).
34
+A pro-tip for the best possible security is to create multiple USB drives containing key fragments (fragment keydrive), and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by selecting /fragment keydrive/ and then repeating the process with a number of different USB drives (typically 4 or more).
33
 * Backup to USB
35
 * Backup to USB
34
 First and foremost - *encrypt your USB drives*! Even if you think you have "/nothing to hide/" if you accidentally lose a USB thumb drive (it's easy to lose small objects) and it's not encrypted then potentially someone might be able to obtain enough information about you to commit identity fraud, take out loans, open bank accounts, etc. Use LUKS encryption. In Ubuntu you can do this using the /Disk Utility/ application. Some instructions [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be found here]].
36
 First and foremost - *encrypt your USB drives*! Even if you think you have "/nothing to hide/" if you accidentally lose a USB thumb drive (it's easy to lose small objects) and it's not encrypted then potentially someone might be able to obtain enough information about you to commit identity fraud, take out loans, open bank accounts, etc. Use LUKS encryption. In Ubuntu you can do this using the /Disk Utility/ application. Some instructions [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be found here]].
35
 
37
 
40
 #+BEGIN_SRC bash
42
 #+BEGIN_SRC bash
41
 ssh username@domainname -p 2222
43
 ssh username@domainname -p 2222
42
 su
44
 su
43
-backup
45
+control
44
 #+END_SRC
46
 #+END_SRC
45
 
47
 
46
-Type in the password for the USB drive, then the backup will begin.
48
+Select /Backup and Restore/ and then /Backup data to USB drive/.
49
+
50
+Type in the LUKS password for the USB drive, then the backup will begin.
47
 
51
 
48
 When the backup ends remove the USB drive and keep it somewhere safe. Even if it gets lost or falls into the wrong hands the content is encrypted and so is unlikely to become a source of leaks.
52
 When the backup ends remove the USB drive and keep it somewhere safe. Even if it gets lost or falls into the wrong hands the content is encrypted and so is unlikely to become a source of leaks.
49
 * Restore from USB
53
 * Restore from USB
52
 #+BEGIN_SRC bash
56
 #+BEGIN_SRC bash
53
 ssh username@domainname -p 2222
57
 ssh username@domainname -p 2222
54
 su
58
 su
59
+control
55
 #+END_SRC
60
 #+END_SRC
56
 
61
 
57
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done as follows:
58
-
59
-#+BEGIN_SRC bash
60
-freedombone-recoverkey -u [username]
61
-#+END_SRC
62
-
63
-Or on a Beaglebone Black you can use the option:
62
+If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting /Backup and Restore/ then /Restore GPG key from USB keydrive/. When that's done remove the keydrive and plug in the backup drive.
64
 
63
 
65
-#+BEGIN_SRC bash
66
-freedombone-recoverkey -u [username] --drive sda
67
-#+END_SRC
68
-
69
-Remove any existing drive and insert the USB thumb drive containing your backup into the front socket of the Beaglebone Black, then run the command:
70
-
71
-#+BEGIN_SRC bash
72
-restore
73
-#+END_SRC
64
+Select /Backup and Restore/ then /Restore data from USB drive/.
74
 
65
 
75
-Enter the password for the USB drive. When the restore is complete you can remove the USB drive.
66
+Enter the LUKS password for the USB drive. When the restore is complete you can remove the USB drive.
76
 * Distributed backups
67
 * Distributed backups
77
 Distributed backups are a better way of ensuring the persistence of your data, such that even if your system gets stolen or destroyed then the data will still be recoverable from your friends. Since the backups are encrypted your friends (or anyone else with access to their systems) won't be able to read your backed up content even if their systems are subsequently compromised.
68
 Distributed backups are a better way of ensuring the persistence of your data, such that even if your system gets stolen or destroyed then the data will still be recoverable from your friends. Since the backups are encrypted your friends (or anyone else with access to their systems) won't be able to read your backed up content even if their systems are subsequently compromised.
78
 
69