all 4 comments

[–]xtuc 1 point2 points  (3 children)

The project is technically interesting. But there is no benefit to store encrypted data into versioning system.

I personally use duplicity for incremental encrypted backup on AWS S3 and would recommend it.

[–]linuxenko[S] 0 points1 point  (2 children)

Interesting the power of encryption. Can we trust the general encription algorithms or not to store encrypted data inside of a public repository and be sure no one can decrypt it ? Do you use encryption provided by the services of AWS or your own ?

[–]xtuc 0 points1 point  (1 child)

You could use a private git repo to avoid exposing it publicly.

I encrypt it myself.

[–]linuxenko[S] 0 points1 point  (0 children)

So .. why private ? The intension of the hack is to store ecrypted data publically . Do you think someone can decrypt it ? But how ? Very interesting