-
Most people never really think about backups before they experience the pain of losing some data that’s important to them. This isn’t specific to Qubes. It’s human nature. The phenomenon has been widespread since the birth of computing.
-
Some people know they should make regular backups but are too lazy/forgetful/time-constrained/mental-bandwidth-constrained to do so.
Automatic backups would help both groups, while refinements to the current backup tools would help the latter group but not the former.
FWIW, the current backup tools are already in the core documentation.
I let it run while I’m doing other things or sleeping, so the effective time cost for me is just a few minutes.
This example doesn’t show that these tools fail to create adequate backups of data. Rather, it shows that the time and effort required to restore data with these tools are too high for this particular CEO’s needs. As you know, there’s an inherent trade-off between security and convenience. Part of the reason that the Qubes backup tool is less convenient is because it’s more secure. It allows you to safely restore from a backup even after an adversary has had access to that backup, which is a feature most other backup options lack.
They can’t see any of your files, because Qubes backups are always encrypted.
No, Qubes backups have built-in, automatic integrity checking.
You can write a simple shell script to handle this for you.
You can select certain qubes to be backed up by default, then you don’t have to choose them manually. You can also just have a text list of qubes, then do:
qvm-backup [...] `cat list.txt`
If you want, you can use the --passphrase-file
option.
Don’t forget to verify (i.e., test restore) the backup! As the saying goes, “Backups always succeed. It’s restores that fail.” A backup is useless if you can’t restore your data from it.
Calculating hashes is not necessary for security (see above), but it can be useful for organizational purposes.
Statement is too strong to be accurate. You can aim for something without hitting the target. Whether any given piece software is “usable enough” is a matter of opinion and depends on the specific criteria of evaluation.