You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-1Lines changed: 9 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -83,6 +83,14 @@ Q: how is the encryption key produced from the string password given?
83
83
84
84
A: password-based key derivation function PBKDF2-HMAC-SHA256 is used with 100k iterations
85
85
86
+
## TODO/plans
87
+
88
+
* select encryption algorithm and key size, or even turn off the encryption (for the sake of speed)
89
+
* proper cleanup after interrupted/failed backup
90
+
* record time spent and throughput (I normally know when I _start_ my backups, but when the process is actually finished is not always obvious)
91
+
* add benchmark mode, so that one can select best compression and encryption settings on exact hardware
92
+
* multi-threaded compression/decompression
93
+
86
94
## Disclaimer
87
95
88
-
Although the tool is abundant with tests and coded in Rust, it's written by a human and may contain errors. The author has not responsibility on lost data of any production servers in case something goes wrong.
96
+
Although the tool is abundant with tests and coded in Rust, it's written by a human and may contain errors. The author has no responsibility on lost data of any production servers in case something goes wrong
0 commit comments