From: Dylan Whyte <d.whyte@proxmox.com>
To: pbs-devel@lists.proxmox.com
Subject: [pbs-devel] [PATCH v2 docs] Introduction: reword & link to encryption section
Date: Thu, 15 Oct 2020 11:58:42 +0200 [thread overview]
Message-ID: <20201015095842.21385-1-d.whyte@proxmox.com> (raw)
Add link from encryption sentence in "What is Proxmox
Backup Server?" to the Encryption section of the docs.
Also, reword the sentence.
V2:
Clarify that encryption takes place on the client side
Signed-off-by: Dylan Whyte <d.whyte@proxmox.com>
---
docs/backup-client.rst | 2 ++
docs/introduction.rst | 10 ++++++----
2 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/docs/backup-client.rst b/docs/backup-client.rst
index 946f3803..7270a37e 100644
--- a/docs/backup-client.rst
+++ b/docs/backup-client.rst
@@ -246,6 +246,8 @@ Restoring this backup will result in:
. .. file2
+.. _encryption:
+
Encryption
----------
diff --git a/docs/introduction.rst b/docs/introduction.rst
index e28331a3..142db8d5 100644
--- a/docs/introduction.rst
+++ b/docs/introduction.rst
@@ -1,7 +1,7 @@
Introduction
============
-What is Proxmox Backup Server
+What is Proxmox Backup Server?
-----------------------------
Proxmox Backup Server is an enterprise-class, client-server backup software
@@ -10,12 +10,14 @@ physical hosts. It is specially optimized for the `Proxmox Virtual Environment`_
platform and allows you to back up your data securely, even between remote
sites, providing easy management with a web-based user interface.
-Proxmox Backup Server supports deduplication, compression, and authenticated
+It supports deduplication, compression, and authenticated
encryption (AE_). Using :term:`Rust` as the implementation language guarantees high
performance, low resource usage, and a safe, high-quality codebase.
-It features strong client-side encryption. Thus, it's possible to
-backup data to targets that are not fully trusted.
+Proxmox Backup uses state of the art cryptography for client communication and
+backup content :ref:`encryption <encryption>`. Encryption is done on the
+client side, making it safer to back up data to targets that are not fully
+trusted.
Architecture
--
2.20.1
next reply other threads:[~2020-10-15 9:58 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-10-15 9:58 Dylan Whyte [this message]
2020-10-15 10:21 ` [pbs-devel] applied: " Dietmar Maurer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20201015095842.21385-1-d.whyte@proxmox.com \
--to=d.whyte@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox