|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis|
|Borg||9,799||20 hours ago||455||other||Python|
|Deduplicating archiver with compression and authenticated encryption.|
|Kopia||4,662||21||4 hours ago||230||April 30, 2023||254||apache-2.0||Go|
|Cross-platform backup tool for Windows, macOS & Linux with fast, incremental backups, client-side end-to-end encryption, compression and data deduplication. CLI and GUI included.|
|Peazip||3,003||24 days ago||16||lgpl-3.0||Pascal|
|Free Zip / Unzip software and Rar file extractor. Cross-platform file and archive manager. Features volume spanning, compression, authenticated encryption. Supports 7Z, 7-Zip sfx, ACE, ARJ, Brotli, BZ2, CAB, CHM, CPIO, DEB, GZ, ISO, JAR, LHA/LZH, NSIS, OOo, PAQ/LPAQ, PEA, QUAD, RAR, RPM, split, TAR, Z, ZIP, ZIPX, Zstandard.|
|Zbox||1,233||1||3||2 years ago||27||September 07, 2021||11||apache-2.0||Rust|
|Zero-details, privacy-focused in-app file system.|
|Minizip Ng||1,074||a day ago||1||March 03, 2021||12||other||C|
|Fork of the popular zip manipulation library found in the zlib distribution.|
|Nippy||992||6 hours ago||4||epl-1.0||Clojure|
|The fastest serialization library for Clojure|
|Bareos||873||2||2 hours ago||17||May 09, 2022||28||other||C++|
|Bareos is a cross-network Open Source backup solution (licensed under AGPLv3) which preserves, archives, and recovers data from all major operating systems.|
|Ran||773||1||2||2 years ago||8||August 19, 2021||9||mit||Go|
|a simple static web server written in Go|
|Zbackup||769||3 years ago||1||February 27, 2018||59||C++|
|ZBackup, a versatile deduplicating backup tool|
Please note that this is the README for borg2 / master branch.
borg2 is currently in beta testing.
For the stable version's docs, please see there:
TODO: the screencasts need a remake using borg2, see there:
BorgBackup (short: Borg) is a deduplicating backup program. Optionally, it supports compression and authenticated encryption.
The main goal of Borg is to provide an efficient and secure way to back up data. The data deduplication technique used makes Borg suitable for daily backups since only changes are stored. The authenticated encryption technique makes it suitable for backups to targets not fully trusted.
Deduplication based on content-defined chunking is used to reduce the number of bytes stored: each file is split into a number of variable length chunks and only chunks that have never been seen before are added to the repository.
A chunk is considered duplicate if its id_hash value is identical. A cryptographically strong hash or MAC function is used as id_hash, e.g. (hmac-)sha256.
To deduplicate, all the chunks in the same repository are considered, no matter whether they come from different machines, from previous backups, from the same backup or even from the same single file.
Compared to other deduplication approaches, this method does NOT depend on:
All data can be optionally compressed:
We offer single-file binaries that do not require installing anything - you can just run them on these platforms:
For ease of use, set the BORG_REPO environment variable:
$ export BORG_REPO=/path/to/repo
Create a new backup repository (see
borg rcreate --help for encryption options):
$ borg rcreate -e repokey-aes-ocb
Create a new backup archive:
$ borg create Monday1 ~/Documents
Now doing another backup, just to show off the great deduplication:
$ borg create -v --stats Monday2 ~/Documents Repository: /path/to/repo Archive name: Monday2 Archive fingerprint: 7714aef97c1a24539cc3dc73f79b060f14af04e2541da33d54c7ee8e81a00089 Time (start): Mon, 2022-10-03 19:57:35 +0200 Time (end): Mon, 2022-10-03 19:57:35 +0200 Duration: 0.01 seconds Number of files: 24 Original size: 29.73 MB Deduplicated size: 520 B
Your help is always welcome!
Spread the word, give feedback, help with documentation, testing or development.
You can also give monetary support to the project, see there for details:
EXPECT THAT WE WILL BREAK COMPATIBILITY REPEATEDLY WHEN MAJOR RELEASE NUMBER CHANGES (like when going from 0.x.y to 1.0.0 or from 1.x.y to 2.0.0).
NOT RELEASED DEVELOPMENT VERSIONS HAVE UNKNOWN COMPATIBILITY PROPERTIES.
THIS IS SOFTWARE IN DEVELOPMENT, DECIDE YOURSELF WHETHER IT FITS YOUR NEEDS.
Security issues should be reported to the Security contact (or
docs/support.rst in the source distribution).