Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    text
    copied!<p>As VonC says, they don't ensure anything more than promising you that only admins have access to your data.</p> <p>Some hosting sites may talk about how they encrypt data on disk. That makes sense if we're talking about a laptop that might physically end up in the wrong hands, but it makes less sense for a disk sitting in a data center. The problem is that the services that run on the machine must have access to the unencrypted data and so the volume will typically be mounted when the service is running. So the encryption wont protect the data any longer and you're back to normal operating system access control.</p> <p>If you really want, you can of course run all data through the <a href="http://www.selenic.com/mercurial/hgrc.5.html#decode-encode" rel="nofollow">decode/encode filters for Mercurial</a> or use the <a href="https://gist.github.com/873637" rel="nofollow">equivalent filters for Git</a>. That means that you save encrypted data at the hosting site, but you <strong>lose most of the advantages</strong> of sites like GitHub or Bitbucket. You can no longer</p> <ul> <li>browse the code online in a meaningful way</li> <li>review pull requests</li> <li>offer tarball downloads</li> <li>etc.</li> </ul> <p>So I wouldn't recommend such an approach — if your data is so sensitive that you cannot host them online, then you should setup your own internal server. There I can recommend <a href="https://kallithea-scm.org/" rel="nofollow">Kallithea</a> which supports both Git and Mercurial.</p>
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload