May I suggest an alternative that I use in these cases? It works well, encrypts data and authentication and has additional benefits like the fact that nothing more than the bare restic executable has to be on the exposed client.
2 Likes