How are blobs deduplicated with encryption?

I suggest you study these two links - restic is open source - so all is documented (better or worse but nothing is secret)

and

https://restic.readthedocs.io/en/latest/100_references.html#terminology

2 Likes