How are blobs deduplicated with encryption?

I suggest you study these two links - restic is open source - so all is documented (better or worse but nothing is secret)

and

2 Likes