When comparing Tresorit vs duplicity, the Slant community recommends Tresorit for most people. In the question“What are the best personal file-syncing solutions?” Tresorit is ranked 5th while duplicity is ranked 15th. The most important reason people chose Tresorit is:
Encryption is performed before content gets uploaded to the cloud.
Specs
Ranked in these QuestionsQuestion Ranking
Pros
Pro Client-side encryption
Encryption is performed before content gets uploaded to the cloud.
Pro Cross-platform
With clients for Windows, Mac, iOS, Android, Windows Phone, and Blackberry.
Pro Free storage space (get additional space through bonuses)
5 GB, up to 16 GB with bonuses.
Pro Encrypted locally before sending (using GnuPG)
Data is encrypted locally before being sent, and kept encrypted by a key that is never stored on the remote machine. So you might even store your data on a public space, people would still need your key or brute force it.
Pro Bandwidth and space efficient
Duplicity uses the rsync algorithm so only the changed parts of files are sent to the archive when doing an incremental backup. For instance, if a long log file increases by just a few lines of text, a small diff will be sent to and saved in the archive. Other backup programs may save a complete copy of the file.
Pro Versioning and incremental backup
You can retrieve older versions or files you recently deleted locally even after having updated your backup.
Pro Free and open-source
Licensed under GNU GPL v2.
Pro Works with scp/ssh, ftp, rsync, Amazon S3...
Duplicity does not make many demands on its archive server. As long as files can be saved to, read from, listed, and deleted from a location, that location can be used as a duplicity backend. Besides increasing choice for the user, it can make a server more secure, as clients only require minimal access.
Pro Has a Dockerized image
Docker allows to run programs on any Linux without having to really install them, and allows to manage versions so it runs exactly the same on different machines.
Cons
Con No Telephone Support
Con Proprietary
Because the software is proprietary, there's no way to review the security practices or really know how the software operates under the hood. As such it can be considered as not safe for sensitive information.