Why I Encrypt My Phone Backups with GPG (and the week I nearly bricked my restore)

I stopped trusting cloud vendor encryption and started GPG‑encrypting selected phone backups. Practical steps, one real failure, and the small tradeoffs I accepted.

Written by: Arjun Malhotra

A laptop on a wooden desk with a smartphone and a cup of coffee nearby
Photo by Alejandro Escamilla on Unsplash

I was standing in the Chennai airport lounge with three hours of data left on my prepaid plan, watching a 20‑minute Google Drive upload crawl at 50 KB/s. I needed a copy of my phone’s important stuff—WhatsApp chat exports, a KeePass DB, and a set of scanned documents—to hand over to my lawyer. The upload finished hours later. Two days later I read about a cloud provider breach. The idea that my most sensitive things were sitting in plain buckets, ready to be indexed by anyone who got a key, stopped sitting well.

So I started encrypting my phone backups with GPG. Not everything, not full device images (I tried that; it broke once). Just the bits I actually care about restoring: messages, passwords, tax PDFs, passport scans, and the occasional media folder. It took an afternoon to set up and a week of missteps to get right. It’s saved me twice since then.

Why GPG and not the cloud provider’s “encrypted at rest”

What I actually back up I stopped trying to back up everything. Phones are messy. I keep an “essentials” folder on my laptop and sync it manually:

I use simple commands so restores are reproducible. Example workflow I use locally:

Why I compress before encrypting Compression after encryption is useless. Compress before encrypting to save bandwidth and storage—zstd works well and is fast on a modest laptop.

The week it almost bricked everything (my honest failure) I tried to automate everything. I wrote a cron job that symmetric‑encrypted backups with a passphrase and uploaded them. Great — until I changed my laptop and, distracted during a reinstall, used a different passphrase manager with a typo. I couldn’t decrypt the most recent month’s backups. I had to dig through old phones, old laptops, and an offline flash drive until I found a working copy. Cost to me: a frantic day of restore, skipped meetings, and a ₹1,000 courier to get a drive to my city. Lesson: never rely solely on ephemeral passphrases. Use an asymmetric key pair whose private key is backed by a hardware token or at least an air‑gapped backup.

Constraints and tradeoffs

A small checklist I actually follow

Why this actually works for me in India

An open annoyance I still haven’t solved automated, reliable account‑level backups for everything. Some apps are intentionally hostile to exports. For those, I rely on manual screenshots of settings or periodic export attempts. Not elegant. Not perfect. But better than nothing.

What I walked away with Backups aren’t guarantees; they’re rehearsals. Encrypting the stuff I actually need with keys I control forced me to test restores (and find the mistakes that would’ve been fatal). The small time cost and occasional restore friction are acceptable tradeoffs for the confidence of owning my data. If you care about a handful of documents and secrets, this is a practical, low‑cost approach that works even on slow Indian connections.