SSH using only strong key exchange algorithms

Oh for me as an end user it does matter. I’m a security consultant and fully understand the hardening process of a server. I will not ever use weak mechanisms in order to use a tool or program.

If this backup system is not capable of supporting newer key exchange algorithms, I will simply not use it, which is a shame because I do like it.