I find the Duplicati documentation very thourough and good to use. This is why I was quite suprised there is no article/documentation about the actual format the AES crypto module uses, and possible an alternate command line/tool to decrypt it.
I wanted to open one of the ZIP files, and possibly not use Duplicati CLI for this to verify it uses a repeatable and overall sound format. Did I just miss this doc or is it really missing? I would expect information about the secret stretching method used, the AES blockmodes, the way the parameters are generated as well as the resulting file layout.
If I really missed it let me know, I would be willing to dig into the source and extract a draft.