The scheme described here maintains what I would call a replica, not backups. Files deleted from the source will be deleted from the replica at the next replication. That can be fine depending on the circumstances but is not what I would call a proper backup system.
A real backup system keeps deleted files for at least some period of time until they age out of the backups. That period may be shorter or longer but is an essential characteristic of a real backup system.
The author, and most readers, would probably be better off using any of a number of actual backup programs: borg, restic, hashbackup, tarsnap, others.
The scheme described here maintains what I would call a replica, not backups. Files deleted from the source will be deleted from the replica at the next replication. That can be fine depending on the circumstances but is not what I would call a proper backup system.
A real backup system keeps deleted files for at least some period of time until they age out of the backups. That period may be shorter or longer but is an essential characteristic of a real backup system.
The author, and most readers, would probably be better off using any of a number of actual backup programs: borg, restic, hashbackup, tarsnap, others.