Admin on the slrpnk.net Lemmy instance.

He/Him or what ever you feel like.

XMPP: [email protected]

Avatar is an image of a baby octopus.

  • 13 Posts
  • 744 Comments
Joined 3 years ago
cake
Cake day: September 19th, 2022

help-circle
  • You are funny. That article links directly to what media typically refers to, i.e. “mass media”.

    Ask any typical person around you what they understand if you talk about “the media”, and they will confirm that this indeed refers to what I am talking about.

    The “social” qualifier is a direct reference to how normal media is a one way street and how publishing is only open to a selected few and that is what sets “social media” apart from it.


  • No, that is not what “media” means. That might be what the original word in Latin meant, but in English it is used to refer to things like newspapers, TV channels and so on, and “social media” is a direct reference to that.

    A social network is social media that allows to form groups or communities. Two people communicating is not a network, the whole point of a network is interconnection between members of a group.

    Indeed, and that is why I don’t really agree to classify WhatsApp as a social network, but it has chat groups, so it is closer to a social network than social media.


  • Wat? Sorry, but your definition is even further from anything that could be called a consensus. You could maybe argue that WhatsApp is a social network, but it definitly isn’t social media and it is completly outlandish to claim so. Where do you even get the “media” part in it? You know, compound words are still made up of individual words that have a meaning by themself. Kinda funny that you accuse me of “making up definitions” 🙄

    But sure there are some blurry edges between them. For example, Instagram is primarily used for social media, but the direct messages are more used like a social network.








  • I didn’t say TV is social media, I said social media is like TV is the sense that it is a one-to-many medium. I could have also used TikTok to explain the difference, but people here are clearly confused about the destinction and it would have been less clear.

    pseudonymous forum where its not common for users to become friends or know each other

    This isn’t really true for regular commenters. There are even feuds between specific users and so on. I agree though that there are constant attempts by some people who try to make Lemmy more like social media by advocating for dissolving the destinction between communities and instances to turn Lemmy into a dumb meme and news posting app for entertainment purposes.



  • First of all I would recommend you use Piefed instead. Easier to setup and maintain.

    But I am not sure exactly what you want that Lemmy/Piefed instance for? As an internal forum of sorts? That can work, but is not really what it was developed for and there are better (non-federated) options.

    If you want it to be an actually federated instance then the Rasberry will not cut it. The desktop might, if it has some good SSD storage for the database.

    For in game voice-chat the simplest option is a Mumble server. Very low resource use and runs great on a Rasberry like yours. Otherwise you could also try setting up a Movim instance. It has text chat and voice/video calls that should reasonably work as a Discord substitute for small groups. It is also quite low resource and should run fine on that Rasberry.






  • As others have mentioned there are ssh keys and generally you can and should of course use a password manager.

    However there is IMHO a huge blindspot of people using only SSH keys to long in, and that is that your day-to-day dev PC is actually more likely to be compromised in some way than the server that only runs specific, relatively well defined applications and overall just has less attack surface. And the ssh keys on your dev PC are really not very securely stored and thus quite easily compromised.

    Hardware keys are of course a better solution, but I would personally recommend to use a 2FA solution that prevents access even when one factor (ssh keys or passwords) is compromised.