Hello community!

I come to you for advice. Using an m1 macbook air since 2020, I installed popos on my old 2013 macbook pro and I was quite happy with it but… I bought a steamdeck two weeks ago and exploring its desktop mode made me reconsider some choices. Using distros based on different systems, with different commands, desktop environment, etc. gets a little confusing for someone like me, who doesn’t use linux as my main machine. Do you have any advice for me? From what I understand, steamos is debian-based while popos is ubuntu-based: is that the biggest part of how a distribution works, ie commands, etc.? Good ui/ux is important for me so i should maybe use nitrux or deepin, that are debian-based, or is it a bad idea to choose a less common distro for a amateur like me?

Thanks in advance, I’m a bit lost.

  • Rustmilian@lemmy.world
    link
    fedilink
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    1 year ago

    Typing a command in the terminal is not hacking , just because you made a change to the system doesn’t mean you “hacked it”, it’s basic functionality of Linux; being no different from changing a setting, it’s just using an interactive user interface that’s text based. Additionally, Valve doesn’t put anything to block the changes; They even encourage those whom want to make these changes. There is no problem to solve.

    I’m sick of people assuming Terminal = Hacking, it’s a blatantly false stereotype that only serves to scare monger people into thinking the terminal is “1337 Haxers only”.

    Crackers and script kiddies are responsible for ruining lives and businesses.

    Script kiddies & Crackers aren’t even hackers; Hackers build their own tools; Script kiddies & Crackers are at most a customer or plagiarist.

    I hate how the media hijacked “hacking” as a catch all for malicious purposes and crime.

    Hacking is the practice of extending or exploiting a system to do something it wasn’t originally designed to do.
    This could mean modifying source code, injecting mods, exploiting a vulnerability, etc.
    Contrary to popular belief this doesn’t automatically make any of the examples ”malicious”, because if you’re using your own property or have permission it’s completely legal.