1
0
Fork 0
mirror of https://gitlab.com/famedly/conduit.git synced 2025-06-27 16:35:59 +00:00

docs: guide to moderating media

This commit is contained in:
Matthias Ahouansou 2025-05-07 13:03:55 +01:00
parent a189b66ca6
commit 0528eb5928
No known key found for this signature in database
3 changed files with 35 additions and 0 deletions

View file

@ -9,6 +9,8 @@
- [Debian](deploying/debian.md)
- [Docker](deploying/docker.md)
- [NixOS](deploying/nixos.md)
- [Administration](administration.md)
- [Media](administration/media.md)
- [TURN](turn.md)
- [Appservices](appservices.md)
- [FAQ](faq.md)

3
docs/administration.md Normal file
View file

@ -0,0 +1,3 @@
# Administration
This chapter describes how to perform tasks you may want to do while running Conduit

View file

@ -0,0 +1,30 @@
# Media
While running Conduit, you may encounter undesirable media, either from other servers, or from local users.
## From other servers
If the media originated from a different server, which itself is not malicious, it should be enough
to use the `purge-media-from-server` command to delete the media from the media backend, and then
contact the remote server so that they can deal with the offending user(s).
If you do not need to media deleted as soon as possible, you can use retention policies to only
store remote media for a short period of time, meaning that the media will be automatically deleted
after some time. As new media can only be accessed over authenticated endpoints, only local users
will be able to access the media via your server, so if you're running a single-user server, you
don't need to worry about the media being distributed via your server.
If you know the media IDs, (which you can find with the `list-media` command), you can use the
`block-media` to prevent any of those media IDs (or other media with the same SHA256 hash) from
being stored in the media backend in the future.
If the server itself if malicious, then it should probably be [ACLed](https://spec.matrix.org/v1.14/client-server-api/#server-access-control-lists-acls-for-rooms)
in rooms it particpates in. In the future, you'll be able to block the remote server from
interacting with your server completely.
## From local users
If the undesirable media originates from your own server, you can purge media uploaded by them
using the `purge-media-from-users` command. If you also plan to deactivate the user, you can do so
with the `--purge-media` flag on either the `deactivate-user` or `deactivate-all` commands. If
they keep making new accounts, you can use the `block-media-from-users` command to prevent media
with the same SHA256 hash from being uploaded again, as well as using the `allow-registration`
command to temporarily prevent users from creating new accounts.