Doğaç Eldenk's Avatar

Doğaç Eldenk

@dogac.dev.bsky.social

Software Engineer @ CarbonHealth · Read my blog at https://blog.dogac.dev · https://github.com/Dogacel

51 Followers  |  117 Following  |  31 Posts  |  Joined: 20.11.2024  |  2.1646

Latest posts by dogac.dev on Bluesky

Aslında dediğim de onla aynı doğrultuda sanki, kişinin kendini bilmesi, kendi üzerinde neyin çalıştığını keşfetmesi, hangi “pitfall” lara düşebileceğini tahmin etmesi.

24.05.2025 22:45 — 👍 1    🔁 0    💬 0    📌 0

Başlama konusunda emin olamadım, “kervan yolda düzülür” demek bazen plan yapmaya üşenmek için bahane olabiliyor. Yerine göre, mesela beklemek yerine bazen bir şekilde başlamak daha efektif olabilir, ama plan yapmamak için başlamak genelde uzun vadede zarar gibi.

24.05.2025 22:23 — 👍 0    🔁 0    💬 1    📌 0

That's why I think we should only increase breaking change for this artifact in specific cases such as, backwards incompatible version dependency upgrades, package name changes for all etc.

At this point no developer cares if the major version increased in-between changes, it is not actionable.

06.05.2025 13:55 — 👍 0    🔁 0    💬 0    📌 0

For example service A removes an unused endpoint, it is registered as a breaking change but it is only breaking for service A, but it is a single jar, so the major version increases for everyone. Based on this, I'm pretty sure we made much more than 19 breaking changes.

06.05.2025 13:55 — 👍 0    🔁 0    💬 1    📌 0

The term "breaking-change" is loosely defined for this case. It is an internal protobuf monorepo that generates a single jar. We are doing breaking changes quite often as APIs evolve, but they shouldn't increase the major version necessarily.

06.05.2025 13:55 — 👍 0    🔁 0    💬 1    📌 0

One of our internal libraries is at v23.136.0

I think the way we do semantic versioning is totally useless at this point.

05.05.2025 23:43 — 👍 0    🔁 0    💬 1    📌 0
Preview
The Best Programmers I Know | Matthias Endler I have met a lot of developers in my life. Late…

endler.dev/2025/best-pr...

Two important things,

1. Don’t Be Afraid To Get Your Hands Dirty
2. Have Patience

There isn't much you can't tackle if you have the both traits.

22.04.2025 03:06 — 👍 0    🔁 0    💬 0    📌 0
What I'd do as a College Freshman in 2025 Do Computer Science Absolutely. Still would. Many are spooked by LLMs. Some, like Jensen Huang, argue that "nobody has to learn how to progr...

A short but effective read

muratbuffalo.blogspot.com/2025/04/what...

21.04.2025 02:08 — 👍 0    🔁 0    💬 0    📌 0

Final explanation from UMN: cse.umn.edu/cs/statement...

17.04.2025 05:15 — 👍 0    🔁 0    💬 0    📌 0

According to the apology letter, the research on stealthily introducing vulnerabilities was concluded last year and those commits were a product of a new research which aims to fix kernel security bugs. Also reverting all commits would result in losing valuable fixes.

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

Paper mentioned: raw.githubusercontent.com/QiushiWu/qiu...

Original patch that started the banning process,
lore.kernel.org/linux-nfs/20...

Apology letter from the authors,
lore.kernel.org/lkml/CAK8Kej...

Q&A:
www-users.cse.umn.edu/~kjlu/papers...

17.04.2025 05:15 — 👍 0    🔁 0    💬 2    📌 0

Looking at what the professor at UMN published in 2020,

"On the Feasibility of Stealthily Introducing
Vulnerabilities in Open-Source Software via
Hypocrite Commits"

This paper was the reason why Linux maintainers were so sceptical about the patch.

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

However another maintainer mentions he took a look at OP's patches and 3 of 4 are seemed to be adding bugs. This creates a lot of suspicion on OP's intentions and they immediately decide to revert all PR's coming from UMN (the university of the researchers) and ban them from any contribution.

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

However the OP claims those commits are auto-generated by some experimental tool and did not carry a bad intention. There is also some evidence that the same professor worked on static analysis tools.

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

> Please stop submitting known-invalid patches. Your professor is playing around with the review process in order to achieve a paper in some strange and bizarre way.
>
> This is not ok, it is wasting our time, and we will have to report this, AGAIN, to your university...

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

Couple contributors quickly join, some argue there isn't a double-free bug and some say it should be fixed in a different way.

However a major kernel developer Greg KH answered,

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

It starts with a patch on the GSS-based authentication (auth_gss.c) used within the linux kernel's SunRPC implementation. SunRPC is developed by Sun Microsystems as a part of their NFS implementation.

That patch supposedly prevents a "double-free" bug.

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0
Preview
"They introduce kernel bugs on purpose" 98 comments

This must be one of the weirdest dramas between the OSS community and Academia: lobste.rs/s/3qgyzp/the...

"They introduce kernel bugs on purpose" 🧵

17.04.2025 05:15 — 👍 0    🔁 0    💬 1    📌 0

I have just started reading abut A2A, from official documentation,

> We recommend that applications model A2A agents as MCP resources (represented by their AgentCard). The frameworks can then use A2A to communicate with their user, the remote agents, and other agents.

I am really confused.

16.04.2025 23:34 — 👍 1    🔁 0    💬 0    📌 0
Mastodon Exit Interview I am currently winding down the Mastodon bots I used to post sunrise and sunet times. The precipitating event is that the admin of the instance hosting the associated accounts demanded they be made ni...

As I end-of-life my Mastodon sunrise/sunset bot, it seems an appropriate time to vent my complaints about Mastodon as a platform. v.cx/2025/04/mast...

10.04.2025 21:20 — 👍 252    🔁 72    💬 26    📌 25
Post image

First time hitting the homepage on Hacker News. To be honest I was scared to be handling all that traffic from my home server. And here it goes, it was fun until it lasted.

16.04.2025 16:46 — 👍 1    🔁 0    💬 0    📌 0

"Indeed, for *most* of the users I tested this against, it worked very well"

I also wonder if we can measure the accuracy of this method numerically using this methodology. It should be fairly simple to get some numbers and show how good this method is!

16.04.2025 16:18 — 👍 0    🔁 0    💬 0    📌 0

Great work! Can you elaborate more on the visualization part, what are we looking at exactly? I also wonder how native / non-native speakers compare on those charts.

16.04.2025 16:17 — 👍 0    🔁 0    💬 0    📌 0

Son olarak şunu eklemeliyim, bu soru "Illegal Content" hakkındaydı. Fakat ülke bazında gelen istekler bu kadar net olmayabilir. Misal yakın zamanda konuşulan Kıbrıs meselesinde yapılan bir yorum ya bir ülkede ya da diğer ülkede illegal sayılabilir. O halde bu konunun PDS'de hiç bulunmaması lazım.

15.04.2025 22:33 — 👍 0    🔁 0    💬 1    📌 0

Block mekanizması App View'da yapıldığı için aslında PDS'e seni engellemiş insanların cevap atması ve başka viewlarda gözükmesi mümkün 😄.

Acaba blok'u kaldırırsan geçmişteki o yorumlar da gözükmeye başlıyor mu.

15.04.2025 22:21 — 👍 0    🔁 0    💬 0    📌 0

Türkiye VPN'i ile bağlandığımda da göremedim. Neye göre gösteriyor acaba.

15.04.2025 22:14 — 👍 0    🔁 0    💬 0    📌 0

Hatta PDS'ler app view'ların başını yakabilir gibi gözüküyor. Bazı yazılar bi ülkede illegal sayılabilirken diğerinde sayılmayabilir. Dolayısıyla PDS'in bunu komple kaldırması çok doğru olmaz. App View'ın engellemesi gerekir. Ama gene de PDS'in public API'dan erişilebilir.

15.04.2025 22:12 — 👍 0    🔁 0    💬 0    📌 0

Tam olarak nereden görüyorsun bunu?

15.04.2025 22:05 — 👍 0    🔁 0    💬 2    📌 0
Preview
Behind the 6-digit code: Building HOTP and TOTP from scratch A while ago, I have started working on authorization and authentication at work. This taught me a lot about how modern authentication systems work. However I have always thought One-Time Password logi...

Recently, I have written a short blog-post on One-Time Passwords. It got plenty of attention on HackerNews, so I want to share it here as well.

blog.dogac.dev/how-do-one-t...

15.04.2025 22:03 — 👍 0    🔁 0    💬 0    📌 0

but if the number of independently hosted PDSes grows, the app view will also need to be able to take down illegal content indexed from other PDS operators.

15.04.2025 22:02 — 👍 4    🔁 0    💬 0    📌 0

@dogac.dev is following 20 prominent accounts