About:

Dorota is a software developer and consultant with a passion for Free Software and Rust programming.

Website:

Specializations:

Interests:

Free Software Rust programming Hackerspaces Camera processing Cartography PCB design Embedded and systems programming

Outgoing Links:

Jens Gustedt
Subscribe to RSS:
In a talk about the state of Open Source software, the author argues that while Open Source has made significant strides, it has not fully 'won' due to the pervasive presence of closed software in everyday devices. The author disc...
The post discusses the concept of DMABUF (Direct Memory Access Buffer) in the context of the Linux video subsystem, particularly for the Librem 5. It explains how DMABUF allows for efficient data transfer between devices like came...
The author reviews their experiences and challenges in developing input methods for Wayland, emphasizing the gap between user needs and technical solutions.

0libobscura

2024-11-05

Libobscura is a new camera library for Linux that aims to be user-friendly, easy to contribute to, and support various devices. It is a funded project that is currently in the proof of concept stage, with goals to achieve in the f...

0IPv6 in your home

2024-11-05

The text discusses the importance of IPv6 and the issues with IPv4 addresses running out. It explains the benefits of IPv6, how to set it up, and the use of ULA.

0Bike dynamo

2024-03-07

The text discusses the use of a bike dynamo to produce electricity for charging devices while on a bike tour. It explains the challenges of using a dynamo, including voltage, current, and power estimation, and provides solutions f...
The text discusses the challenges of input methods on the Librem 5 phone, focusing on the Wayland protocol. The author describes the limitations of existing protocols and the mistakes made in creating new ones, including the inabi...

0After Rustlab

2023-11-25

The author attended the RustLab conference and found a talk on confidential computing interesting. The talk discussed the concept of confidential computing, trusted computing, and the root of trust. It highlighted the importance o...

0Two-factor login

2023-10-29

The text discusses the importance of two-factor login for security, particularly using a hardware token. It provides a guide on how to enable two-factor authentication with a password and a smart card on Fedora 37, including setti...
The text discusses the challenges of finding non-English speech synthesis solutions on the English-language Internet and the author's experience with finding RHVoice for non-English speech synthesis.
The text provides a guide to tech conferences, offering advice on how to make the most out of the experience, including tips on becoming a speaker, participating in self-organized events, choosing hotels, bringing gadgets, and eng...

0Style me

2023-08-11

The text discusses the introduction of a new section on the website called 'Styles', which is a return to the roots and a revolution that gives control of the web experience back to the user. It emphasizes the use of user styles t...
The text discusses the challenges of debugging Rust in QtCreator and the author's efforts to create a helpers.py file to decode Rust types for the debugger panel. The limitations of the project and the need for a stable ABI for de...

0SSH keys everywhere

2023-06-18

The blog post discusses the use of SSH keys in TLS connections, explaining the similarities between the two protocols and the possibility of using SSH keys in a TLS connection. The author also provides a proof-of-concept applicati...

0Shell recipes

2023-05-10

The text is about the author's experience with shell commands and tricks, and how they can be useful for various purposes. The author shares various shell commands and their applications, such as ARM emulation, copying hard drives...
The text discusses the loss of consistency in user interfaces over time, particularly in Windows 95 and modern operating systems. It explores the impact of consistency on user experience and branding, and the need to balance the t...

0Keypress entropy

2023-04-20

The text discusses the challenges of creating a secure password that is easy to type. It compares the entropy and key presses of different password generation methods and introduces a password generator written in Rust.

0Maps à la carte

2023-01-26

The text discusses the author's love for bicycle trips and the need for personalized maps for cycling. It explains the challenges of creating custom maps and introduces TileMill as a solution. It provides a step-by-step guide on h...
The text discusses the surprising observation that the more black you add to the sun, the more spots you have, until a certain point where adding more black causes spots to merge. The author compares this to a shirt accumulating t...
The blog post discusses the use of QtCreator for graphical debugging on the Librem 5 mobile phone. It explains the process of setting up remote debugging, building and deployment, and debugging symbols. The author shares detailed ...
The author discusses their project of building a bike computer using the Rust programming language. They talk about the challenges they faced, the hardware they considered, and the software they chose. They also mention the future...

0Why Jazda?

2022-06-05

The text is a transcript of a lightning talk given at a conference about the project called Jazda, which is an open source bicycle computer. The speaker discusses the motivation behind the project and the need for a customizable a...

0Git-botch-email

2022-03-13

The author discusses the issues with git-send-email and the difficulties they faced while trying to send a patch to the Linux kernel. They highlight the problems with git-send-email's interface, the lack of features, and the chall...