<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Articles on Luca Biancorosso</title>
    <link>https://www.lucabiancorosso.com/articles/</link>
    <description>Recent content in Articles on Luca Biancorosso</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 12 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.lucabiancorosso.com/articles/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>RtProxy: Automating Reverse Proxy and TLS Without the Usual Complexity</title>
      <link>https://www.lucabiancorosso.com/articles/rtproxy/</link>
      <pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.lucabiancorosso.com/articles/rtproxy/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Reverse proxies sit at the core of modern infrastructure.&lt;/p&gt;
&lt;p&gt;They terminate TLS, expose internal services, enforce security boundaries, and often become the first control point between users and applications.&lt;/p&gt;
&lt;p&gt;Despite being a well-understood component, deploying and operating a reverse proxy stack is still more complex than it should be.&lt;/p&gt;
&lt;p&gt;This article explores &lt;strong&gt;RtProxy&lt;/strong&gt;, a project designed to simplify reverse proxy and TLS lifecycle management by reducing it to a &lt;strong&gt;deterministic, CLI-driven workflow&lt;/strong&gt;, while maintaining full transparency and control.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building an ESP32 Wi-Fi Recon Tool: From Idea to IoT Security Scout</title>
      <link>https://www.lucabiancorosso.com/articles/esp32scout/</link>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.lucabiancorosso.com/articles/esp32scout/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Most network visibility tools are built for enterprise environments — switches, firewalls, SIEMs.&lt;/p&gt;
&lt;p&gt;But what happens at the edge?&lt;/p&gt;
&lt;p&gt;What happens in the air?&lt;/p&gt;
&lt;p&gt;This project started with a simple question:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Can a low-cost device like an ESP32 be used to perform meaningful Wi-Fi reconnaissance and basic security analysis?&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;The answer turned into something much more interesting.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-idea&#34;&gt;The Idea&lt;/h2&gt;
&lt;p&gt;The goal was not to build another Wi-Fi scanner.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
