<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Home on Luca Biancorosso</title>
    <link>https://www.lucabiancorosso.com/</link>
    <description>Recent content in Home on Luca Biancorosso</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 12 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.lucabiancorosso.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>RtProxy: Automating Reverse Proxy and TLS Without the Usual Complexity</title>
      <link>https://www.lucabiancorosso.com/articles/rtproxy/</link>
      <pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.lucabiancorosso.com/articles/rtproxy/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Reverse proxies sit at the core of modern infrastructure.&lt;/p&gt;
&lt;p&gt;They terminate TLS, expose internal services, enforce security boundaries, and often become the first control point between users and applications.&lt;/p&gt;
&lt;p&gt;Despite being a well-understood component, deploying and operating a reverse proxy stack is still more complex than it should be.&lt;/p&gt;
&lt;p&gt;This article explores &lt;strong&gt;RtProxy&lt;/strong&gt;, a project designed to simplify reverse proxy and TLS lifecycle management by reducing it to a &lt;strong&gt;deterministic, CLI-driven workflow&lt;/strong&gt;, while maintaining full transparency and control.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Contact</title>
      <link>https://www.lucabiancorosso.com/contact/</link>
      <pubDate>Mon, 06 Apr 2026 18:23:55 +0200</pubDate>
      <guid>https://www.lucabiancorosso.com/contact/</guid>
      <description>&lt;hr&gt;
&lt;h2 id=&#34;get-in-touch&#34;&gt;Get in Touch&lt;/h2&gt;
&lt;p&gt;I’m always open to meaningful conversations around:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network and Security Architecture&lt;/li&gt;
&lt;li&gt;Cloud transformation and Zero Trust&lt;/li&gt;
&lt;li&gt;Automation and infrastructure design&lt;/li&gt;
&lt;li&gt;Interesting technical challenges or collaborations&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-best-way-to-reach-me&#34;&gt;The Best Way to Reach Me&lt;/h2&gt;
&lt;p&gt;For professional conversations, the easiest way is via LinkedIn:&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/luca-biancorosso/&#34;&gt;LinkedIn Profile&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;lets-build-something-interesting&#34;&gt;Let’s Build Something Interesting&lt;/h2&gt;
&lt;p&gt;If you’re working on something challenging or innovative,&lt;br&gt;
I’m always happy to exchange ideas.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Who Am I</title>
      <link>https://www.lucabiancorosso.com/who-am-i/</link>
      <pubDate>Mon, 06 Apr 2026 18:23:55 +0200</pubDate>
      <guid>https://www.lucabiancorosso.com/who-am-i/</guid>
      <description>&lt;hr&gt;
&lt;h2 id=&#34;hi-im-luca&#34;&gt;Hi, I&amp;rsquo;m Luca&lt;/h2&gt;
&lt;p&gt;I’m a Network and Security Architect with a strong focus on building resilient, scalable, and secure infrastructures across hybrid environments.&lt;/p&gt;
&lt;p&gt;My background spans global enterprise networks, retail and supply chain environments, and cloud transformation programs. Over the years, I’ve worked on projects involving data center migrations, Zero Trust architectures, secure connectivity, and large-scale network standardization.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;what-i-do&#34;&gt;What I Do&lt;/h2&gt;
&lt;p&gt;I design and evolve network and security architectures that are:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building an ESP32 Wi-Fi Recon Tool: From Idea to IoT Security Scout</title>
      <link>https://www.lucabiancorosso.com/articles/esp32scout/</link>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.lucabiancorosso.com/articles/esp32scout/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Most network visibility tools are built for enterprise environments — switches, firewalls, SIEMs.&lt;/p&gt;
&lt;p&gt;But what happens at the edge?&lt;/p&gt;
&lt;p&gt;What happens in the air?&lt;/p&gt;
&lt;p&gt;This project started with a simple question:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Can a low-cost device like an ESP32 be used to perform meaningful Wi-Fi reconnaissance and basic security analysis?&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;The answer turned into something much more interesting.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-idea&#34;&gt;The Idea&lt;/h2&gt;
&lt;p&gt;The goal was not to build another Wi-Fi scanner.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
