mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 77.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,2K
utenti attivi

#reverseengineering

45 post19 partecipanti24 post oggi
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>angr is a Python-based framework for binary analysis, spanning capabilities like symbolic execution, control-flow analysis, and decompilation. Ideal for CTF challenges and reverse engineering tasks. <a href="https://infosec.exchange/tags/binaryanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>binaryanalysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/angr/angr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/angr/angr</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
ilias :thepiratebay:<p>voltage fault injection: 2<br>nRF52840: 0</p><p>great research on recovering AES plaintext from nRF52840 SoC using fault injection. although in this PoC a customised fault injection tool was used, I guess it can be replicated with any other one</p><p><a href="https://bedri-zija.github.io/voltage-fault-injection-attack-aes128-cryptocell-310-nrf52840/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bedri-zija.github.io/voltage-f</span><span class="invisible">ault-injection-attack-aes128-cryptocell-310-nrf52840/</span></a></p><p><a href="https://mstdn.social/tags/Embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Embedded</span></a> <a href="https://mstdn.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
Andreas Klopsch<p>Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025!<br>Sharing research on discovering Rust dependencies in compiled binaries.<br>See you there! 🚀<br><a href="https://infosec.exchange/tags/RECON2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RECON2025</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
buherator[RSS] Symbol Database for Reverse Engineers<br><br><a href="https://symbol.exchange/grep?q=apr_" rel="nofollow noopener noreferrer" target="_blank">https://symbol.exchange/grep?q=apr_</a><br><br><a class="hashtag" href="https://infosec.place/tag/reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#ReverseEngineering</a>
Ge0rG<p><span class="h-card" translate="no"><a href="https://social.treehouse.systems/@sven" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sven</span></a></span> Yeah, the Sony camera community is rather dormant as well. There are also <a href="https://github.com/ma1co/fwtool.py" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/ma1co/fwtool.py</span><span class="invisible"></span></a> and <a href="https://github.com/falk0069/sony-pm-alt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/falk0069/sony-pm-al</span><span class="invisible">t</span></a> but I'm not aware of break-throughs in firmware modding / Linux rooting.</p><p>There was also a long thread on the orange site re one of my blog posts &lt;<a href="https://news.ycombinator.com/item?id=40925999" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.ycombinator.com/item?id=4</span><span class="invisible">0925999</span></a>&gt; but it didn't yield any insights for Sony alpha, only the Sony QX models - <a href="https://en.wikipedia.org/wiki/Sony_ILCE-QX1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Sony_ILC</span><span class="invisible">E-QX1</span></a></p><p><a href="https://chaos.social/tags/Sony" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sony</span></a> <a href="https://chaos.social/tags/photography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photography</span></a> <a href="https://chaos.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
:radare2: radare :verified:<p>If you are a power <a href="https://infosec.exchange/tags/vim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vim</span></a> user you are probably used to the m' navigation workflow, which is also implemented in Visual mode in radare2. Now you can experience not just the hjkl movement keys in iaito (the radare2 interface) but also the m' keys in hex, disasm, decompiler and graph views for quick moving around the binary! <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/ui" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ui</span></a></p>
AndroidGoogle Photos’ AI Models: The Secret Sauce That Can Be Stolen How protections against AI model ...<br><br><a href="https://medium.com/@mathis.mauvisseau_40017/google-photos-ai-models-extracted-6aea34df2658?source=rss------machine_learning-5" rel="nofollow noopener noreferrer" target="_blank">https://medium.com/@mathis.mauvisseau_40017/google-photos-ai-models-extracted-6aea34df2658?source=rss------machine_learning-5</a><br><br><a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/reverse-engineering" target="_blank">#reverse-engineering</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/deep-learning" target="_blank">#deep-learning</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/machine-learning" target="_blank">#machine-learning</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/google" target="_blank">#google</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/ai" target="_blank">#ai</a><br><br><a href="https://awakari.com/pub-msg.html?id=M7zX99N48CZ2yqsO3kHIqZzt2Po&amp;interestId=Android" rel="nofollow noopener noreferrer" target="_blank">Result Details</a>
Reverse-EngineeringТень уязвимости: fake exploit как зеркало реальных техник ...<br><br><a href="https://habr.com/ru/articles/904452/?utm_source=habrahabr&amp;utm_medium=rss&amp;utm_campaign=904452" rel="nofollow noopener noreferrer" target="_blank">https://habr.com/ru/articles/904452/?utm_source=habrahabr&amp;utm_medium=rss&amp;utm_campaign=904452</a><br><br><a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/fake" target="_blank">#fake</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/exploit" target="_blank">#exploit</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/rce" target="_blank">#rce</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/шутка" target="_blank">#шутка</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/юмора" target="_blank">#юмора</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/reverse-engineering" target="_blank">#reverse-engineering</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/oob" target="_blank">#oob</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/poc" target="_blank">#poc</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/jit-компиляция" target="_blank">#jit-компиляция</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/социнжиниринг" target="_blank">#социнжиниринг</a> <a rel="nofollow noopener noreferrer" class="mention hashtag" href="https://mastodon.social/tags/информационная" target="_blank">#информационная</a><br><br><a href="https://awakari.com/pub-msg.html?id=QpZPYGnV9dbcz2bwxJa4TwMxJ8y&amp;interestId=Reverse-Engineering" rel="nofollow noopener noreferrer" target="_blank">Result Details</a>
DJ🌞:donor:<p>Let's get this <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nakeddiefriday</span></a> started, people!</p><p>The guest of today is one TMS70C42A by TI. It is a 8-bit MCU carrying 4KB of ROM and 256B of RAM, with three timers and a UART.</p><p>This particular die was bit by gremlins, and a small part of it is missing; nothing crucial though. Let's have a walk around. 🧵 </p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:ti:tms70c42a" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:ti:tms70c42a</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/microscopy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microscopy</span></a></p>
pancake :radare2:<p>Just packaged and tested <span class="h-card" translate="no"><a href="https://infosec.exchange/@RevEngAI" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>RevEngAI</span></a></span> 's plugin for <span class="h-card" translate="no"><a href="https://infosec.exchange/@radareorg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>radareorg</span></a></span> the service is still under testing so you can join the waitlist to get some api keys, it looks promising, and i'm always happy to see more tools and services being integrated with R2! <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️<p>My latest blog post: Selling Products on Tindie</p><p><a href="https://mikecoats.com/selling-on-tindie/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mikecoats.com/selling-on-tindi</span><span class="invisible">e/</span></a></p><p>I'm now selling my electronics kits on Tindie! I've listed my Spy! Break! Inject! and VanSpoof projects as assembled products, kits and bare PCBs.</p><p><a href="https://mikecoats.social/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://mikecoats.social/tags/eBike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eBike</span></a> <a href="https://mikecoats.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mikecoats.social/tags/openSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSource</span></a> <a href="https://mikecoats.social/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseEngineering</span></a> <a href="https://mikecoats.social/tags/vanMoof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vanMoof</span></a></p>
Tindie Maker Marketplace<p>Reverse Engineering 4-Wire Buses <a href="https://hackaday.social/tags/TindieBlog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TindieBlog</span></a> <a href="https://hackaday.social/tags/BusSniffing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BusSniffing</span></a> <a href="https://hackaday.social/tags/SignalAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SignalAnalysis</span></a> <a href="https://hackaday.social/tags/SignalInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SignalInjection</span></a> <a href="https://hackaday.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://hackaday.social/tags/RE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RE</span></a><br><a href="https://blog.tindie.com/2025/04/reverse-engineering-4-wire-buses/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.tindie.com/2025/04/revers</span><span class="invisible">e-engineering-4-wire-buses/</span></a></p>
buheratorTracing malloc calls in PCode<br><br><a href="https://scribe.rip/@cy1337/tracing-data-flow-with-pcode-f879278d9fc1" rel="nofollow noopener noreferrer" target="_blank">https://scribe.rip/@cy1337/tracing-data-flow-with-pcode-f879278d9fc1</a><br><br><a class="hashtag" href="https://infosec.place/tag/ghidra" rel="nofollow noopener noreferrer" target="_blank">#Ghidra</a> <a class="hashtag" href="https://infosec.place/tag/reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#ReverseEngineering</a>
Stephen Hoffman<p>“The invalid 68030 instruction that accidentally allowed the Mac Classic II to successfully boot up”</p><p>"This is the story of how Apple made a mistake in the ROM of the Macintosh Classic II that probably should have prevented it from booting, but instead, miraculously, its Motorola MC68030 CPU accidentally prevented a crash and saved the day by executing an undefined instruction.”</p><p><a href="https://www.downtowndougbrown.com/2025/01/the-invalid-68030-instruction-that-accidentally-allowed-the-mac-classic-ii-to-successfully-boot-up/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">downtowndougbrown.com/2025/01/</span><span class="invisible">the-invalid-68030-instruction-that-accidentally-allowed-the-mac-classic-ii-to-successfully-boot-up/</span></a></p><p><a href="https://infosec.exchange/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a> <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/mc68030" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mc68030</span></a></p>
Hacker News<p>Reverse engineering the obfuscated TikTok VM</p><p><a href="https://github.com/LukasOgunfeitimi/TikTok-ReverseEngineering" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/LukasOgunfeitimi/Ti</span><span class="invisible">kTok-ReverseEngineering</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/TikTok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TikTok</span></a> <a href="https://mastodon.social/tags/VM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VM</span></a> <a href="https://mastodon.social/tags/Obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obfuscation</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/TechInsights" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechInsights</span></a></p>
Xilokar<p>Managed to put this device in bootloader usb upload/download mode.</p><p>But didn't find any sdk/tool that describe/implement the protocol.</p><p>From what I've overlooked in the bootloader, it's quite a simple one, so it will be easy to implement.</p><p>But man, it's just a waste of time.</p><p>Please, manufacturers, release the sdks...<br><a href="https://mamot.fr/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
:radare2: radare :verified:<p>Contextual menu now have more ways to insert data. Do you miss any? <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
Mäh W.<p>Hello! 👋 I don't want to <a href="https://chaos.social/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GetFediHired</span></a> (yet?), but I am looking for contacts 👥 who can help me connect and offer a reality check on a potential new career path ⛰️🏁✅ by telling about their experiences.</p><p>I'm currently working as an embedded software engineer 💻, but I'm exploring a transition into IT/OT security — ideally working as a pentester or reverse engineer focusing on embedded devices, IoT, or SCADA systems 🔒🤖.</p><p>My thread... 🧵</p><p><a href="https://chaos.social/tags/FediJobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediJobs</span></a> <a href="https://chaos.social/tags/EmbeddedSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmbeddedSecurity</span></a> <a href="https://chaos.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> :BoostOK:</p>
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️<p>My latest blog post: VanSpoof v1.0</p><p><a href="https://mikecoats.com/van-spoof-v1-0/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mikecoats.com/van-spoof-v1-0/</span><span class="invisible"></span></a></p><p>I'm happy to announce the v1.0 release of VanSpoof. My VanMoof X3 now starts up, without an e-shifter connected, and does not show an Error 44 status! The bike thinks it's connected to a working, functional, e-shifter!</p><p><a href="https://mikecoats.social/tags/eBike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eBike</span></a> <a href="https://mikecoats.social/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://mikecoats.social/tags/openSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSource</span></a> <a href="https://mikecoats.social/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseEngineering</span></a> <a href="https://mikecoats.social/tags/rustLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustLang</span></a> <a href="https://mikecoats.social/tags/stm32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stm32</span></a> <a href="https://mikecoats.social/tags/vanMoof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vanMoof</span></a></p>
IT News<p>Modernizing an Enigma Machine - This project by [Miro] is awesome, not only did he build a replica Enigma machine ... - <a href="https://hackaday.com/2025/04/17/modernizing-an-enigma-machine/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/17/modern</span><span class="invisible">izing-an-enigma-machine/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/debruijnsequence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debruijnsequence</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enigmamachine</span></a> <a href="https://schleuss.online/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://schleuss.online/tags/pogopin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pogopin</span></a> <a href="https://schleuss.online/tags/enigma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enigma</span></a></p>