lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

64
active users

#reverseengineering

3 posts3 participants1 post today
Mäh W.<p>Hello! 👋 I don't want to <a href="https://chaos.social/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GetFediHired</span></a> (yet?), but I am looking for contacts 👥 who can help me connect and offer a reality check on a potential new career path ⛰️🏁✅ by telling about their experiences.</p><p>I'm currently working as an embedded software engineer 💻, but I'm exploring a transition into IT/OT security — ideally working as a pentester or reverse engineer focusing on embedded devices, IoT, or SCADA systems 🔒🤖.</p><p>My thread... 🧵</p><p><a href="https://chaos.social/tags/FediJobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediJobs</span></a> <a href="https://chaos.social/tags/EmbeddedSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmbeddedSecurity</span></a> <a href="https://chaos.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> :BoostOK:</p>
Alexandre Borges<p>Unlocking secret ThinkPad functionality for emulating USB devices:</p><p><a href="https://xairy.io/articles/thinkpad-xdci" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">xairy.io/articles/thinkpad-xdci</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️<p>My latest blog post: VanSpoof - Prototype 2 - Shrunken PCBs</p><p><a href="https://mikecoats.com/van-spoof-prototype-2-hardware/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mikecoats.com/van-spoof-protot</span><span class="invisible">ype-2-hardware/</span></a></p><p>The VanSpoof PCB has to be no bigger than 31.5 mm by 21.5 mm to fit. Unfortunately, Molex's SMD footprints are quite wide so the board needed a fair bit of layout work to make everything fit.</p><p><a href="https://mikecoats.social/tags/eBike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eBike</span></a> <a href="https://mikecoats.social/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://mikecoats.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mikecoats.social/tags/openSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSource</span></a> <a href="https://mikecoats.social/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseEngineering</span></a> <a href="https://mikecoats.social/tags/vanMoof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vanMoof</span></a></p>
eShard<p>We emulated iOS 14 in QEMU. <br>This is how we did it: <a href="https://eshard.com/posts/emulating-ios-14-with-qemu" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eshard.com/posts/emulating-ios</span><span class="invisible">-14-with-qemu</span></a></p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/iosdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosdev</span></a> <a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://infosec.exchange/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://infosec.exchange/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a></p>
DJ🌞:donor:<p>Welcome to the new edition of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nakeddiefriday</span></a> everyone. The guest today is the famous ESP8266EX by Espressif, a SoC loved by many in the electronics world.</p><p>Unfortunately, the digital section is fully covered by two topmost metal layers carrying power. We do have a glorious analog/RF section though.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:espressif:esp8266ex" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:espressif:esp8266ex</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/microscopy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microscopy</span></a></p>
Brian Greenberg<p>🧬 Malware Is Evolving — And So Are the Languages It’s Written In — A new study highlights a growing tactic among malware developers: coding in uncommon languages to evade detection.</p><p>🔍 Key takeaways:<br>🔹 Obscure languages like Lisp, Rust, Haskell, Delphi, and Phix are harder for static analysis tools to parse.<br>🔹 These languages often produce fragmented memory layouts and more indirect execution paths, complicating reverse engineering.<br>🔹 Even the choice of compiler — like Tiny C or Embarcadero Delphi — impacts how easily malware can be flagged.<br>🔹 APTs (Advanced Persistent Threats) are increasingly adopting these strategies to fly under the radar.</p><p>💬 Security teams must broaden their detection capabilities and adapt tooling for these underrepresented programming environments.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> </p><p><a href="https://www.theregister.com/2025/03/29/malware_obscure_languages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/29/mal</span><span class="invisible">ware_obscure_languages/</span></a></p>
Blue DeviL // SCT<p>The Path Towards Automated Heap Exploitation</p><p>CC: Thaís Moreira Hamasaki</p><p><a href="https://www.youtube.com/watch?v=5XQ0cAwlWMo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=5XQ0cAwlWMo</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/heap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heap</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a></p>
DJ🌞:donor:<p>Hello and welcome to this week's installment of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nakeddiefriday</span></a> !</p><p>The guest of today is the TIBPAL16R4 by TI, a programmable array logic chip made with bipolar logic. The die has 2 metal layers, its maskwork produced in 1985. A short thread follows.</p><p>More info and hi-res pano at: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:ti:tibpal16r4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:ti:tibpal16r4</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/microscopy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microscopy</span></a> <a href="https://infosec.exchange/tags/icreverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>icreverseengineering</span></a></p>
Csepp 🌢<p><a href="https://merveilles.town/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> / <a href="https://merveilles.town/tags/embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>embedded</span></a> folx, is it possible that a boot ROM is mapped near the end of the address space such that some of its contents wrap around?<br>See: <a href="https://github.com/NationalSecurityAgency/ghidra/issues/7917" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NationalSecurityAge</span><span class="invisible">ncy/ghidra/issues/7917</span></a><br>Context: I'm trying to figure out the memory map for the <a href="https://merveilles.town/tags/PocketViewer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PocketViewer</span></a> .</p>
DJ🌞:donor:<p>Hey hey, you thought there be no <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nakeddiefriday</span></a> today? Here we go!</p><p>Today's entry is an Infineon/Siemens SAB-C167CR-LM, a microcontroller based on the C166 core. The die is in pleasant-looking pastel colours. :-) The die has pin 1 in top left corner. I'll do a short thread.</p><p>Many thanks to <span class="h-card" translate="no"><a href="https://troet.cafe/@debauer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>debauer</span></a></span> for supplying the samples!</p><p>SiPron page with more info and full-res map: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:infineon:sab-c167cr-lm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:infineon:sab-c167cr-lm</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/silicon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>silicon</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/microscopy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microscopy</span></a></p>
Thomas Fach-Pedersen<p>Apparently Director stores height before width. Along with a bit of hacked scaling, things look slightly better, although image placement is still off in other places.</p><p> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/macromediadirector" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macromediadirector</span></a></p>
Thomas Fach-Pedersen<p>The images are not showing up in the right places, but they're showing up, and that's good enough for tonight.</p><p><a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/macromediadirector" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macromediadirector</span></a></p>
Kevin Thomas ✅<p>Last week I posted a tutorial on how a basic <a href="https://defcon.social/tags/NeuralNetwork" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NeuralNetwork</span></a> works under the hood. I also wanted to share my <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> a <a href="https://defcon.social/tags/GPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPT</span></a> to help understand the basics of how a GPT works under the hood. <a href="https://github.com/mytechnotalent/RE-GPT" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/RE-G</span><span class="invisible">PT</span></a></p>
Leah Price<p>Help! Rereading my own notes in which voice recognition spit out "develop kebab versus licking" and trying to figure out what claim about Henry James could have sounded like this when voiced by someone with a congested nose -- suggestions? <a href="https://historians.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
Terence Eden<p>Bah! I can't find any <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> book reading software that works with the LCP encryption standard readium.org/lcp/profile-2.0</p><p>Any clues, friends?</p><p>(Before replying, please assume I've clicked on the first result that you Googled.)</p><p><a href="https://mastodon.social/tags/DRM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DRM</span></a> <a href="https://mastodon.social/tags/eBook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eBook</span></a> <a href="https://mastodon.social/tags/eReader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eReader</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
Cindʎ Xiao 🍉<p>Hi! The slides for my talk today at RE//verse 2025 (<span class="h-card" translate="no"><a href="https://infosec.exchange/@REverseConf" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>REverseConf</span></a></span>), "Reconstructing Rust Types: A Practical Guide for Reverse Engineers", are now published: <a href="https://github.com/cxiao/reconstructing-rust-types-talk-re-verse-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/cxiao/reconstructin</span><span class="invisible">g-rust-types-talk-re-verse-2025</span></a></p><p>It's been great to catch up with so many folks - if you're at the conference, come by and say hi!</p><p>The presentation was recorded, and the video will be published at a future date!</p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/REverse2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>REverse2025</span></a></p>
Phil Haigh<p>Is there anyone in the reverse engineering community who’d like to take a look at an Ecostrad smart radiator? I’ve a faulty one that is being replaced. The fault can probably be fixed but probably not in a safe way (hence the replacement under warranty) so there’s a radiator and electronics heading for the recycling centre soon unless somebody intervenes. </p><p>Free to an enquiring mind. Too heavy for posting, you’ll have to collect. Of course you might just want to come along and retrieve the electronics, that’s fine too.</p><p><a href="https://mastodonapp.uk/tags/Cornwall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cornwall</span></a> <a href="https://mastodonapp.uk/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodonapp.uk/tags/IOT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOT</span></a></p>
Kevin Thomas ✅<p>We are in the Age of Agentic AI.</p><p>Ladies and gentlemen, we stand at the dawn of something extraordinary—the birth of Embedded Reverse Engineering and Vulnerability Research in the Agentic AI generation.</p><p>For years, we’ve reverse-engineered binaries, unraveled obfuscation, and traced execution flows deep into silicon. But now, the game is changing. AI isn’t just a tool anymore—it’s an active agent, reasoning, adapting, and challenging assumptions in ways we’ve never seen before.</p><p>This is more than automation. It’s more than efficiency. It’s intelligence—embedded, autonomous, and evolving.</p><p>We are the pioneers in a field where AI meets hardware, where security meets intelligence, and where the vulnerabilities of today shape the resilience of tomorrow.</p><p>So here’s my challenge to you:<br>🔹 Push the boundaries of what’s possible.<br>🔹 Question the architecture of security itself.<br>🔹 Reimagine what AI-driven reverse engineering can achieve.</p><p>The next frontier isn’t just about finding flaws. It’s about understanding systems at a level deeper than ever before.</p><p>We are the ones forging this path. Let’s build the future. 🚀 <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://defcon.social/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityResearch</span></a> <a href="https://defcon.social/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AgenticAI</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
DJ🌞:donor:<p>I guess we'll do a <a href="https://infosec.exchange/tags/namethatchip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>namethatchip</span></a> here at Mastodon. Looking to ID the whole package.</p><p>This came out of a two-die package with custom marking; both dies were made by Renesas. Die markings in top left read: 24, (c) Renesas electronic corp., 2012. Markings in bottom right read: PMF.</p><p>Please boost for reach!</p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️<p>My latest blog post: VanSpoof - Prototype 2 - Echo Firmware</p><p><a href="https://mikecoats.com/van-spoof-prototype-2-firmware-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mikecoats.com/van-spoof-protot</span><span class="invisible">ype-2-firmware-1/</span></a></p><p>In part 1 and part 2 of building my first VanSpoof prototype, I managed to flash the microcontroller on the PCB with a blinky demo. This time round, let's see about sending and receiving some serial data.</p><p><a href="https://mikecoats.social/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> <a href="https://mikecoats.social/tags/eBike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eBike</span></a> <a href="https://mikecoats.social/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://mikecoats.social/tags/embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>embedded</span></a> <a href="https://mikecoats.social/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a> <a href="https://mikecoats.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mikecoats.social/tags/openSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSource</span></a> <a href="https://mikecoats.social/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseEngineering</span></a> <a href="https://mikecoats.social/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://mikecoats.social/tags/rustLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustLang</span></a> <a href="https://mikecoats.social/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> <a href="https://mikecoats.social/tags/stm32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stm32</span></a> <a href="https://mikecoats.social/tags/vanMoof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vanMoof</span></a></p>