MekOps
open-menu closeme
/home
/projects
/about
/old-stuff
github gitlab linkedin rss
  • Project TELEGRAPH (Part 2): Escaping the Cables with a Custom ESP32 Wireless Flasher

    calendar Mar 9, 2026 · 4 min read · telegraph electronics reverse_engineering wireless  ·
    Share on: twitter facebook linkedin copy
    Project TELEGRAPH (Part 2): Escaping the Cables with a Custom ESP32 Wireless Flasher

    Let’s be honest: the reality of hardware reverse engineering usually involves sitting hunched over a cluttered desk, tethered to your target device by a short USB cable, constantly manually resetting the board. I don't have much space on my desk, and I absolutely despise cable clutter.


    Read More

Kamil Wcisło

Distributed computing, cloud and embedded systems enthusiast
Read More

Recent Posts

  • Siphon: Building a Zero-Trust Edge Gateway for Home Assistant
  • Project TELEGRAPH (Part 3): Bare Metal, Bit-Banging, and the 4MB Heist
  • Project TELEGRAPH (Part 2): Escaping the Cables with a Custom ESP32 Wireless Flasher
  • Project TELEGRAPH (Part 1): Rescuing a $15 LED Matrix from Software Purgatory
  • Defining MekOps: Why I'm Bringing Cloud-Native to Bare Metal

Series

TELEGRAPH 3

Tags

ELECTRONICS 3 REVERSE_ENGINEERING 3 TELEGRAPH 3 MEKOPS 2 ARCHITECTURE 1 ARM 1 ETL 1 HOME_ASSISTANT 1 IOT 1 PHILOSOPHY 1 SIPHON 1 WIRELESS 1
© CC-BY-4.0 by MekOps

Copyright 2025-  © CC-BY-4.0 BY MEKOPS. All Rights Reserved

to-top