Decarbonizing Fossil Fuels via Production of Hydrogen through Pyrolysis

Hydrogen is the most common element in the universe. It consists of one proton and one electron, and varies from zero, one, and two neutrons. The isotope of hydrogen with zero neutron is called protium, and this is the most common. The isotope with one neutron is called deuterium. The isotope with two neutrons is called tritium.

Read More

Nuclear Energy and the Climate

Living in Houston, where the oil and gas industry is fearfully large and in the nearest events of the modern day when the electric grid nearly collapsed for months, has made me contemplate the extreme challenges that we will face in the coming years. Oil and gas may have done well in years past, but the supply is extremely limited especially given how fast we are burning what we currently have. Oil is estimated to last for only the next 50 years. This is not only unsustainable but disappointing for those who are raising children in upcoming generations, who will have to carry the burden of the past in their own hands.

Read More

Nintendo Switch

Introduction

The ARM architecture, formerly Advanced RISC Microarchitecture and now Acorn RISC Machine, is a family of processors that use reduced instruction set computing and are designed for various purposes, typically in the arena of System on a Chip (SoC) and System on a Module (SoM) which incorporate memory, radio, other interfaces, etc. You can think of the ARM SoC’s as extremely special and complex microcontrollers optimized for both performance and low power consumption. SoC’s are typically seen in mobile phones, IOT devices etc but now are migrating towards game consoles and even standard consumer based computers. ARM Holdings, the company that distributes authority to manufacture these processors, was recently bought out by Nvidia. In the mainstream market there are limited examples of Nvidia shipping out ARM processors, but an example of a game console that did is the Nintendo Switch, being sold to customers with a Nvidia Tegra X1 SoC. Typically game consoles of all products that are available are expected to have security that is only 2nd to military grade engineering feats. In its implementation, an extreme challenge in the ARM architecture as a whole is posed, because not only are the power consumption and performance standards are high, but the security posture must be robust enough to be resilient against anything thrown at it, from an interaction-less attack from a remote user to a physical attack like an evil maid. The Nintendo Switch addresses all of these issues with its relatively robust implementation of firmware, bootloaders and operating systems.

Read More

checkra1n

Over the last 10 years, the world has been exponentially expanding its dependence on mobile phones and technology, and thus the demands of delivering devices and services that meet standards of privacy security, and ethics, and thus responsible innovation and usage has shown to be a daunting task. Organizations and even individual people from all over the world have developed the technical expertise and become clever enough to find ways to target iPhones and other kinds of mobile phones both for defense and conspiratorial purposes. There has been a long lasting battle during this time that has put the strengths and weaknesses of platforms like iOS and Android to the test.

Read More

XNU - Mach

Darwin is the open source portion of the operating systems that Apple ships in their products. This includes the kernel, a variety of libraries, command line tools, and device drivers. The core architecture of the operating system relies on the kernel, which handles input/output from all software requests and translates them into machine level instructions that the underlying CPU architecture supports. A kernel’s responsibility is to provide the most fundamental levels of abstraction so that applications and other software can be written in an environment where this is not of a concern of developers.

Read More

Method Hooking

So you’re writing tweaks for iOS and wanted to understand more what is being done? What you’re about to find is a concise, detailed explanation about what is going on under the hood when hooking into software during runtime. Previous experience with Objective C is required.

Read More

StreakNotify

I recented talked to CokePokes about the recent changes within Snapchat with regards to DRM, and concluded that the best solution for allowing compatibility with Phantom is to include my code within the Phantom project. I will remain the maintainer of my code, however I will be collaborating with CokePokes to update StreakNotify/Phantom to combat Snapchat’s DRM. BUT, if you only want to install StreakNotify alone, you can since it by itself does not activate Snapchat’s DRM. To install my tweak through BigBoss on Cydia, use this link. I will still be pushing updates to this tweak for the newest versions and doing the best I can to add more features/fix bugs. If you have any questions, you can email me.

Read More