Skip to content

Instantly share code, notes, and snippets.

View icedmoca's full-sized avatar
🕳️
Getting spaghettified in a blackhole

Kyle Drake icedmoca

🕳️
Getting spaghettified in a blackhole
View GitHub Profile
@icedmoca
icedmoca / gist:f4c3348b388646b52a63a13306aabd34
Created May 10, 2026 11:54
Frame | Dapp: slang roast? -[ Slang (bang) <- dynamic coplx "Each word has its own world voted on by humans and made by creators - even of other dapps"
That actually fits FRAME’s architecture extremely well because the slang layer becomes a modular interpretation/runtime layer instead of hardcoded platform behavior.
You could have:
a core social dApp for identity/posts/messages
a regional/cultural language pack dApp
an AI slang-agent dApp that rewrites/translates tone dynamically
governance policies that tune allowed dialect intensity/community norms
user-selectable “internet dialect profiles”
@icedmoca
icedmoca / netinfoarch.sh
Created April 13, 2026 05:06
Arch Linux network reconnaissance tool and diagnostics utility that enumerates interfaces, fingerprints gateways, discovers devices, analyzes services, and performs deep layer connectivity, security, and performance assessments using system tools and active probing techniques.
#!/bin/bash
# Network Scanner & Hotspot/Gateway Explorer
# Discovers devices, scans gateway services, and explores network
set -e
# Colors for output
RED='\033[0;31m'
GREEN='\033[0;32m'
YELLOW='\033[1;33m'
@icedmoca
icedmoca / ces.jsx
Created March 31, 2026 07:20
Consciousness entropy sim
import { useState, useEffect, useRef, useCallback } from "react";
const TAU = Math.PI * 2;
function hexColor(r, g, b) {
return `#${[r, g, b].map(v => Math.max(0, Math.min(255, Math.round(v))).toString(16).padStart(2, "0")).join("")}`;
}
function lerpColor(a, b, t) {
return hexColor(
@icedmoca
icedmoca / edsg.md
Created March 31, 2026 06:22
Entanglement Defined Synthetic Geometry: A Technical Framework for Emergent Reality Sandboxes

Entanglement-Defined Synthetic Geometry: A Technical Framework for Emergent Reality Sandboxes

Abstract

We formalize a framework in which geometry, distance, and dynamical behavior emerge from entanglement structure in a finite quantum system. By controlling subsystem correlations, one induces an effective metric space and associated physics within the system. This yields a constrained “reality sandbox”: a physically real substrate whose internal observables obey emergent geometric laws derived from information-theoretic quantities rather than pre-existing spacetime.


1. System Definition

Let the system be a composite quantum many-body system:

#!/usr/bin/env bash
set -e
KWINRULES=~/.config/kwinrulesrc
echo "Focus the window now. Capturing in 3 seconds..."
sleep 3
RAW=$(gdbus call --session --dest org.kde.KWin --object-path /KWin --method org.kde.KWin.queryWindowInfo 2>/dev/null) || {
echo "Error: could not get window info from KWin. Is the window focused?"
@icedmoca
icedmoca / globalpower.md
Last active October 2, 2025 10:12
Architecture of global power, finance, and influence. It visualizes how hidden capital networks, elite policy groups, governments, corporations, and covert systems interconnect.

Global Power & Control Structure – Reference Table

Warning

The following representation is a synthetic construct generated via machine learning models.
All entities and linkages are the result of pattern recognition and inferred associations, not empirical verification. This diagram should be interpreted as a heuristic visualization of hypothesized systemic relationships, rather than a factual or evidentiary account.

Category (Color) Nodes / Elements
Hidden Core Unknown / WSAP (Breakaway Civilization)
@icedmoca
icedmoca / dell5430system.md
Created September 18, 2025 10:49
dell 5430 system

Dell Latitude 5430 — OS Stack

Layer Components
BIOS / Firmware • Coreboot (custom build, ME disabled with me_cleaner)
• Hidden BIOS menus unlocked
• Overclock/undervolt controls
• TPM patched or disabled
Boot Manager • rEFInd (custom theme)
• Optional GRUB chainloading for kernel params
• Hidden boot profiles (only via hotkey)
• Full disk encryption with LUKS2 detached key
Primary OS • Arch Linux (KDE Plasma)
• BlackArch repo integrated
• Btrfs with snapshots/rollback
• Hardened kernel (linux-hardened / grsecurity)
• AppArmor + firejail confinement
• Encrypted swap and tmpfs
Secondary OS • Windows 11 Pro (stripped/minimal) • Used only for GPU-heavy tasks (gaming, CAD, CUDA) • BitLocker encryption • Hardened via regis
@icedmoca
icedmoca / sha256_90r_old_table_ref.md
Created September 7, 2025 03:47
sha256_90r_old_table_ref

SHA-256 vs SHA256-90R – Multi-Backend Performance (AWS Intel Xeon Platinum 8375C @ 2.90 GHz)

Algorithm / Backend Rounds Block / Output Size Cycles/Byte (cpb) Bytes/Cycle Latency (ns) Throughput/Core (Gbps) Slowdown vs Standard System Specs
SHA-256 (Scalar C) 64 512b / 256b ~60.0 0.017 ~240 ns ~0.46 Gbps – (baseline scalar) Portable C, no SIMD
SHA256-90R (Scalar C) 90 512b / 256b ~45.0 0.022 ~300 ns ~0.60 Gbps ~30% slower vs 64r scalar Same C impl, 40% more rounds
SHA-256 (AVX2) 64 512b / 256b ~7.1 0.14 ~20 ns ~4.2 Gbps \
@icedmoca
icedmoca / verilog_sha256_90r_fpga.c_optimization.md
Created September 6, 2025 14:12
verilog sha256_90r_fpga.c optimization

SHA256-90R FPGA Pipeline Design Research Documentation

This document provides an overview and detailed explanation of the Verilog implementation of a 90-stage SHA256-90R FPGA pipeline, converted from a provided C code simulation of a hardware pipeline. The design implements a fully pipelined SHA-256 hash function with 90 rounds, optimized for FPGA hardware with constant-time operation to mitigate timing attacks.

Overview

The SHA256-90R pipeline is a hardware implementation of the SHA-256 cryptographic hash function, extended to 90 rounds for enhanced security or specific application requirements. The design processes a 512-bit input block and produces a 256-bit hash output, achieving a throughput of one hash per clock cycle after an initial pipeline fill-up period. The implementation is constant-time, using arithmetic masking to ensure consistent execution regardless of input data.

Key Features

  • 90-Stage Pipeline: Each stage performs one round of the SHA-256 compression function.
@icedmoca
icedmoca / sddst.md
Created July 31, 2025 08:39
Skip DMV Driving School Timer

Skip DMV Driving School Timer

Brief Notice for Script Use

Disclaimer:

This script is intended for educational purposes only, to demonstrate how timers in online DMV driving school courses can be bypassed. Using this script to skip mandatory timers may violate the terms of service of the course provider and could be illegal in some jurisdictions. Such actions may result in course invalidation, legal consequences, or other penalties. Use at your own risk, and consider the ethical and safety implications of bypassing required learning time. Always comply with local laws and regulations.

How to Use