Past R&D

Past Research & Developments...

"NOte"

This website serves as a "digital appendix"

to some of my projects and personal efforts

between 2002-2016.


 These were all my heutagogical experiments and POCs,

 which I developed, learned from, and simply moved on.


I don't have ADHD

I just keep exploring

and pushing forward...,

because life is too short not to try

:)

Open Source Software

I consulted on, Advanced, wrote, scripted, anonameliorated, 

coded, seeded, modified, and funded

programs like: 


Tor

EFF

Open Office

Blender

Encrypted COINs

Anon..etc...


Cinema & Commercial Art

Handmade/Prototype Servo Controllers Custom/Prototype PCB

Pixel Pushing

3D Scripting and Modeling 

Runtimes files and modifications 

Dynamic Models,  Texture,  Meshes & OBJ 

Maya & Blender applications

Python scripting

Pre-Animatics scripting, development, collaboration

Subsurface Illumination & Scatter Algorithm(s)



Science & Industry

Proprietary Algorithms

Algorithmic Source Coding

Global marketplace optimization

Source database scripting 

SEO coding and programming

Identity Theft, Discovery, Tracking & Recovery 

Forensic Computer Data Analysis

Internet Security Service  &  Hack Proofing

Reverse  Engineering to source IP:

    Virus, Trojans, Worms, Phishing, DDos, E-mails,     

    Malware, Hacks, scams, etc., 

Global marking research data tracking programs

Binary Hacks Bit programs

Malicious Click-per-Ad deviations programs

Frequency Induction (Drone Repellent)



Government(s) & Military

Custom Cipher(s)

Neural BioNet Detection Algorithms

Inter-disciplinary Algorithms

Rapid Bio-infomatics Assessments

Rapid Biological agent detection

Developmental Weapons 

Social Engineering & Reverses Hacking

Malware Frankenstein machine code

TLS and SSL encryption & Cracking



Cyber War

  I am an American contractor who volunteered to works with the Armed Forces of Ukraine/IT Army, other associated groups, and digital developers, who fund, program, and push the digital cyber warfare realm(s) forward, by using programs and techniques to detect, exploit, and implement software to release/decentralize data (which helps find illegal or foreign oligarchies digital assets), where "automated functions" then can injects digital cypher locks, data destroying encryption programs or malware-to permanently nuke an oligarchies illegal or foreign income(s), digital wallets or assets during Russia's illegal invasion of Ukraine (circa February 25, 2022 to...? )


Free Internet....

Encrypted USB, Software and Internet Browsers

Software/Hardware for Embedded Journalists

Web Armory.org

Encrypted WiFi's- Licensed only

BlackHole eOS-(Encrypted Operating system )

 -Beta Version- private released in 201 5 for testing :)

Share by: