Sorry, looks like I was wrong, you're not a troll. You just really... don't know. I'll be happy to explain it.
RCM is a recovery mode that the Switch has for repair purposes. It enters this mode when the eMMC memory chip is not accessible or if the right button combo is pressed (Vol Up and the RCM Home button, which is actually a pin inside the right JoyCon rail). Once in RCM mode it expects a signed, official series of commands to be sent through the USB port for repair and diagnostic.
Since we don't have the official commands, we poked around and discovered that it does not guard against an out-of-spec, really really big USB request. One so big, that it overrides into an area of memory it shouldn't (called stack smashing). If we send this large command along with some unauthorized code, we find that the Switch will run that code as if it were signed. This is only temporary though and we need to do it each time we restart as the code only exists in volatile memory.
What TX has done is made a compact dongle that sends this overlarge command for us. The code they send simply tells the Switch "look at this file on the SD card for further instructions". The file on the SD card is the SX OS file, roughly 16MB large, it does a few things. It can either simply chain load the official OS (Horizon) and boot the Switch normally, it can place some threads into memory, then launch the official OS which gives us the SX OS CFW capable of running dumped games and homebrew, or it can enable AutoRCM.
Since people don't want to remove their eMMC chip or hold the Vol Up and RCM Home button (pin 10) every time, what AutoRCM does is corrupt a signature in your eMMC by changing a few bytes. When the Switch goes to boot this check will fail and it'll startup in RCM mode without needing to hold anything or disconnect anything. Once it's in RCM mode you can use the dongle to smash the stack and run the SX OS payload, which can then patch some memory addresses and chain load the official OS so you can have your fun.
It also has the option to reverse AutoRCM which simply puts the bytes it changed back to normal.
That about covers it, were there any remaining questions?