I don't think the Chromebooks use any security features of eMMC. They have a software security architecture which verifies if the code running on the machine does indeed come from Google and that's about it. Last time I looked they didn't even encrypt user data. And if they did, I expect that Google wouldn't trust eMMC vendors and would roll their own.
As for RAM, the magic word is "SPD" (serial presence detect). It's an I2C EEPROM with information about the memory, normally present on each DIMM. If this is present on the motherboard, you will need to reprogram it with information about new RAM. No rocket science, you take some numbers from the DRAM datasheet and encode them per the SPD spec. If it is not present, and I expect that this is the case, then the information must be stored in the boot ROM and you will need to write-unprotect the machine and modify it. RAM chips by themselves offer absolutely zero autodetection functionality.
It seems you have Linux on that thing, can you run i2cdetect -l for starters?