Weird emails thread? Just got this in my inbox, I don't know what it's for
I keep getting this picture from different adresses, here is the picture.
That's what I get for pulling from a "learn Braille" test site.
I literally am the person that pointed out it was braille - too bad I pulled a bad image.
Ahwell, have fun solving the puzzle. Post what it turns out to be - was honestly curious.
Not sure - I'm not getting much from a Google Image Search using the image file itself. I was going to see if it was from one of those "solve the puzzle" type sites. It obviously came through GMail, I wonder if the sender was known to OP or not. (I can only guess they don't know the sender.)
"fifteen" translates to
>01100110 01101001 01100110 01110100 01100101 01100101 01101110
xor'd with the
>00001011 00101110 00100010 00010001 00010100 00110000 00000111
in the email, yields
>01101101 01000111 01000100 01100101 01110001 01010101 01101001
which translates to
but what does the mGDeqUi mean
Lazy faggots. Do it manually. The its this.
0 + 0 = 0
1 + 0 = 1
0 + 1 = 1
1 + 1 = 0
First binary to XOR
00001011 00101110 00100010 00010001 00010100 00110000 00000111
fifteen in binary (password sort of)
01100110 01101001 01100110 01110100 01100101 01100101 01101110
ends up being
01101101 01000111 01000100 01100101 01110001 01010101 01101001
or mGDeqUi in text
ends with this picure
contents of the rar
zip file is password protected
didnt notice that
Yeah it's not password protected - it opens right up on CrunchBang no problem.
It's just literally a damn endless well of folders and zip files. I feel like I've opened a million already.
It is the same file - I'm curious though because the answer to the question in the text file is that there is a bottom to the well. I've tried to see if there is a hidden file but I will keep trying.
honestly i think the answer to this "mystery" is that someone very clever figured out how to make a zip file spit itself out over and over again ad infinitum ad nauseam. not spooky just very very clever.
it works like this:
the zip file contains a finite number of zip files.
but every time you unpack it you get the same zip file. which in turn contains the same zip file.
there is no end because it spits a copy of itself out at you when you unpack it. its considered bottomless without actually being bottomless in the first place. its just cloning itself, over and over, and the clones in turn clone themselves over and over. again on and on into infinity.
or at least until you run out of memory or the sun explodes...
It's not the end. The file name is made up of a character setup that is not a latin or western character set. I can't do a recursive unzip on it right now because GZip can't find the directories due to the alternate character set.
It's embedded - check the hex
Removing this leaves just the .rar EOF and takes out the .txt, so when you open it you get to 1.zip
Which has an image in it...
Every level is named (unknowncharacter).zip. Renaming the first level does not change the issue with recurisive unzip on all of the other levels.
Basically can't do Gunzip -r *.zip because can't read the unknown character, can't Gunzip -r (unknowncharacter).zip because the system can't read the character, and even thought it displays like an "r" on my system can't Gunzip -r r.zip because it says no such directory.
What other languages use a character that looks like an "r" in English?
it doesnt lead to anything
there is nothing there to find. its just a time waster for tinfoil hats to rededicate their lives to and make up a bunch of crazy ass crap about
the .txt file is just a hook to bait you into thinking that there is something there and that after you open enough folders you will be rewarded with something or other. but the simple fact that it is never ending entices the user to keep opening things and his mind catastrophises the best outcomes for opening them all. the perceived "prize" becomes sweeter and sweeter with every click and ever anticipation of what the next zip file contains.
when all that is contained is another zip file and all that will ever be contained is another zip file. you will not find anything because there is nothing to find.
other than some very clever embedded programming that makes the thing do the thing that the thing is doing.
forgot to mention: (same guy as the guy you replied to btw. but that is beside the point)
i am now curious to know what this will lead to.
i do not have the skill to find out what it leads to on my own. i am not that jedi with shit like this.
It's hard to describe the main sound, but it has a really high pitched tone inside it.
Here's what they both look like from inside audacity
I'm not sure how to do that, if you can tell me how to with audacity, I'd be happy to.
Here's a frequency analysis
Here's the first part of that. Turns out it is rapid beeps.
Message is high pitched, key is low pitched.
Either that or binary. Each group of beeps has 8 of them. We might need to XOR them again.
IMO it's more like binary
First step is to get the binary, then to XOR the message binary with the key binary.
If that doesn't work, make the 1's 0's and the 0's 1's and XOR the message binary with the key binary.
If you work out the binary, post it in the thread and I can work on part 2.
just did it by hand with and online translatamajig
had some issues.
the dashes are one the dots are zero
following text is what was spat back out this is the audio not the key
Lets say that a part of the binary from the message is 00110100 and a part of the binary from the key is 10001101
XOR'ing was explained here >>15714262 so XORing that gives us 10111001
heres the binary: as i understand it to be binary seeing the dash as having data therefore a one and the dot as having no data therefore being a zero:
11110010 11010010 00100011 11101101 00110011 11000010 01100110 00110001 11101101 00110000
10101011 10010101 01010101 10101010 01010101 10101000 01010100 01011100 11100000 00111010
now if this does not make sense as the correct binary then its probable that inverting the ones and the zeroes will yeild the correct form. however i do not know how to translate this into anything worthwhile on my own. but i am curious to see what happens
Wait a minute. butt sex! Butt sex requires a lot of lubrication, right? Lubrication. Lubruh... Chupuh... Chupacabra 's the, the goat killer of Mexican folklore. Folklore is stories from the past that are often fictionalized. Fictionalized to heighten drama. Drama students! Students at colleges usually have bicycles! Bi, bian, binary. It's binary code!
its a troll.
the binary in the audio file and the key are a url portion that points us to the zip file which contains code that points us to the audio file which points us back to the picture that got us started on this whole thing to begin with. it is a file that spits itself back at us over and over again in more ways that one much like a program whose sole purpose is to spit its own lines of code back at the user as soon as the user tells it to be executed.
the strings are grouped by 3 so it must be a trifid
But how do these do
If they did it properly, then it would be:
2 3 1 2 3 1 3 3 3 3 2 3 2 3 2 2 3 1 3 3 2 2 2 2 1
3 3 3 3 1 2 3 2 1 3 1 2 3 3 2 3 2 1 1 1 2 1 3 2 3
2 2 3 3 1 3 3 3 1 3 2 2 3 1 2 3 2 2 1 1 3 3 3 3 1
Where the first line is the table, second is column, third is row. But the problem is that we don't have their set of tables.
>imgur.com/00111011 00111100 00110011 00100010 00001010 00010000 00011101
>Key: 01001110 01100101 01110100 01100001 01110011 01010011 01000100
great, someone solve htis
>We might stumble upon 'deep web' thingy.
>posts it on 4chan
The deep Web is a fairly tame thing, when you know how to ride the beast.
Just don't go too deep, when you have no sufficient protection or operate from a device that contains personal data.
I'd really like to go in with a closed shell system one day.
Or maybe since it says key like it's said before, we have to XOR it, like we've had to before. And that emote and NetasSD are just a coincidence from the binary they used for what they needed to end up with
I don't think so. I once read the whole process of decoding a Cicada puzzle to a very very far extent. It's a lot more sophistacated, compex and refined, you require some serious cryptographic and computational skills. Look for the Uncovering Cicada wiki, it's all there. Pretty awesome job and awesome shit in the messages
Not necessarily. The team that decyphered the messages went on and on without refering to the actual meaning of the runes and messsages, but it must be some hallucinating stuff, as some writings (in english) found along the way reveal very deep "trascendental" knowledge
I think i got something by asuming the 3 means 3X the following code in the HTML so i placed 3 quote marks with the key in the end I've got this
If you look at the binary in the past that we XOR'd I'm pretty sure that most of them had weird symbols in them as well.
That's just what happens when you turn random binary into text, you're going to get random symbols.
It's from 3 years ago. Most stuff in this puzzle is from this year. The only thing I've seen from earlier is the bottomless hole, which is from 2010, which implies that they copied that from somewhere.
>>15715163 got that by adding 3 quotes at the end of the key or some shit like that. And it happened to lead to a 3 year old picture on imgur of a collection of some sort.
Somehow, I have a feeling that it isn't that, it hasn't really fit the tone of this thing so far.
Like I said earlier, it's one of the only things in the puzzle so far that is older than this year. The only other thing is the bottomless zips, and that might be because it was copied from somewhere else
I think it's just a coincidence that everyone got hung up on
if the comic way is the lead, then perhaps the missing one is a clue? golgo 13 vol 118?
so 13-118, maybe ac 118?
which leads to
Air Canada Flight 118
On time - departs in 7 hours 13 mins
guys? i really hope it's not this.