[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Weird emails thread? Just got this in my inbox, I don't

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 232
Thread images: 32

File: Untitled.png (13KB, 881x295px) Image search: [Google]
Untitled.png
13KB, 881x295px
Weird emails thread? Just got this in my inbox, I don't know what it's for
>>
File: 1.png (33KB, 1000x650px) Image search: [Google]
1.png
33KB, 1000x650px
I keep getting this picture from different adresses, here is the picture.
>>
File: ebin.png (36KB, 1000x650px) Image search: [Google]
ebin.png
36KB, 1000x650px
ebin puzzle broseph

simply ebin
>>
>>15714062
U solved it champ, thank u
>>
>>15714062
Okay so what does it say?
>>
>>15714037
Can you give me your email, password, and credit card information? I'm an elite hacker, and with these, I can get to the bottom of this.
>>
File: emails.png (39KB, 1019x461px) Image search: [Google]
emails.png
39KB, 1019x461px
>>15714037
what does it mean?
>>
>>15714096
If I knew, I would be posting it instead of waiting around for someone else to
>>
>>15714098
They're offering you shares in various governments.
>>15714097
If you were a true hacker, like me, you could get that without asking
>>
>>15714101
I've got more important things on my hands, you script kiddo.
>>
>>15714108
>implying I haven't created 300 confirmed ways to get your email and its password in under 10 seconds
>>
File: Braille.gif (7KB, 475x283px) Image search: [Google]
Braille.gif
7KB, 475x283px
>>15714062
It's in Braille.

Here's a guide.
>>
>>15714120
If my remedial understanding of braille is anything to go on, those are meant to be letters in your picture, not numbers
>>
>>15714120
THE ANSWER IS FPFKVVC
>>
File: Braille-Fixed.gif (3KB, 440x80px) Image search: [Google]
Braille-Fixed.gif
3KB, 440x80px
>>15714124
You're right.

That's what I get for pulling from a "learn Braille" test site.

See revised.
>>
>>15714129
Or you could google braille guide and find this website http://www.psypokes.com/rsefrlg/braille.php which makes the image lead to fifteen
>>
>>15714120
>>15714124

The braille spells out the word "Fifteen"
>>
>>15714133
I posted >>15714131
Congratulations, any idea what to do with that?
>>
>>15714131
I was obviously trying that.


Just having fun and trying to help. :/
>>
>>15714139
Sorry, but everything you posting leading to a dead end kind of made what you were doing a bit suspicious
>>
>>15714140
Seriously....

I literally am the person that pointed out it was braille - too bad I pulled a bad image.

Ahwell, have fun solving the puzzle. Post what it turns out to be - was honestly curious.
>>
>>15714142
I know, I'm just saying that your posts were a bit suspicious. If you have an idea for how to use fifteen please share it.
>>
File: Untitled2.png (12KB, 1135x744px) Image search: [Google]
Untitled2.png
12KB, 1135x744px
I got this too, from [email protected]
>>
Not sure - I'm not getting much from a Google Image Search using the image file itself. I was going to see if it was from one of those "solve the puzzle" type sites. It obviously came through GMail, I wonder if the sender was known to OP or not. (I can only guess they don't know the sender.)
>>
>>15714153
Exclusive OR?

This part I can't do.
>>
File: bravo.png (536KB, 1152x808px) Image search: [Google]
bravo.png
536KB, 1152x808px
bravo
>>
>>15714184
that can't be right
>>
>>15714184
I have gone through 5 different online XOR cipher decoders and none of them are working properly/only work for big files/only work with small passwords
>>
>>15714184
>>15714153
"fifteen" translates to
>01100110 01101001 01100110 01110100 01100101 01100101 01101110
xor'd with the
>00001011 00101110 00100010 00010001 00010100 00110000 00000111
in the email, yields
>01101101 01000111 01000100 01100101 01110001 01010101 01101001
which translates to
>mGDeqUi

but what does the mGDeqUi mean
>>
File: mGDeqUi.png (18KB, 500x500px) Image search: [Google]
mGDeqUi.png
18KB, 500x500px
Lazy faggots. Do it manually. The its this.
0 + 0 = 0
1 + 0 = 1
0 + 1 = 1
1 + 1 = 0

First binary to XOR
00001011 00101110 00100010 00010001 00010100 00110000 00000111
fifteen in binary (password sort of)
01100110 01101001 01100110 01110100 01100101 01100101 01101110


ends up being
01101101 01000111 01000100 01100101 01110001 01010101 01101001
or mGDeqUi in text


imgur.com/mGDeqUi

ends with this picure
>>
>>15714262
leads to mega link
>https://mega.co.nz/#!0NYAnJgK!u3EZBxAX-zDt5pBkTE0w6E3OvxrVFXOZYgRmf0mOYL4

a rar file called bottomless well.rar
downloading now
>>
Okay, so it's a mega file?
>>
>>15714262
What about the faded text in the background of the image?
>>
>>15714275
With folders....inside folders.
>>
File: contents.png (63KB, 1366x768px) Image search: [Google]
contents.png
63KB, 1366x768px
>>15714271
contents of the rar
zip file is password protected
>>15714276
didnt notice that
thanks
>>
File: image.png (13KB, 500x500px) Image search: [Google]
image.png
13KB, 500x500px
>>15714276
>>15714262
spooky
>>
>>15714271
opening this is a nightmare of PLEASE PURCHASE WINRAR LICENSE
>>15714282
It's not password protected to me 0.o
>>
>>15714285
ive done what i can do. i need to go now so just try to work it out
>>
>>15714285
Yeah it's not password protected - it opens right up on CrunchBang no problem.

It's just literally a damn endless well of folders and zip files. I feel like I've opened a million already.
>>
>>15714288
I kept going down around 50 times, couldn't find a bottom to the well
>>15714290
I don't know how to look into zip files too well to see if there is an end
>>
>>15714282
>>15714285
>>15714290
>>15714292
http://research.swtch.com/zip
shit lol it might actually be bottomless
>>
>>15714292
The Main folder that you first open contains the zip file and a txt file. The zip file is 1.6 MB - each file inside it is like 400K I think... so it does end eventually.
>>
>>15714302
try extracting it, then going one deeper, then extracting it again

if they're the same file, it's bottomless
>>
>>15714302
It's that each zip contains 400kb

I think that there's a hidden file/folder at the start
>>
>>15714306
It is the same file - I'm curious though because the answer to the question in the text file is that there is a bottom to the well. I've tried to see if there is a hidden file but I will keep trying.
>>
posted in /g/ asking for help
>>>/g/46235461
>>
>>15714373
I'm trying to see if I can do a recursive unzip on it.. be back.
>>
>>15714402
Nope - no dice until I get GZip/GUnzip.
Didn't install that on this machine.
Didn't think I'd ever need it.
>>
>>15714313
>>15714323
if the bottomless zip is only 400 kb but the whole thing is 1.5 mb, then maybe the extra stuff is embedded in it
>>
>>15714408
honestly i think the answer to this "mystery" is that someone very clever figured out how to make a zip file spit itself out over and over again ad infinitum ad nauseam. not spooky just very very clever.
it works like this:
the zip file contains a finite number of zip files.
but every time you unpack it you get the same zip file. which in turn contains the same zip file.
there is no end because it spits a copy of itself out at you when you unpack it. its considered bottomless without actually being bottomless in the first place. its just cloning itself, over and over, and the clones in turn clone themselves over and over. again on and on into infinity.
or at least until you run out of memory or the sun explodes...
>>
>>15714431
but what does it lead to from there? that can't be the end
>>
>>15714431
But there's also the question in the .txt file.
I think there must be an also clever way to "reach the bottom"
That, or someone took quite some effort to troll OTI.
>>
>>15714442
It's not the end. The file name is made up of a character setup that is not a latin or western character set. I can't do a recursive unzip on it right now because GZip can't find the directories due to the alternate character set.
>>
>>15714450
I may be missing something here but, rename it?
>>
>>15714037
Why did you block out the name of whoever sent the email? Surely if you don't know them, us getting their name won't be a problem.
>>
File: hex.gif (72KB, 781x750px) Image search: [Google]
hex.gif
72KB, 781x750px
>>15714313
>>15714424
It's embedded - check the hex

Removing this leaves just the .rar EOF and takes out the .txt, so when you open it you get to 1.zip

Which has an image in it...
>>
File: 1.png (1MB, 1080x810px) Image search: [Google]
1.png
1MB, 1080x810px
>>15714477
here, pic related
>>
>>15714456
Every level is named (unknowncharacter).zip. Renaming the first level does not change the issue with recurisive unzip on all of the other levels.

Basically can't do Gunzip -r *.zip because can't read the unknown character, can't Gunzip -r (unknowncharacter).zip because the system can't read the character, and even thought it displays like an "r" on my system can't Gunzip -r r.zip because it says no such directory.

What other languages use a character that looks like an "r" in English?
>>
>>15714483
Disregard this.

>>15714480
Thanks :)
>>
>>15714098
go get you some boner pills bruh
>>
i got into someones email once and uploaded a bunch of cocks
they probably thought that was weird
>>
sending emails to yourself OP is a pretty depressing thing
>>
New link
http://imgur.com/bdmkoYI
>>
>>15714497
hm mega with two sound files.
>>
File: heh.png (154KB, 1440x900px) Image search: [Google]
heh.png
154KB, 1440x900px
>>
>>15714442
it doesnt lead to anything
there is nothing there to find. its just a time waster for tinfoil hats to rededicate their lives to and make up a bunch of crazy ass crap about
>>15714446
the .txt file is just a hook to bait you into thinking that there is something there and that after you open enough folders you will be rewarded with something or other. but the simple fact that it is never ending entices the user to keep opening things and his mind catastrophises the best outcomes for opening them all. the perceived "prize" becomes sweeter and sweeter with every click and ever anticipation of what the next zip file contains.
when all that is contained is another zip file and all that will ever be contained is another zip file. you will not find anything because there is nothing to find.
other than some very clever embedded programming that makes the thing do the thing that the thing is doing.
>>
>>15714480
I saw images like this when screwing around with .raw files
>>
>>15714513
confirmed for not having read the thread
the next step was already found, dumbass
>>
>>15714519
kek
>>
>>15714512
Those both sound really unpleasant
>>
>>15714519
yeah i found that out after i posted replies to my reply.
thats what i get for being a grumpy old man in the army.
>>
Years ago I got an email that just said "I meant what I said about your skin."

I.
>>
>>15714519
forgot to mention: (same guy as the guy you replied to btw. but that is beside the point)
i am now curious to know what this will lead to.
i do not have the skill to find out what it leads to on my own. i am not that jedi with shit like this.
>>
>>15714527
That troll did good.
>>
>>15714521
Not THAT unpleaseant.
>>
>>15714527
it felt so good to caress it.
when you were young and unspoiled...
>>
Faded text of the second image says mozaiq
>>
>>15714537
Just repid beeps. It seems it may contain a binary code.
>>
File: audacity.png (106KB, 1580x591px) Image search: [Google]
audacity.png
106KB, 1580x591px
>>15714537
It's hard to describe the main sound, but it has a really high pitched tone inside it.

Here's what they both look like from inside audacity
>>
>>15714540
>>15714546
take the spectrals?
>>
>>15714540
thanks.
and yes that is exactly the shit they would use.
someone is trying to activate me.
not gonna fall for it.
>>
File: frequency.png (47KB, 577x491px) Image search: [Google]
frequency.png
47KB, 577x491px
>>15714548
I'm not sure how to do that, if you can tell me how to with audacity, I'd be happy to.

Here's a frequency analysis
>>
>>15714546
expand them out and slow it down while playing to 50% plz
>>
>>15714555
Yeah I'm trying to figure out how to use the key to get the message.
>>
>>15714555
holy shit thats gonna sound creeptastic as hell.
>>
File: image.png (508KB, 1279x787px) Image search: [Google]
image.png
508KB, 1279x787px
>>15714548
>>15714555
yooo
>>
File: 50% slower.png (101KB, 1580x598px) Image search: [Google]
50% slower.png
101KB, 1580x598px
>>15714557
Here's the first part of that. Turns out it is rapid beeps.

Message is high pitched, key is low pitched.
>>
>>15714563
Yo, that's crazy. What did you do?
>>
>>15714565
now that i look at the sound waves that looks like mores code
>>
>>15714569
just take the spectrogram of the wavs
>>
>>15714563
>>15714565
the long parts are the one not the short parts
in other words they are the dashes the short parts are the dots.
anybody know mores code?
>>
>>15714575
>morse
>it's binary
It might be a xor or something like it was at the start
>>
File: 50% slower part 2.png (99KB, 1584x627px) Image search: [Google]
50% slower part 2.png
99KB, 1584x627px
>>15714570
Either that or binary. Each group of beeps has 8 of them. We might need to XOR them again.
>>15714575
IMO it's more like binary
>>
>>15714577
Yeah, it's XOR I think.
>>
>>15714578
>have to put those beeps into binary
Who's gonna sit through this shit
>>
>>15714585
Just have to put down 160 1's/0's
>>
>>15714578
i concur just got done trying to send the characters thru a mores code text translator but got nothing. this is binary.
>>
>>15714578
question: how long are those files time wise?
>>
>>15714596
5 seconds originally, he slowed it down 2x the length
>>
>>15714590
Is someone already working on taking down the digits from the spectrograms? I hope so... I started to, but I have to head to bed soon.
>>
>>15714599
ok so slowing it was part of the solution... i feel better about myself now.
gonna go find a binary to comprehensible stuff translatamajig
>>
>>15714605
First step is to get the binary, then to XOR the message binary with the key binary.

If that doesn't work, make the 1's 0's and the 0's 1's and XOR the message binary with the key binary.

If you work out the binary, post it in the thread and I can work on part 2.
>>
>>15714611
Was >>15714563 not it?
>>
>>15714614
It's basically the same as >>15714565 >>15714578 but less distinct and it looks cooler
>>
>>15714611
just did it by hand with and online translatamajig
had some issues.
the dashes are one the dots are zero

following text is what was spat back out this is the audio not the key

òÒ#í3™1í0
>>
>>15714626
Did you XOR the message with the key?
>>
I'll bump this up in the morning if you guys don't solve it tonight so you don't lose the thread.

I want to see you solve it. :) G'night.
>>
>>15714629
dont know what that is.
i am not a clever man

here is what i got from using the translatamajig on the key

«•UªU¨T\à:
>>
>>15714638
>>15714626
at first glance...
what is this the internet equivalent of a numbers station?
>>
>>15714638
Don't use the translatamajig, give us the binary. We need it to do stuff to the binary to work out the solution.
>>
>>15714638
Google is your friend
Turn it back into binary, XOR the message with the key, and report back whatever comes up
>>
>>15714638
Lets say that a part of the binary from the message is 00110100 and a part of the binary from the key is 10001101

XOR'ing was explained here >>15714262 so XORing that gives us 10111001
>>
So I took the binary from >>15714563
And XOR'd it, then translated and this came up:
YGvGfjem
>>
>>15714638

Do you still have the binary numbers from before you used the translatamajig?

could you post those please?
>>
>>15714649
heres the binary: as i understand it to be binary seeing the dash as having data therefore a one and the dot as having no data therefore being a zero:

audio file:
11110010 11010010 00100011 11101101 00110011 11000010 01100110 00110001 11101101 00110000

key:
10101011 10010101 01010101 10101010 01010101 10101000 01010100 01011100 11100000 00111010

now if this does not make sense as the correct binary then its probable that inverting the ones and the zeroes will yeild the correct form. however i do not know how to translate this into anything worthwhile on my own. but i am curious to see what happens
>>
>>15714679
I have to go now, if no-one's XOR'd this in an hour I can do it
>>
>>15714261
It's a picture on imgur

go to it :3
>>
File: bin.png (707KB, 1440x900px) Image search: [Google]
bin.png
707KB, 1440x900px
>>15714679
This is the binary, goddammit.
>>
File: notime.jpg (80KB, 659x372px) Image search: [Google]
notime.jpg
80KB, 659x372px
>>15714685
>>
Wait a minute. butt sex! Butt sex requires a lot of lubrication, right? Lubrication. Lubruh... Chupuh... Chupacabra 's the, the goat killer of Mexican folklore. Folklore is stories from the past that are often fictionalized. Fictionalized to heighten drama. Drama students! Students at colleges usually have bicycles! Bi, bian, binary. It's binary code!
>>
>>15714695
its a troll.
the binary in the audio file and the key are a url portion that points us to the zip file which contains code that points us to the audio file which points us back to the picture that got us started on this whole thing to begin with. it is a file that spits itself back at us over and over again in more ways that one much like a program whose sole purpose is to spit its own lines of code back at the user as soon as the user tells it to be executed.
>>
>came in here expecting THAT image

You people disappoint me.

You are not ready.
>>
>>15714712
Which one?
>>
>>15714685
I tried that, couldn't find it
>>
>>15714716
If you do not know then you are not ready.

I'm sorry, goodbye.
>>
pls decode
>>
>>15714777
It's already been decoded right here >>15714705
>>
>>15714705
wat
>>
>>15714781
No/10

I'm going to work on decoding it in a few minutes
>>
>>15714829
Thanks!
>>
>>15714829
Holy fuck I am retarded.

It's called pastebin.rar, and everyone here put the XOR'd thing at the end of an imgur link

http://pastebin.com/YGvGfj2m is the next clue
>>
>>15714848
Now you're getting it.

It's not to late to stop though, you can still turn back.
>>
>>15714848
>http://pastebin.com/YGvGfj2m
>Felix Delastelle
>http://en.wikipedia.org/wiki/F%C3%A9lix_Delastelle
the strings are grouped by 3 so it must be a trifid

http://en.wikipedia.org/wiki/Trifid_cipher
But how do these do
>>
>>15714852
you're a faggot, macedgelord
>>
>>15714862
This all just a ruse anyways, no reason for anyone to spend this much time on all of this for it to not end with them saying something like "Remember to drink your ovaltine!"
>>
>>15714855
If they did it properly, then it would be:
2 3 1 2 3 1 3 3 3 3 2 3 2 3 2 2 3 1 3 3 2 2 2 2 1
3 3 3 3 1 2 3 2 1 3 1 2 3 3 2 3 2 1 1 1 2 1 3 2 3
2 2 3 3 1 3 3 3 1 3 2 2 3 1 2 3 2 2 1 1 3 3 3 3 1
Where the first line is the table, second is column, third is row. But the problem is that we don't have their set of tables.
>>
>>15714852
Nevah!
>>
File: capture.png (97KB, 1179x802px) Image search: [Google]
capture.png
97KB, 1179x802px
>>15714875
>PASTEBIN etc
>>
>>15714908
323 is k
>>
>>15714908
>>15714910

http://pastebin.com/K8ED3wmtwf
http://pastebin.com/8ED3wmtwf

Both options throw the message: This paste has been removed.
>>
>>15714908
>>15714933

331 is Q not E, and that F should be an O, making "two"

tl;dr http://pastebin.com/8qd3TWM2
you fucked up
>>
>>15714933
Maybe the people making the ARG fucked up?
>>15714934
Who is you?
>>
File: Untitled.jpg (27KB, 830x270px) Image search: [Google]
Untitled.jpg
27KB, 830x270px
>>15714934
>imgur.com/00111011 00111100 00110011 00100010 00001010 00010000 00011101

>Key: 01001110 01100101 01110100 01100001 01110011 01010011 01000100

great, someone solve htis
>>
>>15714934
>>15714936
Never mind, I see it now
>>
>>15714938
dw everyone, I got this
>>
File: image.jpg (119KB, 1024x768px) Image search: [Google]
image.jpg
119KB, 1024x768px
>>15714938
>>
>>15714947
Did you XOR'd it?
>>
>>15714947
>>15714952
No he didn't, and I'm working on it now
>>
nice creepy email thread guys
>>
>>15714954
They key seems right
>>
>>15714938
I just tried XOR'ing it by hand twice and I failed both times.

Anyone else want to try?
>>
>>15714962

Working on it. Checked the key, it is NetasSD
>>
File: 1375396644394.jpg (78KB, 720x576px) Image search: [Google]
1375396644394.jpg
78KB, 720x576px
>>15714971
>DSsaten
>saten
>>
It's uYGCyCY
>>
>>15714982
And that is a 404, one of the failed things I got earlier was uYGCuCY
>>15714974
>DSsaten
>DS satan
the DS is the work of the devil
>>
File: image.jpg (63KB, 1024x768px) Image search: [Google]
image.jpg
63KB, 1024x768px
>>15714982
Nope
>>
>>15714987
Nintendo confirmed satanists. Mystery resolved.
>>
>>15714997
Yeah, I noticed. Maybe we could try another logic operation.
>>
This may or may not help, but when you google "&quot;&lt;3&quot;" most of the links point to people asking about the emote <3
>>
>>15715004
>"&quot;&lt;3&quot;"

And where does that come from?
>>
>>15715008

From this.

>>15714947
>>
>>15715004
Its HTML
>>
hey guise, what if we use another cipher? Not a trifid?
It may sound dumb, but in the wiki are mentioned another methods
>>
I used another decoder for the first set of binary digits and I got
;<3"
>>
>>15715019
Because the trifid was the correct one and the code was arranged like trifids are arranged
>>
File: image.jpg (173KB, 1024x768px) Image search: [Google]
image.jpg
173KB, 1024x768px
>>15715008
>>15715015
HTML special characters
"<"
>>
>>15714722
Oh I hate cryptic messages.
>>
I'm kinda feeling a little too chilly on my side here. Guys, I don't think we should push any further. We might stumble upon 'deep web' thingy.
>>
File: 1335412160616.jpg (10KB, 284x177px) Image search: [Google]
1335412160616.jpg
10KB, 284x177px
>>15715036

>We might stumble upon 'deep web' thingy.
>deep web
>posts it on 4chan
>>
>>15714947
>>15715031
<3"
Again
>>
>>15715036
The deep Web is a fairly tame thing, when you know how to ride the beast.
Just don't go too deep, when you have no sufficient protection or operate from a device that contains personal data.
I'd really like to go in with a closed shell system one day.
>>
>>15715
"Only those who risk going too far can possibly find out how far one can go".
>>
>>15715004
>>15715021
>>15715038

Alright whats with that emote and NetasSD?
>>
try morse
73
>>
>>15715044

The <3" must pass another filter, for it is an imgur link.
>>
>>15715044
Or maybe since it says key like it's said before, we have to XOR it, like we've had to before. And that emote and NetasSD are just a coincidence from the binary they used for what they needed to end up with
>>
The XOR yields uYGCuCY, but this leads nowhere
>>
>>15715064
XOR it again
>>
>>15715064

How do you XOR it? I'd like to help with that
>>
>>15715068
>not reading the thread
>>15714262
>>
>>15715066
I'll try
>>
I can't help but feel as if this has something to do with the whole "Cicada 3301" group.
>>
>>15715086

I don't think so. I once read the whole process of decoding a Cicada puzzle to a very very far extent. It's a lot more sophistacated, compex and refined, you require some serious cryptographic and computational skills. Look for the Uncovering Cicada wiki, it's all there. Pretty awesome job and awesome shit in the messages
>>
>>15715091
This, it requires extensive knowledge of books and esoteric symbolism.
>>
Best thread on /x/ right now
>>
>>15715096

Not necessarily. The team that decyphered the messages went on and on without refering to the actual meaning of the runes and messsages, but it must be some hallucinating stuff, as some writings (in english) found along the way reveal very deep "trascendental" knowledge
>>
>>15715104
You'd still need to know a lot about books to find the book ciphers
>>
>>15715102
If this thread 404s before reaching a conclusion, I'm going to be upset.
>>
>>15715112
Then let's keep focused and try to find the next step. This one is taking way longer than the others.
>>
File: image.jpg (158KB, 1024x768px) Image search: [Google]
image.jpg
158KB, 1024x768px
Maybe?
>>
>>15715004

Though I may have been the first to suggest this, It's very possible I was wrong... We may be headed in the wrong direction now. Any chance it was a coincidence?
>>
>>15715126
>>15715126
http://www.utexas.edu/learn/html/spchar.html
I dont think so
>>
>>15715064
A novice at cryptology, has anyone tried negative the binary? I mean the opposite of something is nothing, and vise versa. Like write out 10110 as 01001?
>>
>>15715137
Reverse the binary and I'll XOR it, or smth.
>>
>>15715140
>uYGCuCY

10001010 10100110 10111000 10111100 10001010 10111100 10100110
>>
>>15715140

HEre's the imgur binary reversed:

10111000 00001000 01010000 01000100 11001100 00111100 11011100
>>
File: image.jpg (139KB, 1024x768px) Image search: [Google]
image.jpg
139KB, 1024x768px
>>15715132
I think i got something by asuming the 3 means 3X the following code in the HTML so i placed 3 quote marks with the key in the end I've got this
>>
>>15715163
Interesting, my friend. We could add this to the igmur code?
>>
>>15715163
WTF is this?
http://imgur.com/uYVCQ
>>
File: 1332831237392.jpg (43KB, 423x222px) Image search: [Google]
1332831237392.jpg
43KB, 423x222px
>>15715165
http://imgur.com/uYVCQ

HORY SHET
>>
>>15715163
If you look at the binary in the past that we XOR'd I'm pretty sure that most of them had weird symbols in them as well.

That's just what happens when you turn random binary into text, you're going to get random symbols.
>>
>>15715168
Kek, I'm guessing this is merely a coincidence.
>>
>>15715168
>>15715171
It's from 3 years ago. Most stuff in this puzzle is from this year. The only thing I've seen from earlier is the bottomless hole, which is from 2010, which implies that they copied that from somewhere.
>>
>>15715175

It still has 0 views after three years. Coincidence?
>>
>>15715178
It still has 0 views when around 3+ people in this thread have seen it.

Maybe the view count's fucked up and it's something which the person shared with 1 other person?
>>
Anyone remembers the transparent mosaiq?
>>
>>15714852
So... what's next, buddy?
>>
File: image.jpg (846KB, 580x6406px) Image search: [Google]
image.jpg
846KB, 580x6406px
Just to be shure someone magic wand this shit
>>
>>15715208
Have you tried unzipping the image?
>>
>>15714852

If you have something to say, then go for it.
>>
>>15714852
>it's not to late
>not to late
>to late
>to
>>
>>15715208
Isn't that just Golgo 13?
>>
>>15715257
No118 is missing
http://www.amazon.com/Golgo-13-Vol-118-Comics-Compact/dp/484583071X
>>
>>15715284
Poor guy is missing out in his collection
>>
>>15715284
Everyone plz.

>>15715163 got that by adding 3 quotes at the end of the key or some shit like that. And it happened to lead to a 3 year old picture on imgur of a collection of some sort.

Somehow, I have a feeling that it isn't that, it hasn't really fit the tone of this thing so far.
>>
>>15715299
Aso what about those creepy messages
>>15714283
The transparent
Mosaiq
>>
>>15715308
You mean the ones in the backgrounds of some of the images? I have no idea.
>>
>>15715322
Could anything be hidden in the background of that image and golgo13 be just a diversion to make us think we heading the wrong way?
>>
>>15715332
Anyone here knows anything about steganography?
>>
>>15715332
Like I said earlier, it's one of the only things in the puzzle so far that is older than this year. The only other thing is the bottomless zips, and that might be because it was copied from somewhere else

I think it's just a coincidence that everyone got hung up on
>>
>>15715342
Any other ideas?
>>
>>15715364
Sadly, no. But I think that the golgo thing is the wrong way. Did anyone get around to XORing it again or inverting it?
>>
>>15715375
I also think so.
And yup. Given how XOR works, it just gives you back the previous part. (If you XOR the result with the key, it gives you the message, and so on).
>>
>>15715387
Has anyone tried inverting it? I think in the thread I saw people invert it, but only part of it.
>>
>>15715396
Started, too tired now. You do it. Can be done in Excel easly [=XOR()]
>>
>>15715411
I don't have excel, only a knockoff
>>
>>15714101
Then you better be hanging around in carding forums about now. Those cvvs are gold you know.
>>
>>15715415
Then do it manually
>>
>>15715427
I tried XORing the stuff given to us already, and I made mistakes every time I tried doing it. I'd rather wait for someone with an automatic way to do it with no room for error.
>>
>>15715337
Look for it online. Youd still need a key for that.
>>
lurking.

if the comic way is the lead, then perhaps the missing one is a clue? golgo 13 vol 118?

so 13-118, maybe ac 118?

which leads to
Air Canada Flight 118
On time - departs in 7 hours 13 mins


guys? i really hope it's not this.
>>
>>15715478
but following that logic it could also point to a place called Moravia in NY.
So I'm doubting it's that.
Thread posts: 232
Thread images: 32


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.