Outguess cicada online7/5/2023 ![]() ![]() For more detailed information, please read What Happened over at Uncovering Cicada. On January 5th, 2013, a second instruction file named "232.jpg" was posted to /x/ and /b/ boards on 4chan. It took a while for this to sink in with the community, that this wasn't just a talented neckbeard in a basement, that this was actually a global organisation of some very very talented people. At each of these locations, brave solvers found a sheet of paper stuck to a telegraph pole, with a QR code and an image of a cicada. Upon running the same image through OutGuess for the second time, a new message was produced with a series of GPS co-ordinates in addition to the two sets already provided on the website (shown below). Check back at 17:00 on Monday, 9 January 2012 UTC. Goodbye.Īfter multiplying the 3301 with the width and height of the original image (509 pixels by 503 pixels), both of which are prime numbers, the sum revealed the following domain: Multiply all three of these numbers together and add a. There are three prime numbers associated with the original final.jpg image. Upon dialing this phone number (214 – 390 – 9608), a pre-recorded message was played: The deciphered message read:Ĭall us at us tele phone numBer two one four three nine oh nine six oh eight ![]() The text could be then decoded using the book code, a type of cipher in which the first number is the line and the second number is the character in that line. The shifting method revealed the text of Owain, or the Lady of the Fountain, one of the three tales associated with the Middle Welsh proses known as the Mabinogion. Using the numeric sequence displayed in the header section of /r/a2e7j6ic78h0j as the "key" (10, 2, 14, 7, 19, 6, 18, 12, 7, 8, 17, 0, 19, 7, 14, 18, 14, 19, 13, 0, 1, 2, 0), each letter in the ciphers were then shifted by the number corresponding to its location in the text. Stop making it more difficult than it is. The key has always been right in front of your eyes. Key ID 7A35090F, as posted in a2e7j6ic78h0j. "From here on out, we will cryptographically sign all messages with this key. Once processed through the program, the file unlocked a link to /r/a2e7j6ic78h0j, a mysterious Reddit community populated with two additional images and a series of text posts encrypted in codes.Īfter being processed through OutGuess, the two images revealed the following messages: Upon decrypting, the text revealed a URL address to an image of a wooden duck accompanied by another cryptic message (shown below), which vaguely suggested the use of OutGuess, a steganography application used to hide and find messages within image files. The first clue in the puzzle was retrieved by opening the image file in a text-editing application, which revealed the following message encoded as a Caesar Cipher: TIBERIVS CLAVDIVS CAESAR says "lxxt>33m2mqkyv2gsq3q=w]O2ntk" The following account is a summary report of all known discoveries concerning Cicada 3301 based on the information provided by the Wikia project Uncovering Cicada. ![]() The mysterious post was quickly met by various speculations and theories surrounding its true intent, with some simply interpreting the message as yet another alternate reality game (ARG), while others suspected that it was a recruitment program for the United States intelligence community. The contest began on January 4th, 2012, when an image of a text-based puzzle was posted to 4chan's /b/ (random) and /x/ (paranormal) boards, which challenged the readers to find a hidden message in the file (shown below). ![]()
0 Comments
Leave a Reply. |