[ARG] The Pizza Code Mystery

I will have another look at at OTR, I downloaded the toolbox. However, all the irc messages mention OTR, and none of them have used it.

Also, OTR needs a 32 bit hex code (as a passcode), and we don’t have that

Great work on the HALOS.txt file!

As for the hex, has anyone tried converting it into an image yet? I know it can be done, but don’t know where to start when it comes to gathering the resources to do so.

put in .txt file change the.txt to .png

That simple, eh? I would have thought it would require some sort of converter.

I’m not a specialist on that, but I think that the most obvious way of converting hex to image would be changing each byte to one component (R,G or B) of a pixel. However, the number of bytes would have to be divisible by 3. It isn’t…

And to darkone: It isn’t that simple, I created some random png file in normal image editor, and then opened it in Notepad - it was looking like :
‰PNG IHDR ’ % ćő sRGB ®Îé gAMA ±Źüa cHRM z& €„ ú €č u0 ę` :˜ pśşQ< ‡¨IDATx^í˝Q–ä8®e›oJoľ5Î^ýuŰ=—e)‘Ž$‡¦«>Ľ<pH€[ Ăě˙űź˙ůźřƒ(€(€(€(Ŕuń&*đ˙óP P ^ŔoźkâvËŁQŕGźDű?˙÷?‘˙m)

So you can’t just change extension.

Here is the OTR//4.0 message with the hex converted to raw data.

Also, it could still be a 1-bit (monochrome) or 8-bit (grayscale) bytestream of pixel values. 376 bytes is evenly divided by both options.

For a grayscale image, the possible resolutions are:
1 x 376
2 x 188
4 x 94
8 x 47

And for monochrome:
1 x 3008
2 x 1504
4 x 752
8 x 376
16 x 188
32 x 94
47 x 64
otr4_binary_data.txt (376 Bytes)

Correct me if I’m wrong, but are you all working on something that came from someone that suddenly joined irc then left? Have you any evidence that this is related to the pizza mystery at all and not someone just trolling?

I tried out my pixel array theory, but all possible combinations just look like television static. :frowning:

Well, it would be a very good troll.

Evidence was in the last message we had indicated to us that there was new information on the website, and on stormseekers website there was some ascii85 encoded text. When changed to plaintext, the message off his website was the same format as the IRC messages. So no troll there unless he faked stormseekers website.

The red herring idea was brought up on the IRC chat last night, but I’m convinced that this is the real deal. It still seems to me like it could simply be a buildup to a larger “gate” puzzle much like the SECOM cipher was. In other words, we’ll have to take everything we’ve learned since the pizza is a lie website was revealed and determine the greater picture.

Anyway, I’ve gone ahead and updated the blog with this new information. I’ve also added a new poll and an entirely new rating system that will allow you to rate separate characteristics of the ARG. For now, it asks you to rate how quickly you feel the ARG is progressing. Keep in mind, its use is merely for entertainment, and I don’t intend to make some sort of case about it. It’s merely for “kicks” and giggles.

Okay, the hex is NOT a grayscale image. I did some java trickery and converted the hex to grayscale values and then into the 4 possible images, and found that all of them are garbage. See attached.
img_8_47.png
img_2_188.png
img_1_376.jpg
img_4_94.png

missingno, I choose you!

Hahahahahaha . . . wow that brings back memories

QR code? could it be a small one of thoughs… wait would require a squire none are squares.

A square eh? like say…a pizza box?

Where did you see this?

You also have other choices, for example 3008 x 1
It isn’t the same as 1 x 3008, see this: https://en.wikipedia.org/wiki/Arecibo_message
The correct decoding is shown on the top right corner of the page, but it can also be decoded the other way around, seen on the bottom right.

Yah I checked with the width/height swapped too. Still just static.

Why is everyone talking about images? When I first saw this, I thought it could be a block cipher. The code length is 376 bytes, 8*47, 8 bytes = 64 bits, so it could be a 64-bit block cipher like DES, 3DES, Blowfish. I tried to decode it, but I didn’t succeed.

By the way, in case anybody wants to see my code, you can access it here:https://pastebin.com/ZwVjCXWA

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.