[ARG] The Pizza Code Mystery

I don’t think EAS_bg is a punch card, the peaks that appear 6 times in the spectro are always roughly the same frequency :

This is their values :

86.27 Hz
301.2 Hz
496.1 Hz
1896 Hz
3747 Hz
5760 Hz
7665 Hz
9592 Hz
11512 Hz
13382 Hz
15342 Hz
17325 Hz
19143 Hz
21070 Hz

Those are not exact as they slightly change thorough the file but maybe they are characteristic of some protocol?

Yeah, it isn’t a punch card at all. faed proved it with the YT thumbnail

Let’s move on to the transmission now, shall we :smiley:

Intersting thing people in IRC thought of. Remember 1.192.12.156:2828 from the terminal.

One of us thought the clue 21 into 1 and changed it to 21.192.12.156:2828.

Guess what it is.

A fucking DOD IP.

Storm is trolling us hard.

Make any sense?

뛉쨆ᇥ 줒 흀빈효
Using a chinese to english interpretor results in:

Decrease magazines Thomas Dashley document?

Uh oh. I’m probably on a list now…

Well… he did say trust no one :stuck_out_tongue:

I know Stormseeker said pgp wasn’t the solution to the HALOS code, but…
https://pgp.mit.edu/pks/lookup?search=Chris+Horn&op=index

[code]Type bits/keyID Date User ID

pub 4096R/33691904 2014-12-31 Chris Horn chorn@post.com
[/code]

The date is what brought this to my attention, particularly.

He said openssl wasn’t the solution, pgp may well be a possibility. Unless I missed something?

This public key entry seems more inline for when the Halos file first went out

Very interesting.

Edit: HALOS.txt metadata:
Last-Modified Wed, 07 Nov 2012 03:59:11 GMT

Actually, you’re right. I mistook openssl for pgp.
Hopefully it’s still useful information, then.

In the IRC channel we’ve kinda hit a dead end. Any ides where to find clues?

Anything related to Cicada 3301 puzzles? Maybe this ARG uses similar cipher techniques :wink:
Anyway, do we know anything about tempus omnia relevant like its meaning or stuff like that?

In the 752 hex code the number 21 appears twice. Inserting 1 into the middle of this to get 211, and then converting the entire code back to ASCII obviously lead to several differences, interestingly two that appeared in the new code was the ascii string “toge” and another which was “PRA”. This is likely coincidental but i think other things could be found by comparing these strings or by using the 752 code, but with the 21s replaced with 211s

@!6A늲e梢#FghQ^7ub(b9T,MtVSsHpꉞ@t!aFd7WpSw,w}zxU6ۊ"uZ=y#S|V+CᛖAJqL-+#

after ASCII=>Text and swapping 21 to 01

let’s try caesars? rotating? these all seem to mean something

F###! All that time trying to decode it with openSSL… Has anyone tried steganography approach with the sound on the Emergency Transmision?

Has stormseeker said the message was encoded or encrypted? If it’s encrypted and OpenSSL can’t decrypt it then it is probably either RIJNDAEL or pen and papper.

I can’t quote him now, but yes, he said it’s an encrypted text, and can be decrypted.

Transmission and image are clear

I checked with OpenPUFF, there’s no watermark. How was it stablished that the sound file is completely clean? The image has the same checksum as the source they used, therefore there’s no modification and no room for anything hidden. But the sound to a certain extent was created by them. Or I’m missing something?

At least the voice was created by them. It mentions Black Mesa.

The beeps, I’m not too sure.

There’s no big way to remove the voices and try to make anything out of the beeps. Atleast I tried to with no result. It was analyzed over in the IRC and our friend Cal that is (I think a sound engineer) analyzed it too

Come over to the IRC so we chat

Has anyone tried working through the mathematics of the Benaloh Cryptosystem?

Here is a link to Benaloh’s original paper with the details of his equations:

https://www.lsv.ens-cachan.fr/Projects/anr-avote/PUBLIS/FLA-africacrypt11.pdf

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.