[ARG] The Pizza Code Mystery

Only thing we can do now is wait and stay tuned to this guy’s twitter.
https://www.twitter.com/time_van

Can this be used to solve 752 hex mystery?
https://github.com/blackthorne/Codetective

Hey all. I’m new to this ARG.
I’ve read most of the things you guys discovered until now(really nice work btw).

There is one thing though that you might have overlooked.
Stormseeker had posted this message on his Steam Profile:
[tt]“If it’s about the ARG, I’ve not set up or had any sites setup for hacking, so no. There is an answer, but you can’t brute force it, the CIA couldn’t brute force it. Someone is already close.”[/tt]
Notice that he mentions the CIA.

Also, the solution for IRC clue 2 is:
[tt]“N38°57’8.05” W77°8’44.82".
Solution two ignore loc data N32°52’50.77" W106°20’49.40" not buried at initial loc, fly here.
Travel 14.16 miles east we transferred the niobium there.
Await further instructions."[/tt]
38° 57’ 8.05 N 77° 8’ 44.82" W points to the Kryptos Statue at the CIA Headquarters.
Kryptos is a encrypted scupture bearing four encrypted messages. Three of them have been solved, the fourth is one of the most famous unsolved codes in the world.
Maybe one of the four messages can be used as a key to solve the 752 hex code?
Considering that Stormseeker mentioned that “CIA couldn’t brute force it”, maybe the fourth Kryptos code can solve it?

What if that sound is something that was used in the old computers like comodore and amiga?. I have heard that sometimes radio stations would have played a sound that the computer could translate in to a software, it would  have then been recorded to a casette and then loaded to the computer

Just in case you guys missed it (Haven’t counted all the “image” codes posted, sorry), the footer on the page isn’t text - it’s all one large image.
https://www.kxbm.net/article/assets/VGhlIHNjaWVuY2UgdGVhbSBoYXMgYmVlbiB0cmFja2luZyB5b3VyIHByb2dyZXNzIHdpdGggdGhlIEJsYWNrIE1lc2Egc2VjdXJpdHkgc3lzdGVtLiBVbmZvcnR1bmF0ZWx5LCBzbyBpcyB0aGUgbWlsaXRhcnku

I like this update. The plot thickens.
Also, this means we’re past the events of Half-Life - Not only has the Resonance Cascade happened, the facility has been nuked.

Yes. it has been already found.
“The science team has been tracking your progress with the Black Mesa security system. Unfortunately, so is the military.” :wink:

Guys, I’ve found two clickable image areas hidden on the page. One on the image of the ham/cb radio, and another one on the page footer image.

flavrans9’s post led me to finding this:

The radio image has a very very small area that is clickable. When you find it, you see this.

You’ll also hear a Morse code signal. I’ve uploaded it here[/size]
Now, who has a Morse decoder???

EDIT: I’ve uploaded a cleaner version here

Also, when you run the kxbm.net/assets/background.mp4 through Audacity and look at the spectrogram analysis you see this:

Notice the lines at the bottom. These don’t normally appear in sound files. What has been embedded here?

I couldn’t find the clickable areas, but looking for them I stumbled on this comment(?) in the page source around the radio:

Get away from there, Freeman! I’m expecting an important message

Even if none of this ends up leading anywhere, it’s nice to see any kind of progress.

Edit: The very beginning of the morse code sounds like SOS. I’ll try and see if I can get the rest of it.

I used audacity to decode it, it’s rough, but this is more or less what it says.

It says thomas lee online, was that like that before?

The K apparently means ‘end of message, listening for any response’.

The ‘DE’ in the beginning means ‘this is’, so AI5BM must stand for something (whoever’s sending the transmission or where they’re sending it from).

I think the only real useful part of that message might be the AI5BM as a code or a call sign, unless there are other morse recordings out there.

I cleaned up the message a bit for easier reading:

How did you put it in text format? Were you listening to it, or did you used a software?
What I mean is, are you sure it is “AI5BM”?

Also, on Local Desert Singles, in source code there is this:
LINK data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQEAYAAABPYyMiAAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAAZiS0dE////////CVj33AAAAAlwSFlzAAAASAAAAEgARslrPgAABExJ…
It is quite long (too long?) and at beginning it says “base 64”. I tried to decode it, but no luck.

This is just the favicon image :wink:

I used a software program called MRP40, but I had trouble getting a clean decode, so I was planning to verify it manually. But then Level posted his decode attempt using Audacity, and it more or less matched what I had. If anyone else wants to verify the decode, by all means.

I used Audacity to check out the waveform, here’s a snippet of it for D E A I 5 B M A I 5

You can pretty clearly see the dots and dashes, for anything that was iffy, I listened to individually to try to identify it. There were a few mistakes, eg, “REAEARCS” vs “RESEARCH”, but the message is pretty clear.

Since AI5BM is repeated 3 times, I’d say I’m reasonably confident with that accuracy, but it’s pretty easy for anyone else to take a look at it themselves and verify it.

can someone please give better directions to finding the secret clickable areas? and/or a report on what the second one (footer ‘directory’ image) does?

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.