Site Tools


loose_threads

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
loose_threads [2025/08/05 21:05] – Irving daeloose_threads [2025/11/25 20:56] (current) – loose ends thehoax
Line 12: Line 12:
   * **Nashville drop numbers**: The [[dead_drops:nashville_drop#pictures_of_drop_site_and_contents|Nashville Slate book]] features a bunch of numbers, all of which return "This code is not entered into the correct system" on [[agent_systems#AS32]], and aren't accepted by [[Flare Pepper Kitchen]] and [[agent_systems#+1-856-666-0004]].   * **Nashville drop numbers**: The [[dead_drops:nashville_drop#pictures_of_drop_site_and_contents|Nashville Slate book]] features a bunch of numbers, all of which return "This code is not entered into the correct system" on [[agent_systems#AS32]], and aren't accepted by [[Flare Pepper Kitchen]] and [[agent_systems#+1-856-666-0004]].
   * **Irving drop MIDI file**: The [[dead_drops:Irving drop]] features a MIDI file with notes arranged into what appears to be a block of binary data.   * **Irving drop MIDI file**: The [[dead_drops:Irving drop]] features a MIDI file with notes arranged into what appears to be a block of binary data.
 +  * **Sunnyvale blob**: Unsolved blob of data from the [[dead_drops:sunnyvale_drop|Sunnyvale drop]] book.
 +  * **Wailua drop numbers**: Handwritten numbers in the note section of the [[dead_drops:wailua_drop|Wailua drop]] book, including a //Route code//, //path//, and //pass//. Currently not accepted by agent systems, or present in the path controller.
 +  * **OVAL**: A mysterious new GUI-based system. We don't know the credentials to get in, or what it does.
  
 ===== Partially solved ===== ===== Partially solved =====
Line 17: Line 20:
     * **Update 8/8/23**: The program [[https://steghide.sourceforge.net/|Steghide]] was shown being used on the [[terminals#amber_terminal|amber terminal]], providing us with a hint. Running this tool on ''Maria_1.jpg'' with an empty passphrase yielded a message.     * **Update 8/8/23**: The program [[https://steghide.sourceforge.net/|Steghide]] was shown being used on the [[terminals#amber_terminal|amber terminal]], providing us with a hint. Running this tool on ''Maria_1.jpg'' with an empty passphrase yielded a message.
     * **Update 8/27/23**: [[dead_drops:el_paso_drop#hidden_messages|More messages have been discovered]].     * **Update 8/27/23**: [[dead_drops:el_paso_drop#hidden_messages|More messages have been discovered]].
-  * **Agent code 637829**: Found in a player's agent letter, this code provides an interface to change the value of an 8-bit register. What is its purpose, and what value should we set it to? 
-    * **Update 2/22/24**: This register appears to control aspects of AS32.  
-      * Unit 0: Indicates whether the numbers on [[XORFS]] are decimal (0) or hexadecimal (1).  
-      * Unit 1: Controls whether the numbers on XORFS are separated by nothing (0) or by a tone (1). 
-      * Units 3–5: Sets the TTS voice used to read XORFS numbers. 
   * **Washington drop files**: The [[dead_drops:washington_drop#contents_of_usb_drive|Washington drop]] includes numerous files with random data.   * **Washington drop files**: The [[dead_drops:washington_drop#contents_of_usb_drive|Washington drop]] includes numerous files with random data.
     * **Update 10/26/23**: Jeff has used ''jotp1.bin'' to encrypt the Riverside drop RFID tag. Therefore, the ''jotpN.bin'' files might be his one-time pads for secure communication with us.     * **Update 10/26/23**: Jeff has used ''jotp1.bin'' to encrypt the Riverside drop RFID tag. Therefore, the ''jotpN.bin'' files might be his one-time pads for secure communication with us.
Line 46: Line 44:
   * **Path controller**: A mysterious system accessible by the Emtanon portal. Asks for a ''KEY:''. Purpose unknown.   * **Path controller**: A mysterious system accessible by the Emtanon portal. Asks for a ''KEY:''. Purpose unknown.
     * **Update 12/18/23**: The key was provided via [[felicity_s_voicemail#december_2023|Felicity's voicemail]] and a player's mailing, as strings of bytes to XOR together. Path controller provides access to //semaphores//, most of which are password-protected.     * **Update 12/18/23**: The key was provided via [[felicity_s_voicemail#december_2023|Felicity's voicemail]] and a player's mailing, as strings of bytes to XOR together. Path controller provides access to //semaphores//, most of which are password-protected.
 +  * **Agent code 637829**: Found in a player's agent letter, this code provides an interface to change the value of an 8-bit register. What is its purpose, and what value should we set it to?
 +    * **Update 2/22/24**: This register appears to control aspects of AS32. 
 +      * Unit 0: Indicates whether the numbers on [[XORFS]] are decimal (0) or hexadecimal (1). 
 +      * Unit 1: Controls whether the numbers on XORFS are separated by nothing (0) or by a tone (1).
 +      * Units 3–5: Sets the TTS voice used to read XORFS numbers.
loose_threads.1754420742.txt.gz · Last modified: by dae