Site Tools


loose_threads

This is an old revision of the document!


Loose threads

Unsolved

  • “Shadow Code Drops”: Found in a letter inside a player's mailed package, this is an unsolved blob of 512 random bytes.
  • Agent code 637829: Found in a player's agent letter, this code provides an interface to change the value of an 8-bit register. What is its purpose, and what value should we set it to?
  • Agent code 55559: Found among data leaked by Maria, this code says “Melter” and then prompts for input. We speculate that it may be used to upload MXP20 machine code to the MELTR ships, as mentioned by Jeff in the Riverside drop.
  • OTP-DAT-05: Unsolved blobs of 500 or 600 bytes added to agent letters of players in Poland. It's in the book.
  • Technoscrip: Seems to be a sort of Emtanon's cryptocurrency. Can be earned by entering friendly codes to number 16000 on AS32, and the balance can be checked using the agent management system. We don't know what is it useful for.
  • Path controller: A mysterious system accessible by the Emtanon portal. Asks for a KEY:. Purpose unknown.

Partially solved

  • El Paso drop photos: The El Paso drop contains multiple JPG files with pictures of people. One of the pictures appeared on AS32 before. It is heavily implied that there is something encoded in these messages using steganography.
  • Washington drop files: The Washington drop includes numerous files with random data.
    • Update 10/26/23: Jeff has used jotp1.bin to encrypt the Riverside drop RFID tag. Therefore, the jotpN.bin files might be his one-time pads for secure communication with us.

Solved

  • The Emtanon portal: The Emtanon website contains a login interface to some kind of portal.
    • Update 9/11/23: We have gained access to the portal. It allows us to interact with the amber terminal and an emulator of the ABISM TV interface (Vectortone).
  • The amber terminal: Yet another terminal color, this one has a slightly older software version than the green and red terminals. Purpose unknown.
    • Update 8/8/23: The terminal was shown to be able to run Unix programs, and was used to encrypt data in an image using Steghide.
    • Update 9/11/23: We can now interact with this terminal through the Emtanon portal.
  • Protected entries in Felicity's diary: Three posts on Felicity's USB diary are password protected. The posts contain information that is very private to Felicity, so she is reluctant to give out the password.
    • Update 9/16/23: The hidden entries have been unlocked, leading to the discovery of the Washington drop and some new agent codes.
  • Cleveland Direct: The calling card is back! Received in the mail along with an agent letter. Now to find some Class 6 numbers.
    • Update 9/27/23: The Washington drop included card activation instructions, and a class 6 number 3033090004, containing audio from the Cleveland Direct training video. 4196460004 and 8677440004 were found to be valid, but containing nothing yet.
    • Update 11/1/23: 8677440004 now contains the MELTR ship coordinates.
  • +1-856-666-0004: Found in Felicity's diary, this phone number plays chiptune music and accepts DTMF.
    • Update 12/4/23: We found out this system is used to provide data disguised as chiptune music, and requires specific input codes, which are shared on other agent systems.
  • Who helped Felicity and Jeff escape?: Someone got Felicity off Gough to Brazil, and helped Jeff when he was purposefully stranded. Who was it and what are their motives?
    • As of 10/30/23, we are trying to set up a communication line with Jeff via Felicity's voicemail to get some clarity on his involvement.
    • From this communication, it seems that there is an inside group of Emtanon employees who are plotting to expose the organisation. We don't know who else besides Jeff is involved.
This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.More information about cookies
loose_threads.1702557643.txt.gz · Last modified: 2023/12/14 13:40 by thehoax