Site Tools


loose_threads

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
loose_threads [2024/02/22 08:05] – 637829 daeloose_threads [2024/10/25 16:46] (current) dae
Line 7: Line 7:
   * **OTP-DAT-05**: Unsolved blobs of 500 or 600 bytes added to agent letters of players in Poland. It's in the book.   * **OTP-DAT-05**: Unsolved blobs of 500 or 600 bytes added to agent letters of players in Poland. It's in the book.
   * **Technoscrip**: Seems to be a sort of Emtanon's cryptocurrency. Can be earned by entering friendly codes to number ''16000'' on AS32, and the balance can be checked using the agent management system. We don't know what is it useful for.   * **Technoscrip**: Seems to be a sort of Emtanon's cryptocurrency. Can be earned by entering friendly codes to number ''16000'' on AS32, and the balance can be checked using the agent management system. We don't know what is it useful for.
 +  * **Flare Pepper Kitchen menu**: An item obtained in the [[dead_drops:Macau drop]]. We don't know how to use its contents. It also includes two QR codes, each containing 2048 bytes of random data.
 +  * **What happened to Jeff?**: [[characters:jeff_a|Jeff]] was a huge part of the story in 2023 before disappearing in January 2024. Is he still part of the counter operation? Did he start a new life in the mountains?
 +  * **What happened to YP?**: In March 2024, employee Yanis Pez was sent to [[wp>Terespol|Terespol, Poland]] for [[https://otp22.org/files/fpk/OP-BIBLIOTEKA.pdf|Operation Biblioteka]]. The mission never materialized, and his last communication was on April 27 while stranded in a hotel room.
 +  * **Nashville drop numbers**: The [[dead_drops:nashville_drop#pictures_of_drop_site_and_contents|Nashville Slate book]] features a bunch of numbers, all of which return "This code is not entered into the correct system" on [[agent_systems#AS32]], and aren't accepted by [[Flare Pepper Kitchen]] and [[agent_systems#+1-856-666-0004]].
  
 ===== Partially solved ===== ===== Partially solved =====
Line 13: Line 17:
     * **Update 8/27/23**: [[dead_drops:el_paso_drop#hidden_messages|More messages have been discovered]].     * **Update 8/27/23**: [[dead_drops:el_paso_drop#hidden_messages|More messages have been discovered]].
   * **Agent code 637829**: Found in a player's agent letter, this code provides an interface to change the value of an 8-bit register. What is its purpose, and what value should we set it to?   * **Agent code 637829**: Found in a player's agent letter, this code provides an interface to change the value of an 8-bit register. What is its purpose, and what value should we set it to?
-    * **Update 2/22/24**: This register appears to control aspects of AS32. The 1st bit from the left indicates whether the numbers in [[XORFS]] messages are decimal (0) or hexadecimal (1).+    * **Update 2/22/24**: This register appears to control aspects of AS32.  
 +      * Unit 0: Indicates whether the numbers on [[XORFS]] are decimal (0) or hexadecimal (1).  
 +      * Unit 1: Controls whether the numbers on XORFS are separated by nothing (0) or by a tone (1). 
 +      * Units 3–5: Sets the TTS voice used to read XORFS numbers.
   * **Washington drop files**: The [[dead_drops:washington_drop#contents_of_usb_drive|Washington drop]] includes numerous files with random data.   * **Washington drop files**: The [[dead_drops:washington_drop#contents_of_usb_drive|Washington drop]] includes numerous files with random data.
     * **Update 10/26/23**: Jeff has used ''jotp1.bin'' to encrypt the Riverside drop RFID tag. Therefore, the ''jotpN.bin'' files might be his one-time pads for secure communication with us.     * **Update 10/26/23**: Jeff has used ''jotp1.bin'' to encrypt the Riverside drop RFID tag. Therefore, the ''jotpN.bin'' files might be his one-time pads for secure communication with us.
Line 19: Line 26:
  
 ===== Solved ===== ===== Solved =====
-  * **The Emtanon portal**: [[https://emtanon.com/portal|The Emtanon website]] contains a login interface to some kind of portal.+  * **Emtanon portal**: [[https://emtanon.com/portal|The Emtanon website]] contains a login interface to some kind of portal.
     * **Update 9/11/23**: We have gained access to the portal. It allows us to interact with the [[terminals#amber_terminal|amber terminal]] and an emulator of the ABISM TV interface (Vectortone).     * **Update 9/11/23**: We have gained access to the portal. It allows us to interact with the [[terminals#amber_terminal|amber terminal]] and an emulator of the ABISM TV interface (Vectortone).
-  * **The amber terminal**: Yet another [[terminals|terminal]] colorthis one has slightly older software version than the green and red terminals. Purpose unknown+  * **Agent codes 301, 302, 303**: Throughout 2023each of these codes gave new 32-byte sequence every 24 hours, but their purpose was never identified by us or mentioned in-universe
-    * **Update 8/8/23**: The terminal was shown to be able to run Unix programs, and was used to encrypt data in an image using Steghide+    * **Update 1/6/24**: It's now known they are messages encrypted using the book //"[[books#Slate Deposits in the Intermountain West]]"//
-    * **Update 9/11/23**: We can now interact with this terminal through the Emtanon portal.+  * **Who helped Felicity and Jeff escape?**: Someone got [[characters#felicity_love|Felicity]] off [[places#gough_island|Gough]] to Brazil, and helped [[characters#jeff_a|Jeff]] when he was purposefully stranded. Who was it and what are their motives? 
 +    * As of 10/30/23, we are trying to set up a communication line with Jeff via [[felicity_s_voicemail|Felicity's voicemail]] to get some clarity on his involvement.  
 +    * From this communication, it seems that there is an inside group of Emtanon employees who are plotting to expose the organisation. We don't know who else besides Jeff is involved. 
 +  * **+1-856-666-0004**: Found in [[felicity_s_diary#shady|Felicity's diary]], this phone number plays chiptune music and accepts DTMF
 +    * **Update 12/4/23**: We found out this system is used to provide data disguised as chiptune music, and requires specific input codes, which are shared on other agent systems.
   * **Protected entries in Felicity's diary**: Three posts on Felicity's USB diary are password protected. The posts contain information that is very private to Felicity, so she is reluctant to give out the password.   * **Protected entries in Felicity's diary**: Three posts on Felicity's USB diary are password protected. The posts contain information that is very private to Felicity, so she is reluctant to give out the password.
     * **Update 9/16/23**: The hidden entries have been unlocked, leading to the discovery of the [[dead_drops:washington_drop|Washington drop]] and some new agent codes.     * **Update 9/16/23**: The hidden entries have been unlocked, leading to the discovery of the [[dead_drops:washington_drop|Washington drop]] and some new agent codes.
 +  * **Amber terminal**: Yet another [[terminals|terminal]] color, this one has a slightly older software version than the green and red terminals. Purpose unknown.
 +    * **Update 8/8/23**: The terminal was shown to be able to run Unix programs, and was used to encrypt data in an image using Steghide.
 +    * **Update 9/11/23**: We can now interact with this terminal through the Emtanon portal.
   * **[[agent_systems#cleveland_direct|Cleveland Direct]]**: The calling card is back! Received in the mail along with an agent letter. Now to find some Class 6 numbers.   * **[[agent_systems#cleveland_direct|Cleveland Direct]]**: The calling card is back! Received in the mail along with an agent letter. Now to find some Class 6 numbers.
     * **Update 9/27/23**: The [[dead_drops:washington_drop|Washington drop]] included card activation instructions, and a class 6 number ''3033090004'', containing audio from the Cleveland Direct training video. ''4196460004'' and ''8677440004'' were found to be valid, but containing nothing yet.     * **Update 9/27/23**: The [[dead_drops:washington_drop|Washington drop]] included card activation instructions, and a class 6 number ''3033090004'', containing audio from the Cleveland Direct training video. ''4196460004'' and ''8677440004'' were found to be valid, but containing nothing yet.
     * **Update 11/1/23**: ''8677440004'' now contains the MELTR ship coordinates.     * **Update 11/1/23**: ''8677440004'' now contains the MELTR ship coordinates.
-  * **+1-856-666-0004**: Found in [[felicity_s_diary#shady|Felicity's diary]], this phone number plays chiptune music and accepts DTMF. 
-    * **Update 12/4/23**: We found out this system is used to provide data disguised as chiptune music, and requires specific input codes, which are shared on other agent systems. 
-  * **Who helped Felicity and Jeff escape?**: Someone got [[characters#felicity_love|Felicity]] off [[places#gough_island|Gough]] to Brazil, and helped [[characters#jeff_a|Jeff]] when he was purposefully stranded. Who was it and what are their motives? 
-    * As of 10/30/23, we are trying to set up a communication line with Jeff via [[felicity_s_voicemail|Felicity's voicemail]] to get some clarity on his involvement.  
-    * From this communication, it seems that there is an inside group of Emtanon employees who are plotting to expose the organisation. We don't know who else besides Jeff is involved. 
   * **Path controller**: A mysterious system accessible by the Emtanon portal. Asks for a ''KEY:''. Purpose unknown.   * **Path controller**: A mysterious system accessible by the Emtanon portal. Asks for a ''KEY:''. Purpose unknown.
-    * **Update 12/18/23**: The key was provided via [[felicity_s_voicemail#december_2023|Felicity's voicemail]] and a player's mailing, as strings of bytes to XOR together. Path controller provides access to //semaphores//, most which are password-protected+    * **Update 12/18/23**: The key was provided via [[felicity_s_voicemail#december_2023|Felicity's voicemail]] and a player's mailing, as strings of bytes to XOR together. Path controller provides access to //semaphores//, most of which are password-protected.
-  * **Agent codes 301, 302, 303**: Throughout 2023, each of these codes gave a new 32-byte sequence every 24 hours, but their purpose was never identified by us or mentioned in-universe. +
-    * **Update 1/6/24**: It's now known they are messages encrypted using the book //"[[books#Slate Deposits in the Intermountain West]]"//.+
loose_threads.1708585504.txt.gz · Last modified: 2024/02/22 08:05 by dae