Pages:
Author

Topic: ARG Puzzle with 3.5 BTC Private Key Prize, Game Over - page 26. (Read 99538 times)

newbie
Activity: 13
Merit: 0
i bet its fake puzzle, and noone will win or person know to this event creator  Tongue
sorry to spoil fun trying

maybe you right but don't matter
newbie
Activity: 14
Merit: 0
hoba, thanks for the uploading this. Also read Shorenas text, good work.
newbie
Activity: 28
Merit: 0
i bet its fake puzzle, and noone will win or person know to this event creator  Tongue
sorry to spoil fun trying

What?

I do believe this will end, the 51 char hint in the top left would assert that it's the last stage.

I'll quote ARG in an off forum chat "wish someone would solve this already so I can go do something else"

Couldn't agree more. Anyway, back to sifting through the numbers..
legendary
Activity: 2296
Merit: 1014
i bet its fake puzzle, and noone will win or person know to this event creator  Tongue
sorry to spoil fun trying
newbie
Activity: 15
Merit: 0
The correct overlay (xmp-points scaled [0;1]x[0;1]=>[0;3600]x[0;2974])

My impression is, that the confusingly stroked area (with the SETI signal) is irrelevant, it's also used for the password already. Attention should be payed for the channel number and the 51 bytes headlines and somehow the marked line on the right.

http://i.imgur.com/lUHNUQK.jpg
newbie
Activity: 14
Merit: 0
arg
newbie
Activity: 14
Merit: 0
I know someone plotted the EXIF paint correction data, but is there any chance someone could go point by point? not in lines, but x coord, y coord with that info?

50 lines of signal strengths.
1 line of just 02 repeated.

I think each 2 data point corresponds to the letter in it's line, and where they intersect is where we go, but in order. (Top to bottom, or bottom to top)

Everything except the block of 51 characters is verbatim from the original image.


edit: ok maybe you is a dick!  i will follow the mathgate.info advice if i fungers it out.

Not intended to be in that case. I forgot who I was giving instructions to. You will of course need to import the key and then send the funds to a new address, otherwise they will be retained in the former key other people know. As soon as you've sent them out of the starting address, you're free to gloat about it in the thread.


the_trail.pdf said you were a dick


I resent that.
member
Activity: 72
Merit: 10
I know someone plotted the EXIF paint correction data, but is there any chance someone could go point by point? not in lines, but x coord, y coord with that info?

50 lines of signal strengths.
1 line of just 02 repeated.

I think each 2 data point corresponds to the letter in it's line, and where they intersect is where we go, but in order. (Top to bottom, or bottom to top)
sr. member
Activity: 274
Merit: 250
Very nice write-up Shorena.
Thanks for taking the time to do this.
sr. member
Activity: 358
Merit: 250
OK, let me try to summarize where we stand. We finally have:

1) A string overlaid at the header of the table in Wow.jpg file:
Code:
z69JZqlJn862D1ndx7oLVEMmV0lP1zewEeUCrsI7Roahzpeny7P

2) Different pattern in the part of the Crop.jpg image.

Can someone please post original and changed parts of the Crop.jpg, correctly cropped and resized, so that they can be carefully examined? There is an image in the PDF file which describes the progress, but it's ruined with some coloring and is not useful for detailed examination.

One thing is not clear to me, did we got the password seed 'Wov!' before or after we opened the Wov.jpg? If we got it after we opened the file maybe the overlay string is not important any more, like some other clues before, which were just false ends.

the password to crops.7z led to the Wow.jpg inside, so it was before
hero member
Activity: 644
Merit: 502
i just gotta say, the OP is a badass chica, and all who have worked on this are also bad to the bone.
legendary
Activity: 1974
Merit: 1077
Honey badger just does not care
OK, let me try to summarize where we stand. We finally have:

1) A string overlaid at the header of the table in Wow.jpg file:
Code:
z69JZqlJn862D1ndx7oLVEMmV0lP1zewEeUCrsI7Roahzpeny7P

2) Different pattern in the part of the Crop.jpg image.

Can someone please post original and changed parts of the Crop.jpg, correctly cropped and resized, so that they can be carefully examined? There is an image in the PDF file which describes the progress, but it's ruined with some coloring and is not useful for detailed examination.

One thing is not clear to me, did we got the password seed 'Wov!' before or after we opened the Wov.jpg? If we got it after we opened the file maybe the overlay string is not important any more, like some other clues before, which were just false ends.
sr. member
Activity: 644
Merit: 250
what are you going to do if you figure out the public address's private key?  how does one go about claiming the BTC in the address?
thx

If you have the privkey you open Bitcoin Core, open the debug console, type "importprivkey keykeykeykeyhere", and wait for your monies to appear.

the_trail.pdf said you were a dick, but i says Thanks you!

edit: ok maybe you is a dick!  i will follow the mathgate.info advice if i fungers it out.

or just import it and then send it to your own adress...
hero member
Activity: 644
Merit: 502
what are you going to do if you figure out the public address's private key?  how does one go about claiming the BTC in the address?
thx

If you have the privkey you open Bitcoin Core, open the debug console, type "importprivkey keykeykeykeyhere", and wait for your monies to appear.

the_trail.pdf said you were a dick, but i says Thanks you!

edit: ok maybe you is a dick!  i will follow the mathgate.info advice if i fungers it out.
legendary
Activity: 1904
Merit: 1074
The Wow.jpg looks a lot like Braile. {Text for the blind} on the left hand side or are we back at Morse?

 

newbie
Activity: 22
Merit: 0
In addition to the "CHANNEL NUMBER, (TWO DIGITS, WRITTEN VERTICALLY)" and the numbers below that, the header right next to that has been moved a little bit.

Have a look at the difference between the original and the modified file:
http://i.imgur.com/rXn7XZ4.jpg

You can see it nudge around here:

http://i.imgur.com/0aDncXb.gif

Along with the XMP data describing traces of some random brushstrokes around the image (of which I composed perhaps a more accurate plot here) , I feel like this header moving is probably unrelated. Just mistakes left by the riddler. But I thought to share anyway! You have made so much progress and I haven't been able to contribute much after the minecraft and QR code phaze, so maybe you can find something meaninful in this too.

Sorry for the gigantic images.
legendary
Activity: 1904
Merit: 1074
Thanks for the pdf guys.. I am busy with it now.

Also very happy, my contribution was also mentioned in the file *bow before the creator.  Grin {All those sleepless hours, was worth it}

I must say, this whole process, is VERY informative and I am learning something new each day now. Thanks again guys and gals.  Wink

Oh well.... back to reading then..
member
Activity: 72
Merit: 10
Yeah, sorry, this did end up being a false positive, I ran it through a hex editor, excised the parts that 'may' have been a 7z compressed file, no match to any known compression type.

Sorry, looks like the file is the file.

This is it.

(Also, to find some of these faster, notepad++ with little endian encode.)
arg
newbie
Activity: 14
Merit: 0
How are you guys working this out..... seriously... ?
Sad

I wrote a tool that runs through various obfuscation techniques (XOR, shift) on the image and attempts to find magic bytes of known file types. Piles of false positives, but nothing which decodes to a valid file of any type. Tried hundreds, star, 7zip, zip, rar, etc etc.
legendary
Activity: 910
Merit: 1000
★YoBit.Net★ 350+ Coins Exchange & Dice
How are you guys working this out..... seriously... ?
Sad
Pages:
Jump to: