Pages:
Author

Topic: The Legend of Satoshi Nakamato, FINAL STEP PUBLISHED.... 4.87 BTC GRAND PRIZE! - page 32. (Read 108521 times)

member
Activity: 61
Merit: 10
Another observation re: data.

If you look at the first 17 bits of the inner track top color (l->r) against the first 17 bits of the outer track top color in same direction, they are identical.  I know you'd expect repeats even in random data but 17 bits in a row starting right on the boundary?  Odds are 1 in 131072 that'd happen?

inside colors
"000101010010110110", // outside track top, left to right

outside colors
"0001010100101101110010110000", // inside track top, left to right

+ 17 leaves…

please bear in mind that it does not have to be 17 intended matching digits. It as well may be that the intended number is 16 and the last one is coincidental.

Also, I was thinking that the two streams do not necessarliy have to be equal, they may be complementary (in the sense, that 0/1 is switched in the other stream, the substitution of color with 1 or 0 is arbitrary after all - at that point, at least) suggesting the double helix (in line with CompNeuro's way of thinking). Maybe the top left corner is the beginning of the folded two flame high, 76 flame long double sequence.
newbie
Activity: 7
Merit: 0
Another observation re: data.

If you look at the first 17 bits of the inner track top color (l->r) against the first 17 bits of the outer track top color in same direction, they are identical.  I know you'd expect repeats even in random data but 17 bits in a row starting right on the boundary?  Odds are 1 in 131072 that'd happen?

inside colors
"000101010010110110", // outside track top, left to right

outside colors
"0001010100101101110010110000", // inside track top, left to right

+ 17 leaves…
jr. member
Activity: 62
Merit: 5

amazing observation! And the more amazing is the fact that it is so simple and everybody has been staring at those flames for more than 3 years!

I have this luck today that there is my alter ego (regards, clanestutr) paraphrasing the same exact minute what I was saying in my post (which was cool and unexpectedly a little creepy) and then there is this troll copying my post an hour later. I am reporting this one
member
Activity: 75
Merit: 10
That's two more troll accounts to ignore....
jr. member
Activity: 62
Merit: 5
Another observation re: data.

If you look at the first 17 bits of the inner track top color (l->r) against the first 17 bits of the outer track top color in same direction, they are identical.  I know you'd expect repeats even in random data but 17 bits in a row starting right on the boundary?  Odds are 1 in 131072 that'd happen?

inside colors
"000101010010110110", // outside track top, left to right

outside colors
"0001010100101101110010110000", // inside track top, left to right



amazing observation! And the more amazing is the fact that it is so simple and everybody has been staring at those flames for more than 3 years!
newbie
Activity: 54
Merit: 0
member
Activity: 75
Merit: 10
Another observation re: data.

If you look at the first 17 bits of the inner track top color (l->r) against the first 17 bits of the outer track top color in same direction, they are identical.  I know you'd expect repeats even in random data but 17 bits in a row starting right on the boundary?  Odds are 1 in 131072 that'd happen?

inside colors
"000101010010110110", // outside track top, left to right

outside colors
"0001010100101101110010110000", // inside track top, left to right

newbie
Activity: 7
Merit: 0
guys, I would hate to cool your optimism down, but of course you realize that every second binary digit (5 of them coding every baconian letter) belongs to that crazy 0x1x1x pattern that is constant throughout the flames. It can't imagine the creator choosing letters and wording so carefullty, so that she can convey her intended message but chosen letters would not break the constant pattern.

They've been able to encode information into bitcoin public addresses (i.e., the snow poem). It's probably not beyond their capabilities to construct an arbitrary bitstream (and keep in mind, we're only talking about just the flame heights here) with enough sophistication to encode something else.

Quote
On the other hand, it makes much sense what RealOnTheMF said, that it is a massive coincidence: doing the exhaustive search of all possible permutations of all subsets of 8 flame segments, accepting CW or CCW order of each segment, skipping every 1 flame or 2 or 3 or 4 or 5 or whatever threshold he chose as the upper limit, applying the 011010 XOR or not, excluding first k flames when applying the XOR (k=0,1,etc.) ...

I agree -- I believe this is really just a coincidence. But there must be a methodology for deciphering all these 1s and 0s, and so far, no one appears to have had much luck in getting a foothold on it. It's interesting, and it's worth exploring.
member
Activity: 196
Merit: 23
Large scale, green crypto mining ICO
It was my belief that the message properly decoded would read "thecolouriskeyfile", which would indicate the inner and outer colour tracks would be decrypted by following the same steps as with the height track. The British spelling of "colour" seemed reasonable because the Rob Myers guy is a filthy Canadian, and CoinArtist seemed to have EU heritage, although I couldn't find anything definitive.

Interesting -- and that would make sense too. The binary pattern we *have* is:

Quote
100110011100100001010110011010000001010010001010001001001010001001100000101010000101100100...

…and the one that *would* say "thecolouriskeyfile" is:
Quote
100110011100100000100111001011011101010010001010001001001010001001100000101010000101100100

Differences in bold. Maybe they got off somewhere in transcribing the pattern.

Maybe they got off somewhere in transcribing the pattern ... and then again ... and then again ... Cheesy
newbie
Activity: 14
Merit: 0
my thinking exactly, especially the keyFILE part

EDIT: actually, on the second thought and the second reading, my thinking entirely Cheesy

 Cool Cool
jr. member
Activity: 62
Merit: 5
You're missing the modulus operation. It's kind of hidden in a single line of code.

Whoops. Yeah, missed that first time around.

The more I play around with the XOR patterns and permutations of row order/orientations, the less I think that these words are meaningful. It's a fairly unlikely coincidence, I admit, for "is" "the" & "keyfile" to appear, but those aren't particularly long words, with "keyfile" being the only exception.

But, perhaps more important--why would they use the term "keyfile" (or "key file") at all? The result wouldn't be a file, it would be a private key. I don't see the puzzle creators using a phrase like "keyfile" when "privkey" or even "key" would suffice, especially when "keyfile" is technically innacurate.

Not to mention generating this phrase requires a series convoluted steps:

1. Arrange 6 out of 8 rows in a pattern that doesn't appear anywhere else in the painting (to be fair, it may be undiscovered, but the bishop/knight explanation breaks down, for me. It's almost certainly a queen rather than a bishop, and the knight's movement is precise in a way that doesn't reflect the jumping around necessary for this row order/orientation)

2. XOR with 011010, but only after you skip the first bit entirely.

3. Cycle back to the beginning of the 6 rows and rinse/repeat.

What about the 011 pattern that tracks through all of the rows without deviation? Sure, it's possible to encode words and still have that pattern exist, but it's a hell of a lot harder, and--considering the route you have to take to generate the above phrase, seemingly unnecessary.

my thinking exactly, especially the keyFILE part

EDIT: actually, on the second thought and the second reading, my thinking entirely Cheesy
jr. member
Activity: 62
Merit: 5
It was my belief that the message properly decoded would read "thecolouriskeyfile", which would indicate the inner and outer colour tracks would be decrypted by following the same steps as with the height track. The British spelling of "colour" seemed reasonable because the Rob Myers guy is a filthy Canadian, and CoinArtist seemed to have EU heritage, although I couldn't find anything definitive.

Interesting -- and that would make sense too. The binary pattern we *have* is:

Quote
100110011100100001010110011010000001010010001010001001001010001001100000101010000101100100...

…and the one that *would* say "thecolouriskeyfile" is:
Quote
100110011100100000100111001011011101010010001010001001001010001001100000101010000101100100

Differences in bold. Maybe they got off somewhere in transcribing the pattern.

theflamesiskeyfile

guys, I would hate to cool your optimism down, but of course you realize that every second binary digit (5 of them coding every baconian letter) belongs to that crazy 0x1x1x pattern that is constant throughout the flames. It can't imagine the creator choosing letters and wording so carefullty, so that she can convey her intended message but chosen letters would not break the constant pattern.

On the other hand, it makes much sense what RealOnTheMF said, that it is a massive coincidence: doing the exhaustive search of all possible permutations of all subsets of 8 flame segments, accepting CW or CCW order of each segment, skipping every 1 flame or 2 or 3 or 4 or 5 or whatever threshold he chose as the upper limit, applying the 011010 XOR or not, excluding first k flames when applying the XOR (k=0,1,etc.) - what I am thinking that there were so many bit streams tested (milions would be my guess), that he simply stumbled upon the words that made sense. Not entirely made sense, as you can see. Even if the 'colour' is what was really intended, we don't have to do with a key file, but with a key itself, so the message really is more or less senseless.
newbie
Activity: 14
Merit: 0
You're missing the modulus operation. It's kind of hidden in a single line of code.

Whoops. Yeah, missed that first time around.

The more I play around with the XOR patterns and permutations of row order/orientations, the less I think that these words are meaningful. It's a fairly unlikely coincidence, I admit, for "is" "the" & "keyfile" to appear, but those aren't particularly long words, with "keyfile" being the only exception.

But, perhaps more important--why would they use the term "keyfile" (or "key file") at all? The result wouldn't be a file, it would be a private key. I don't see the puzzle creators using a phrase like "keyfile" when "privkey" or even "key" would suffice, especially when "keyfile" is technically innacurate.

Not to mention generating this phrase requires a series convoluted steps:

1. Arrange 6 out of 8 rows in a pattern that doesn't appear anywhere else in the painting (to be fair, it may be undiscovered, but the bishop/knight explanation breaks down, for me. It's almost certainly a queen rather than a bishop, and the knight's movement is precise in a way that doesn't reflect the jumping around necessary for this row order/orientation)

2. XOR with 011010, but only after you skip the first bit entirely.

3. Cycle back to the beginning of the 6 rows and rinse/repeat.

What about the 011 pattern that tracks through all of the rows without deviation? Sure, it's possible to encode words and still have that pattern exist, but it's a hell of a lot harder, and--considering the route you have to take to generate the above phrase, seemingly unnecessary.

There are a lot of possible permutations, even between 6 out of 8 rows (upwards of 20,000). Maybe if "keyfile" made more sense to me, but I say it's just coincidence that these words exist here. Hell, look at how many scholars tried to prove Bacon was Shakespeare because they "found" his signature hidden in the texts. Everywhere. Those had equally convoluted rule-sets / approaches.
hero member
Activity: 694
Merit: 500
It was my belief that the message properly decoded would read "thecolouriskeyfile", which would indicate the inner and outer colour tracks would be decrypted by following the same steps as with the height track. The British spelling of "colour" seemed reasonable because the Rob Myers guy is a filthy Canadian, and CoinArtist seemed to have EU heritage, although I couldn't find anything definitive.

Interesting -- and that would make sense too. The binary pattern we *have* is:

Quote
100110011100100001010110011010000001010010001010001001001010001001100000101010000101100100...

…and the one that *would* say "thecolouriskeyfile" is:
Quote
100110011100100000100111001011011101010010001010001001001010001001100000101010000101100100

Differences in bold. Maybe they got off somewhere in transcribing the pattern.

theflamesiskeyfile

LOL, the key file is not in those fucking trolling flames
And the creators could withdraw their btc any moment and no one could track them if they did that
In the end It's crypto currency and no one could track them
sr. member
Activity: 548
Merit: 265
My old account was "Ghoom" (hacked) u=199247
It was my belief that the message properly decoded would read "thecolouriskeyfile", which would indicate the inner and outer colour tracks would be decrypted by following the same steps as with the height track. The British spelling of "colour" seemed reasonable because the Rob Myers guy is a filthy Canadian, and CoinArtist seemed to have EU heritage, although I couldn't find anything definitive.

Interesting -- and that would make sense too. The binary pattern we *have* is:

Quote
100110011100100001010110011010000001010010001010001001001010001001100000101010000101100100...

…and the one that *would* say "thecolouriskeyfile" is:
Quote
100110011100100000100111001011011101010010001010001001001010001001100000101010000101100100

Differences in bold. Maybe they got off somewhere in transcribing the pattern.

theflamesiskeyfile
newbie
Activity: 41
Merit: 0
The symmetries in the ordering seems fairly consistent. Plus the chance you'd find that sequence of those words (and a missing word) is fairly low.


This would explain the high frequency of repeating 6-gram's being consistent with a vigenere cipher (xor). Because you have multiple repeating characters in the message.
newbie
Activity: 29
Merit: 0
I've decoded the dusty inputs to the address. It says "BERCAICAREA" = french "bercail ce area" = fold THIS area (edit: see my correction below).
So, happy folding.

Only few lines of code needed.

Code:
#!/usr/bin/env python2
def toBaconCipher(text):
    ret = ""
    for character in text:
        ret += 'B' if int(character, 10) & 1 else 'A'
    return ret

baconCiphered = toBaconCipher(''.join(['00007799', '00005429', '00000001','00000001', '0000001', '0000001', '0000609', '00000001']))

print "bacon ciphered:", baconCiphered

(decode bacon cipher online)

EDIT: I have just been corrected, that "bercail" does not mean "to fold":

Code:

    (dated) fold (enclosure for animals)
    (figuratively, informal) house, home

        Tous les invités sont rentrés au bercail.
            All the guests have gone home.

hero member
Activity: 694
Merit: 500
I think I have figured out what the chess pieces are about. Was that figured out years ago, I didn't see it mentioned here yet..?

No, no one has said anything provable about the chess pieces, just theories. Care to say what you think they mean?

They're probably Queen Elizabeth I and Robert Devereux, Master of the Horse whom Shakespeare wrote the poem about (in one interpretation).

Interesting. Which poem is that?

Read the (interpretations) in this page:
https://en.m.wikipedia.org/wiki/Robert_Chester_(poet)
newbie
Activity: 7
Merit: 0
It was my belief that the message properly decoded would read "thecolouriskeyfile", which would indicate the inner and outer colour tracks would be decrypted by following the same steps as with the height track. The British spelling of "colour" seemed reasonable because the Rob Myers guy is a filthy Canadian, and CoinArtist seemed to have EU heritage, although I couldn't find anything definitive.

Interesting -- and that would make sense too. The binary pattern we *have* is:

Quote
100110011100100001010110011010000001010010001010001001001010001001100000101010000101100100...

…and the one that *would* say "thecolouriskeyfile" is:
Quote
100110011100100000100111001011011101010010001010001001001010001001100000101010000101100100

Differences in bold. Maybe they got off somewhere in transcribing the pattern.
newbie
Activity: 13
Merit: 0
I'm having trouble reproducing the length XOR decode. My understanding from crax0r's breakdown is: you concat the length bits in this order:
....

a python (2.7) script for you (not the prettiest but it works):
Code:
#!/usr/bin/python

def splitString(s, size):
    return [s[i:i+size] for i  in range(0, len(s), size)]

bac = "ABCDEFGHIJKLMNOPQRSTUVWXYZ_______________________________________________________";
#      12345678901234567890123456

inner_short_long = ('0110110110100010110110110011','110111110110110111110010','100011100010110111110111110111110','0111001101101')
outer_short_long = ('001101100111001101','001111000101','0011111011010001','01101101')

(it_l2r, ir_t2b, ib_r2l, il_b2t) = inner_short_long
(ot_l2r, or_t2b, ob_r2l, ol_b2t) = outer_short_long
ib_l2r = ib_r2l[::-1]
il_t2b = il_b2t[::-1]
it_r2l = it_l2r[::-1]
ot_r2l = ot_l2r[::-1]
ob_l2r = ob_r2l[::-1]

rbn_l2r = '011010'

encrypted_track = "".join([ib_l2r, il_t2b, ir_t2b, it_r2l, ot_r2l, ob_l2r]);

print 'encrypted_track = ', encrypted_track
xor = (rbn_l2r * 22) [:-1]
print 'xor             =  ', xor

decrypted_track = ("{0:b}").format(int(encrypted_track, 2) ^ int(xor, 2))
print 'decrypted_track =  ', decrypted_track
indexed_track = (decrypted_track*5)[::5]
print 'indexed_track   =  ', indexed_track
splited_track = splitString(indexed_track,5)
print 'splited_trak    = ' , splited_track

print 'decoded bacon   = ' , [ bac[int(x,2)] for x in splited_track]

output:
Code:
encrypted_track =  011111011111011111011010001110001101101100111011011111011011011111001011001101101101000101101101101011001110011011001000101101111100
xor             =   01101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101001101
decrypted_track =   10010010010010010010111000011000000100001110110010010010110010010000110000000100000001000100000100110000011010110000101100000110001
indexed_track   =   10011001110010000101011001101000000101001000101000100100101000100110000010101000010110010010001000000000001001000101100000000011101
splited_trak    =  ['10011', '00111', '00100', '00101', '01100', '11010', '00000', '10100', '10001', '01000', '10010', '01010', '00100', '11000', '00101', '01000', '01011', '00100', '10001', '00000', '00000', '01001', '00010', '11000', '00000', '01110', '1']
decoded bacon   =  ['T', 'H', 'E', 'F', 'M', '_', 'A', 'U', 'R', 'I', 'S', 'K', 'E', 'Y', 'F', 'I', 'L', 'E', 'R', 'A', 'A', 'J', 'C', 'Y', 'A', 'O', 'B']


@RealOnTheMF - I'm impressed!

Pages:
Jump to: