Pages:
Author

Topic: The Legend of Satoshi Nakamato, FINAL STEP PUBLISHED.... 4.87 BTC GRAND PRIZE! - page 33. (Read 108519 times)

newbie
Activity: 22
Merit: 0
You're missing the modulus operation. It's kind of hidden in a single line of code.

Matlab version:
Code:
message_indices = mod((0:(length(decrypted_track)-1)) * 5, length(decrypted_track)) + 1;

Equivalent in C/C++/Java would be:
Code:
for (int i = 0; i < n; i++)
    data[i] = orig_data[i * 5 % n];
newbie
Activity: 14
Merit: 0
I'm having trouble reproducing the length XOR decode. My understanding from crax0r's breakdown is: you concat the length bits in this order:

Inner Bottom, L2R
Inner Left, T2B
Inner Right, T2B
Inner Top, R2L
Outer Top, R2L
OuterBottom, L2R

Based on this, Inner Bottom L2R is

Code:
011111011111011111011010001110001
XOR'ing with 011010 (starting with second bit) gives us:

Code:
0 111110 111110 111110 110100 011100 01
- 011010 011010 011010 011010 011010 011010

- 100100 100100 100100 101110 000110

Then we run that through the v2 Bacon cipher, (omitting a character?)

Code:
- 100100 100100 100100 101110 000110
- 10010x 10010x 10010x 10111x 00011x
- S, S, S, -, D

Or, if we don't omit any characters and simply take them 5 bits at a time:

Code:
- 100100 100100 100100 101110 000110
- 10010 01001 00100 10010 11100 00110
- S, J, E, S, nil, G

And/or shifting 1 so 00000 = nil but 00001 = A. Regardless, I can't reproduce any of the patterns here.
newbie
Activity: 22
Merit: 0
This thread seems pretty active again, so I figured I'd post some recent findings in hopes we can all solve this thing. ...

That's really interesting. I coded up my own version of this, and it's definitely there.

XOR'ing the key against the heights makes a lot of sense. Was there any rationale to the order you picked the flames? Or what led you to drop one of the flames to make it work (other than to make the math work out)?

The order was found through a search. As I mentioned before, I'm skeptical this is a real message. If anything I believe we may have stumbled upon a collision of the intended cipher, but not the true decryption method.

Initially the order seemed strange but, we rationalized it with the symbolism from the knight and bishop. Knights make jump moves in chess, hence the every 5th bit approach, and bishops move diagonally, hence the diagonal connection of the segments.

The glyphs we believed symbolized the modulus operation required to "unwind" the data. Figuratively, you are "spiraling" around the border of the painting. While this is all very well and good, we've been unable to make any progress on this theory. It was my belief that the message properly decoded would read "thecolouriskeyfile", which would indicate the inner and outer colour tracks would be decrypted by following the same steps as with the height track. The British spelling of "colour" seemed reasonable because the Rob Myers guy is a filthy Canadian, and CoinArtist seemed to have EU heritage, although I couldn't find anything definitive.


legendary
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
I'm curious if you know which flames in what order produced that? Should have been 90 flames right.

Guess i'm gonna start trying to xor flame lengths with the ribbon and try to reproduce that.

It's given by this line in the code:
Code:
encrypted_track = [ib_l2r, il_t2b, ir_t2b, it_r2l, ot_r2l, ob_l2r];

i = inner
o = outer
l = left
r = right
b = bottom
t = top
r = right

So, ib_l2r means inner bottom left to right.

When you visualize the order and direction of reading the flames:



The order doesn't match the spiral signs in the corners, which we all assumed is the indication of the direction. Notice that 2 out of 8 flame lines (outer left and right) are still unused. I wonder if there are more messages in the outer/inner color bit-streams.
newbie
Activity: 7
Merit: 0
This thread seems pretty active again, so I figured I'd post some recent findings in hopes we can all solve this thing. ...

That's really interesting. I coded up my own version of this, and it's definitely there.

XOR'ing the key against the heights makes a lot of sense. Was there any rationale to the order you picked the flames? Or what led you to drop one of the flames to make it work (other than to make the math work out)?
legendary
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
I think I have figured out what the chess pieces are about. Was that figured out years ago, I didn't see it mentioned here yet..?

No, no one has said anything provable about the chess pieces, just theories. Care to say what you think they mean?

They're probably Queen Elizabeth I and Robert Devereux, Master of the Horse whom Shakespeare wrote the poem about (in one interpretation).

Interesting. Which poem is that?
newbie
Activity: 3
Merit: 0
I think I have figured out what the chess pieces are about. Was that figured out years ago, I didn't see it mentioned here yet..?

No, no one has said anything provable about the chess pieces, just theories. Care to say what you think they mean?

They're probably Queen Elizabeth I and Robert Devereux, Master of the Horse whom Shakespeare wrote the poem about (in one interpretation).
newbie
Activity: 22
Merit: 0
This thread seems pretty active again, so I figured I'd post some recent findings in hopes we can all solve this thing.

I found a bacon (v2) message within the height bit-stream that when decoded appears to be "thefm auriskeyfile".

This is a  real breakthrough, thanks for sharing this.

Edit: Where did you find the code for bacon? Wrote it yourself?

Yes, I just wrote it myself. It's basically binary mapped to a-z. The version in the code above is Bacon version 2 which does not skip i and v.
newbie
Activity: 36
Merit: 0
Really wish I had the knowledge to figure all of this out. Looks so cool Smiley
newbie
Activity: 22
Merit: 0
I'm curious if you know which flames in what order produced that? Should have been 90 flames right.

Guess i'm gonna start trying to xor flame lengths with the ribbon and try to reproduce that.

It's given by this line in the code:
Code:
encrypted_track = [ib_l2r, il_t2b, ir_t2b, it_r2l, ot_r2l, ob_l2r];

i = inner
o = outer
l = left
r = right
b = bottom
t = top
r = right

So, ib_l2r means inner bottom left to right.

jr. member
Activity: 33
Merit: 2
Regarding what RealOnTheMF said, the message can be also "THEFMSAURISKEYFILE"

Below are the flame sides aligned in the order that results in the message above.

a = inner top CW
b = inner right CW
c = inner bottom CW
d = inner left CW
e = outer left CW
f = outer bottom CW
g = outer right CW
h = outer top CW

ABCDEFGH same, but read order is CCW (counter clock wise)

In the decoder-stream, only 6 out of 8 sides are used in the following fashion: CDbAHF

Then, start reading every 5th bit from the stream until you get the the end, then start over from the beginning, +4 bits... then from the beginning +3 bits, then +2 and +1

Everything has to be xored by 011010. You can either ignore first bit of C, or last bit of F, total length of this stream must be 131 bits. Make sure xor key aligns like below.


Code:
#     C CCCCCC CCCCCC CCCCCC CCCCCC CCCCCC CCDDDD DDDDDD DDDbbb bbbbbb bbbbbb bbbbbb bbbAAA AAAAAA AAAAAA AAAAAA AAAAAA AHHHHH HHHHHH HHHHHH HFFFFF FFFFFF F FFFF
#011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010 011010
#       T    T     T     T     T     H     H    H     H     H     E     E     E    E     E
#                                                                                              F     F     F     F    F     M     M     M     M     M    S        
#     S     S     S     S     A     A    A     A     A     U     U     U    U     U     R     R     R     R    R  
#                                                                                                                    I     I     I     I     I    S     S     S  
#
#          S     S
#                      K     K    K     K     K     E     E     E    E     E     Y     Y     Y     Y    Y  
#                                                                                                             F     F     F     F     F    I     I     I     I
#         I     L     L    L     L     L     E     E     E    E     E

jr. member
Activity: 51
Merit: 1
This thread seems pretty active again, so I figured I'd post some recent findings in hopes we can all solve this thing.

I found a bacon (v2) message within the height bit-stream that when decoded appears to be "thefm auriskeyfile". The message is clearly incomplete/incorrectly decoded. We're not even convinced the message is an intended message or just a massive coincidence. A script to decode this message as-is, is below.

We have a solving team going right now that are all working together to solve this. If anyone's interested in joining, send me a PM. We're trying to round out our skill-base.

If this info helps you solve it, please be kind and tip our team: BTC address: 1Giz1ZV8rgk4UfMoscsjQiTp4cXmdSoxN2

Matlab/Octave code:
Code:
%% 1FLAMEN6 - decode "thefm_auriskeyfile" message
% Written by OnTheMF

tall            = 1; % Tall flame bit-value
tiny            = 0; % Short flame bit-value
ribbon_short    = 0; % Short ribbon bit-value
ribbon_long     = 1; % Long ribbon bit-value

%% Dataset

% Key with ribbons
rbn_l2r = [ ribbon_short, ribbon_long, ribbon_long,...
            ribbon_short, ribbon_long, ribbon_short ];

% Outer top segment
ot_l2r = [ tiny, tiny, tall, tall, tiny, tall, tall, tiny, tiny, tall,...
           tall, tall, tiny, tiny, tall, tall, tiny, tall ];
% Outer right segment
or_t2b = [ tiny, tiny, tall, tall, tall, tall, tiny, tiny, tiny, tall,...
           tiny, tall ];
% Outer bottom segment
ob_r2l = [ tiny, tiny, tall, tall, tall, tall, tall, tiny, tall, tall,...
           tiny, tall, tiny, tiny, tiny, tall ];
% Outer left segment
ol_b2t = [ tiny, tall, tall, tiny, tall, tall, tiny, tall ];
% Inner top segment
it_l2r = [ tiny, tall, tall, tiny, tall, tall, tiny, tall, tall, tiny,...
           tall, tiny, tiny, tiny, tall, tiny, tall, tall, tiny, tall,...
           tall, tiny, tall, tall, tiny, tiny, tall, tall];
% Inner right segment
ir_t2b = [ tall, tall, tiny, tall, tall, tall, tall, tall, tiny, tall,...
           tall, tiny, tall, tall, tiny, tall, tall, tall, tall, tall,...
           tiny, tiny, tall, tiny ];
% Inner bottom segment
ib_r2l = [ tall, tiny, tiny, tiny, tall, tall, tall, tiny, tiny, tiny,...
           tall, tiny, tall, tall, tiny, tall, tall, tall, tall, tall,...
           tiny, tall, tall, tall, tall, tall, tiny, tall, tall, tall,...
           tall, tall, tiny ];
% Inner left segment       
il_b2t = [ tiny, tall, tall, tall, tiny, tiny, tall, tall, tiny, tall,...
           tall, tiny, tall ];

% Reverse our segments for easy manipulation
ot_r2l = fliplr(ot_l2r);
or_b2t = fliplr(or_t2b);
ob_l2r = fliplr(ob_r2l);
ol_t2b = fliplr(ol_b2t);
it_r2l = fliplr(it_l2r);
ir_b2t = fliplr(ir_t2b);
ib_l2r = fliplr(ib_r2l);
il_t2b = fliplr(il_b2t);

%% Decode keyfile message
encrypted_track = [ib_l2r, il_t2b, ir_t2b, it_r2l, ot_r2l, ob_l2r];

% Skip first bit
decrypted_track = vectorxor(encrypted_track(2:end), rbn_l2r);

% Generate indexes for every fifth bit (circular buffer)
message_indices = mod((0:(length(decrypted_track)-1)) * 5, length(decrypted_track)) + 1;

% Get the message bits in the correct order
message_data = decrypted_track(message_indices);

% Decode and display message
decodebacon(message_data)

%% Helper functions
% xor a vector or matrix with a given key vector
function [ret] = vectorxor(x,key)
    % Pre-allocate return variable
    ret = zeros(size(x,1),size(x,2));

    % Generate 1:1 vector for xor function
    copies = ceil(size(x, 2) / length(key));
    xkey = repmat(key, 1, copies);
    xkey = xkey(1:size(x, 2));

    % Iterate through each row of input data
    for i = 1:size(x,1)
        ret(i,:) = xor(x(i,:), xkey);
    end
end

% Decode a Bacon v2 string (base 26) - invalid characters mapped to space
function [ret] = decodebacon(x)
    letters = 'abcdefghijklmnopqrstuvwxyz ';
   
    % Only decode 5-bit sequences
    vals = x(1:end - mod(length(x), 5));
   
    % Convert to base 10 values
    dec = sum(reshape(vals, 5, length(vals) / 5) .* (2 .^ (4:-1:0))')';
   
    % Return corresponding string
    ret = letters(min(dec'+1, length(letters)));
end




I'm curious if you know which flames in what order produced that? Should have been 90 flames right.

Guess i'm gonna start trying to xor flame lengths with the ribbon and try to reproduce that.
legendary
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
I think I have figured out what the chess pieces are about. Was that figured out years ago, I didn't see it mentioned here yet..?

No, no one has said anything provable about the chess pieces, just theories. Care to say what you think they mean?
legendary
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
This thread seems pretty active again, so I figured I'd post some recent findings in hopes we can all solve this thing.

I found a bacon (v2) message within the height bit-stream that when decoded appears to be "thefm auriskeyfile".

This is a  real breakthrough, thanks for sharing this.

Edit: Where did you find the code for bacon? Wrote it yourself?
newbie
Activity: 1
Merit: 0
I think I have figured out what the chess pieces are about. Was that figured out years ago, I didn't see it mentioned here yet..?
newbie
Activity: 22
Merit: 0
This thread seems pretty active again, so I figured I'd post some recent findings in hopes we can all solve this thing.

I found a bacon (v2) message within the height bit-stream that when decoded appears to be "thefm auriskeyfile". The message is clearly incomplete/incorrectly decoded. We're not even convinced the message is an intended message or just a massive coincidence. A script to decode this message as-is, is below.

We have a solving team going right now that are all working together to solve this. If anyone's interested in joining, send me a PM. We're trying to round out our skill-base.

If this info helps you solve it, please be kind and tip our team: BTC address: 1Giz1ZV8rgk4UfMoscsjQiTp4cXmdSoxN2

Matlab/Octave code:
Code:
%% 1FLAMEN6 - decode "thefm_auriskeyfile" message
% Written by OnTheMF

tall            = 1; % Tall flame bit-value
tiny            = 0; % Short flame bit-value
ribbon_short    = 0; % Short ribbon bit-value
ribbon_long     = 1; % Long ribbon bit-value

%% Dataset

% Key with ribbons
rbn_l2r = [ ribbon_short, ribbon_long, ribbon_long,...
            ribbon_short, ribbon_long, ribbon_short ];

% Outer top segment
ot_l2r = [ tiny, tiny, tall, tall, tiny, tall, tall, tiny, tiny, tall,...
           tall, tall, tiny, tiny, tall, tall, tiny, tall ];
% Outer right segment
or_t2b = [ tiny, tiny, tall, tall, tall, tall, tiny, tiny, tiny, tall,...
           tiny, tall ];
% Outer bottom segment
ob_r2l = [ tiny, tiny, tall, tall, tall, tall, tall, tiny, tall, tall,...
           tiny, tall, tiny, tiny, tiny, tall ];
% Outer left segment
ol_b2t = [ tiny, tall, tall, tiny, tall, tall, tiny, tall ];
% Inner top segment
it_l2r = [ tiny, tall, tall, tiny, tall, tall, tiny, tall, tall, tiny,...
           tall, tiny, tiny, tiny, tall, tiny, tall, tall, tiny, tall,...
           tall, tiny, tall, tall, tiny, tiny, tall, tall];
% Inner right segment
ir_t2b = [ tall, tall, tiny, tall, tall, tall, tall, tall, tiny, tall,...
           tall, tiny, tall, tall, tiny, tall, tall, tall, tall, tall,...
           tiny, tiny, tall, tiny ];
% Inner bottom segment
ib_r2l = [ tall, tiny, tiny, tiny, tall, tall, tall, tiny, tiny, tiny,...
           tall, tiny, tall, tall, tiny, tall, tall, tall, tall, tall,...
           tiny, tall, tall, tall, tall, tall, tiny, tall, tall, tall,...
           tall, tall, tiny ];
% Inner left segment       
il_b2t = [ tiny, tall, tall, tall, tiny, tiny, tall, tall, tiny, tall,...
           tall, tiny, tall ];

% Reverse our segments for easy manipulation
ot_r2l = fliplr(ot_l2r);
or_b2t = fliplr(or_t2b);
ob_l2r = fliplr(ob_r2l);
ol_t2b = fliplr(ol_b2t);
it_r2l = fliplr(it_l2r);
ir_b2t = fliplr(ir_t2b);
ib_l2r = fliplr(ib_r2l);
il_t2b = fliplr(il_b2t);

%% Decode keyfile message
encrypted_track = [ib_l2r, il_t2b, ir_t2b, it_r2l, ot_r2l, ob_l2r];

% Skip first bit
decrypted_track = vectorxor(encrypted_track(2:end), rbn_l2r);

% Generate indexes for every fifth bit (circular buffer)
message_indices = mod((0:(length(decrypted_track)-1)) * 5, length(decrypted_track)) + 1;

% Get the message bits in the correct order
message_data = decrypted_track(message_indices);

% Decode and display message
decodebacon(message_data)

%% Helper functions
% xor a vector or matrix with a given key vector
function [ret] = vectorxor(x,key)
    % Pre-allocate return variable
    ret = zeros(size(x,1),size(x,2));

    % Generate 1:1 vector for xor function
    copies = ceil(size(x, 2) / length(key));
    xkey = repmat(key, 1, copies);
    xkey = xkey(1:size(x, 2));

    % Iterate through each row of input data
    for i = 1:size(x,1)
        ret(i,:) = xor(x(i,:), xkey);
    end
end

% Decode a Bacon v2 string (base 26) - invalid characters mapped to space
function [ret] = decodebacon(x)
    letters = 'abcdefghijklmnopqrstuvwxyz ';
   
    % Only decode 5-bit sequences
    vals = x(1:end - mod(length(x), 5));
   
    % Convert to base 10 values
    dec = sum(reshape(vals, 5, length(vals) / 5) .* (2 .^ (4:-1:0))')';
   
    % Return corresponding string
    ret = letters(min(dec'+1, length(letters)));
end


hero member
Activity: 694
Merit: 500
If someone is interested in symbols:

https://imgur.com/gallery/F22X4

of course they are very subjective Wink


i think that many symbols and characters are embedded in the image that way, but as you said they are very subjective, the rabbit mentioned those eom ea and i agree with you that there is Y, A, 8, S, E but i disagree that there is 4 (i see i or V) or that big O and M (maybe W)
and even if we all see the same characters, the problem is in what order we should arrange them! there are infinite possibilities!

and yes i am interested in symbols or anything other than those fucking trolling flames that i fed up with them, i think that they made those flames to distract our attention from the first step.

newbie
Activity: 29
Merit: 0
i can't see K09 in the image,
DuckDack it?  Huh

Top left corner (if you shrink it even more it becomes more obvious)
Might also say k5, L5 or nothing at all.


https://duckduckgo.com/?q=k09 Smiley
hero member
Activity: 694
Merit: 500
https://imgur.com/ysbPyGB

k09 = Duckduck it: Aeronautical maps? As overlay?
35 or 38, 76, 15 or 95...(Huh) = positions on map (x°/y°)?

"bits in dust" = Some information in small transactions to 1FLAMEN6rq2BqMnkUmsJBqCGWdwgVKcegd (especial those only containing binary 0,1)



i can't see K09 in the image,
DuckDack it?  Huh
newbie
Activity: 29
Merit: 0
https://imgur.com/ysbPyGB

k09 = Duckduck it: Aeronautical maps? As overlay?
35 or 38, 76, 15 or 95...(Huh) = positions on map (x°/y°)?

"bits in dust" = Some information in small transactions to 1FLAMEN6rq2BqMnkUmsJBqCGWdwgVKcegd (especial those only containing binary 0,1)

Pages:
Jump to: