Pinned [ARG] The Pizza Code Mystery

    Logging in with you Steam ID has now been restored ♥

    • drgibbles wrote:

      I noticed that its nginx which can be used as a reversed proxy,,, anyone know how something like that might operate?
      It's accessible via terminal.bmrf.us/ or via bmrf.us/terminal/

      Wikipedia says:
      ...a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as if they originated from the Web server itself. Unlike a forward proxy, which is an intermediary for its associated clients to contact any server, a reverse proxy is an intermediary for its associated servers to be contacted by any client. Quite often, popular web servers use reverse-proxying functionality, shielding application frameworks of weaker HTTP capabilities.
    • CPU wrote:

      Jacky wrote:

      Gunsrequiem wrote:

      Now, I'm not convinced that the terminal.bmrf.us page isn't important somehow. We have all of these messages coming from a terminal, not to mention it was even the password for one of the IRC solutions. Now, the Terminal page on the bmrf.us website states that it is a Remote Terminal Module, and is owned by Black Mesa--isn't it quite possible that Horn was using this very terminal to send messages.
      Soo, after some who.is lookup, I found that bmrf.us has 2 links (Internal: 2, Outbound: 0). Now, does that mean there are 2 subpages like terminal.bmrf or I'm I completely off the trail here?
      Pentest Tools indicates there are these three directories
      DirectoriesHTTP CodeHTTP Reason
      /img/403Forbidden
      /terminal/200OK
      /js/403Forbidden


      Yes, even though those are forbidden, I managed to stumble across the images that were hidden within them about a year and a half ago: Images

      We are missing something big. Why hide these?
      I would rather know a little about all things than a lot about a few things.

      The Pizza Code Mystery Blog
      (Not updated recently due to current stalemate in ARG,
      but will return once something happens with it.)

      The post was edited 2 times, last by Gunsrequiem ().

    • Hmmm, I have a couple of thoughts on this. This would seem to imply that Black Mesa Source could be canon in some form or another. Linking it to HL2, further doing the mambo on the timeline that we know. We have been told before that it was not canon, but on the other side of the coin with the potential for time travel this way and the other way, over and over, who knows what direction the CC could take us.
    • drgibbles wrote:

      Hmmm, I have a couple of thoughts on this. This would seem to imply that Black Mesa Source could be canon in some form or another. Linking it to HL2, further doing the mambo on the timeline that we know. We have been told before that it was not canon, but on the other side of the coin with the potential for time travel this way and the other way, over and over, who knows what direction the CC could take us.
      There is no such thing as canon.
      As for the issue of Half Life canon, Canon does not exist because there is no such thing.

      Mark Laidlaw wrote:


      The canon of the Half-Life and Portal series has never been officially defined by Valve, and never will be.
      Series writer Marc Laidlaw stated that the issue of canon is "something the fans came up with" and that they do not have an official stance on it. He remarked that they "do not get involved in issues of canonicity" and that "canon itself is non-canon", letting the games stand on their own.

      half-life.wikia.com/wiki/Half-Life_Wiki:Canon
      combineoverwiki.net/wiki/Canon
    • RedEye9 wrote:

      There is no such thing as canon.As for the issue of Half Life canon, Canon does not exist because there is no such thing.
      So, technically, Transmissions: Element 120 could also be canon?

      Actually, Mark Laidlaw most likely said that in order to not let the Gearbox expansions - Blue Shift and Opposing Force - be suddenly downgraded due to a fandom schism.

      But may I just point out this little tidbit that might expose Storm's views on the subject:


      A FANDOM user wrote:

      W### has been p########## well on the L#### O####### L######## Can####, other#### kn### as the T## Cann##. My t##### to the #####etic
      L#### O####### L######## Can#### might also be jokingly interpreted as LOL, "canon".

      ---------------------

      Just discovered one other thing.

      Wiki site wrote:

      0418_08151814's forum account was registered on September 12, 2012, two days before the 2012 mod release of Black Mesa. The forum avatar of the user featured what looked like a degraded image of the Biodome Facility logo, which can be seen on the wall in the Biodome Complex lobby. The original filename of the avatar, which was revealed when the avatar image was saved to disk using a web browser's "Save Image As" function, was "cryptos.jpg", which is interesting given the reference to the Kryptos sculpture in IRC clue 2. The original filename was lost when the forum was moved to new forum software.
      (Emphasis added to above quote)

      What if we're reading that wrong? What if, like we've been assuming with HALOS, that it's supposed to be CRYPTOS? As in, Crypt-OS, "Crypt" Operating System? Another parallel or pointer to Hal-OS?
    • I think I may have finally made some headway with this, and I'm now thinking that we may be dealing with homophonic encryption. Now, I thought this might be the case before, but I never fully pursued it because, although the reasoning was sound, the puzzle I referred to didn't necessarily have to do with our puzzle (although the similarities were uncanny). However, now I think I may have solid reasons to believe this is still the case. Here is why I think this:

      I visited the wiki page for the Kryptos statue, as I was going through some of the IRC clues and looking for loose ends. At the bottom of that page, as a "See also" is the Copiale cipher. As a brief summary, this cipher was recently cracked in 2011, and the reason it was so damn hard is because it used homophonic encryption--or, as the wiki puts it: " . . . each ciphertext character stands for a particular plaintext character, but several ciphertext characters may encode the same plaintext character." This in and of itself isn't important--what is important is how that cipher was eventually cracked. The only plaintext in that cipher was "Copiales 3" at the end of it. Furthermore: "Seven ciphertext characters encode the single letter "e". In addition, some ciphertext characters stand for several characters or even a word. One ciphertext character ("†") encodes "sch", and another encodes the secret society's name."

      It's that last part that stuck out to me, as well as the "Copiales 3." In our cipher, there is also a "+" symbol, and it is used only twice--once at the beginning, and once at the end. How is that possible, unless it actually is hand-encrypted with substitution? To show you what I mean, here is the plaintext converted from the hex:

      ³+�:5ºÝfW|$ÁOÉCFÑ1§ÅK¸/þà"aWw?$y#Ü!ö,Ô.‘ògµE«Êí¯aQ
      Nê‡Í3ÇÇ?q10œÄ(´$=TðDùÏb–Ù¿÷9~C˜æ2Ú
      ?äx³¥O]Üiuú÷I„žbYZŸc•‘=à>:¬?8ŒEû…þ‘5AÖÀƒ˜òȃ2¨/ß�(büÜOçäj?éQÅÈ´dã:¹,–†.‹À™¸8�Úy¶?ä¢Y›mHǹSŒîc‘Dôaº’äþu$,Ø?QÖ•Q˜‡j|ª½{@I"A0©f̳Á9F:?~š7ª†?²xü—1ÀœŒy~y“
      @eF²Lšb›&Â?Î*KäXš7_ësÄ«"\„Œøž)²q3—6G?J‰(í֏TiŒ^[PgFövZo%Þ¤Ú@þ¶e?E$i6•ˆ=Ë!æûþû¸Z)‘”€6¥+]

      Notice the green--see that? Our 3 is there (maybe signifying Copiales 3?) but the + sign is at the end and the beginning, with only one other symbol on either side. Is that really possible with actual encryption?

      I'm quite convinced at this point that we are dealing with this type of cipher, and honestly the only way around it is to simply plug things in and hope for the best, or maybe look to see if there are symbols hidden throughout the messages Storm gave us that can help us start to decrypt it. Maybe this is what "time reveals all" means, too--that we will simply have to spend some time doing this. I also recall him saying in his message to me the following: "the n gram results indicate a weak encryption, but one that results in highly entropic data."

      So, yes, we are getting a lot of randomness, but the actual encryption is a simple substitution, therefore not that complicated and quite easy to break once we get the ball rolling.

      On a final note, the Copiale cipher does fit our "Latin" theme as we've discussed many times before: "The Copiale cipher includes abstract symbols, as well as letters from Greek and most of the Roman alphabet."

      You guys that are a lot smarter than me, any of you think we could create a simple program that would help us with this? I can start going at it by hand, but it could take some time. I'm only hoping that Storm did us the favor of making each symbol a direct substitution and not like the Copiale cipher wherein one symbol can be multiple letters--like † = "sch."
      I would rather know a little about all things than a lot about a few things.

      The Pizza Code Mystery Blog
      (Not updated recently due to current stalemate in ARG,
      but will return once something happens with it.)

      The post was edited 2 times, last by Gunsrequiem ().

    • New

      The null terminator happens so frequently inside that HEX code...

      B32B003A 35BADD66 577C24C1 4FC91906 4346D131 A7C54BB8 2FFE03E0 22615777247923DC 21F62CD4 182E91C3 B267B545 ABCAEDAF 0261510D 4EEA1E87 CD33C7C77131309C C4280EB4 243D1154 F044F9CF 6296D9BF F7397E43 90987FE6 3203DA0DE40278B3 A54F5DDC 6975FA04 F749849E 1A62595A 9F630B07 95913DE0 153E3AAC388C45FB 9D850CFE 913541D6 C08398F2 C88332A8 2FDF0028 1D62FCDC 4FE7E46AE90C51C5 C806B411 64E33AB9 2C96862E 068B0C16 C09990B8 381A00DA 7915B67FE4A20F59 9B0F1B6D 481913C7 B9538CEE 639144F4 1561BA92 E4FE751D 1E242CD88F51D695 51988713 6A7C15AA BD7B4004 49220141 30A91F17 0F66CCB3 C139463A7E909A37 AA863FB2 7805FC97 31C09C8C 79067E79 930A4065 46B24C9A 629B26C2CE2A4BE4 8F589A37 5FEB731F C4AB225C 11848CF8 9E291FB2 7133970C 063618474A892801 EDD68F54 698C5E5B 506746F6 765A6F7F 1225DEA4 DA1140FE B60F650745241C69 3695883D CB21E6FB FEFBB85A 29919480 36A52B5D

      This would interrupt a lot of programs, since null-termination usually signals the end of a string.

      Maybe that's where the HEX code block could be broken up?

      Source Code

      1. B32B NULL
      2. 3A35BADD 66577C24 C14FC919 064346D1 31A7C54B B82FFE03 E0226157 77247923 DC21F62C D4182E91 C3B267B5 45ABCAED AF026151 0D4EEA1E 87CD33C7 C7713130 9CC4280E B4243D11 54F044F9 CF6296D9 BFF7397E 4390987F E63203DA 0DE40278 B3A54F5D DC6975FA 04F74984 9E1A6259 5A9F630B 0795913D E0153E3A AC388C45 FB9D850C FE913541 D6C08398 F2C88332 A82FDF NULL
      3. 281D62FC DC4FE7E4 6AE90C51 C5C806B4 1164E33A B92C9686 2E068B0C 16C09990 B8381A NULL
      4. DA7915B6 7FE4A20F 599B0F1B 6D481913 C7B9538C EE639144 F41561BA 92E4FE75 1D1E242C D88F51D6 95519887 136A7C15 AABD7B40 04492201 4130A91F 170F66CC B3C13946 3A7E909A 37AA863F B27805FC 9731C09C 8C79067E 79930A40 6546B24C 9A629B26 C2CE2A4B E48F589A 375FEB73 1FC4AB22 5C11848C F89E291F B2713397 0C063618 474A8928 01EDD68F 54698C5E 5B506746 F6765A6F 7F1225DE A4DA1140 FEB60F65 0745241C 69369588 3DCB21E6 FBFEFBB8 5A299194 8036A5 2B5D
      If the homophonic cipher is the right way to go, then be advised... that there are 255 different hexadecimal numbers. Matching them all up to - for example - the 26 capital letters of the English alphabet would be a huge undertaking. Not to mention what if punctuation marks exist (which the original Copiale did not have within, only for some logographs and necessary word breakages), numbers, foreign numbers, scrambled hex values via bad connections (as are shown in several clues given to us), etc.




      In short, we need a key. Some way to actually translate the HEX Code characters into the original text.

      . . .
      What if the key was a template for a chart to do just that? To keep a key for the translation? I bet that if we just all sat down and ate some grilled pizza, we could figure out a solution...




      ---------------------------

      Reread some of the Wiki. Storm said at one point, that we already had what we needed to solve this, but that it'd still be challenging. And yet here we are, two years + later, thinking up newer ideas about what it could be. Yikes.
      I would not feel ashamed in bowing to the master and saying "welp, this was a toughie. Maybe knock down the difficulty a little bit and help us through this one?" just so we can see what else he's conjured up for us on this little field trip through Black Mesa.

      The post was edited 1 time, last by Miles07: Added a realization ().