Pinned [ARG] The Pizza Code Mystery

    Logging in with you Steam ID has now been restored ♥

    • drgibbles wrote:

      I noticed that its nginx which can be used as a reversed proxy,,, anyone know how something like that might operate?
      It's accessible via terminal.bmrf.us/ or via bmrf.us/terminal/

      Wikipedia says:
      ...a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as if they originated from the Web server itself. Unlike a forward proxy, which is an intermediary for its associated clients to contact any server, a reverse proxy is an intermediary for its associated servers to be contacted by any client. Quite often, popular web servers use reverse-proxying functionality, shielding application frameworks of weaker HTTP capabilities.
    • CPU wrote:

      Jacky wrote:

      Gunsrequiem wrote:

      Now, I'm not convinced that the terminal.bmrf.us page isn't important somehow. We have all of these messages coming from a terminal, not to mention it was even the password for one of the IRC solutions. Now, the Terminal page on the bmrf.us website states that it is a Remote Terminal Module, and is owned by Black Mesa--isn't it quite possible that Horn was using this very terminal to send messages.
      Soo, after some who.is lookup, I found that bmrf.us has 2 links (Internal: 2, Outbound: 0). Now, does that mean there are 2 subpages like terminal.bmrf or I'm I completely off the trail here?
      Pentest Tools indicates there are these three directories
      DirectoriesHTTP CodeHTTP Reason
      /img/403Forbidden
      /terminal/200OK
      /js/403Forbidden


      Yes, even though those are forbidden, I managed to stumble across the images that were hidden within them about a year and a half ago: Images

      We are missing something big. Why hide these?
      I would rather know a little about all things than a lot about a few things.

      The Pizza Code Mystery Blog
      (Not updated recently due to current stalemate in ARG,
      but will return once something happens with it.)

      The post was edited 2 times, last by Gunsrequiem ().

    • Hmmm, I have a couple of thoughts on this. This would seem to imply that Black Mesa Source could be canon in some form or another. Linking it to HL2, further doing the mambo on the timeline that we know. We have been told before that it was not canon, but on the other side of the coin with the potential for time travel this way and the other way, over and over, who knows what direction the CC could take us.
    • drgibbles wrote:

      Hmmm, I have a couple of thoughts on this. This would seem to imply that Black Mesa Source could be canon in some form or another. Linking it to HL2, further doing the mambo on the timeline that we know. We have been told before that it was not canon, but on the other side of the coin with the potential for time travel this way and the other way, over and over, who knows what direction the CC could take us.
      There is no such thing as canon.
      As for the issue of Half Life canon, Canon does not exist because there is no such thing.

      Mark Laidlaw wrote:


      The canon of the Half-Life and Portal series has never been officially defined by Valve, and never will be.
      Series writer Marc Laidlaw stated that the issue of canon is "something the fans came up with" and that they do not have an official stance on it. He remarked that they "do not get involved in issues of canonicity" and that "canon itself is non-canon", letting the games stand on their own.

      half-life.wikia.com/wiki/Half-Life_Wiki:Canon
      combineoverwiki.net/wiki/Canon
    • RedEye9 wrote:

      There is no such thing as canon.As for the issue of Half Life canon, Canon does not exist because there is no such thing.
      So, technically, Transmissions: Element 120 could also be canon?

      Actually, Mark Laidlaw most likely said that in order to not let the Gearbox expansions - Blue Shift and Opposing Force - be suddenly downgraded due to a fandom schism.

      But may I just point out this little tidbit that might expose Storm's views on the subject:


      A FANDOM user wrote:

      W### has been p########## well on the L#### O####### L######## Can####, other#### kn### as the T## Cann##. My t##### to the #####etic
      L#### O####### L######## Can#### might also be jokingly interpreted as LOL, "canon".

      ---------------------

      Just discovered one other thing.

      Wiki site wrote:

      0418_08151814's forum account was registered on September 12, 2012, two days before the 2012 mod release of Black Mesa. The forum avatar of the user featured what looked like a degraded image of the Biodome Facility logo, which can be seen on the wall in the Biodome Complex lobby. The original filename of the avatar, which was revealed when the avatar image was saved to disk using a web browser's "Save Image As" function, was "cryptos.jpg", which is interesting given the reference to the Kryptos sculpture in IRC clue 2. The original filename was lost when the forum was moved to new forum software.
      (Emphasis added to above quote)

      What if we're reading that wrong? What if, like we've been assuming with HALOS, that it's supposed to be CRYPTOS? As in, Crypt-OS, "Crypt" Operating System? Another parallel or pointer to Hal-OS?
    • I think I may have finally made some headway with this, and I'm now thinking that we may be dealing with homophonic encryption. Now, I thought this might be the case before, but I never fully pursued it because, although the reasoning was sound, the puzzle I referred to didn't necessarily have to do with our puzzle (although the similarities were uncanny). However, now I think I may have solid reasons to believe this is still the case. Here is why I think this:

      I visited the wiki page for the Kryptos statue, as I was going through some of the IRC clues and looking for loose ends. At the bottom of that page, as a "See also" is the Copiale cipher. As a brief summary, this cipher was recently cracked in 2011, and the reason it was so damn hard is because it used homophonic encryption--or, as the wiki puts it: " . . . each ciphertext character stands for a particular plaintext character, but several ciphertext characters may encode the same plaintext character." This in and of itself isn't important--what is important is how that cipher was eventually cracked. The only plaintext in that cipher was "Copiales 3" at the end of it. Furthermore: "Seven ciphertext characters encode the single letter "e". In addition, some ciphertext characters stand for several characters or even a word. One ciphertext character ("†") encodes "sch", and another encodes the secret society's name."

      It's that last part that stuck out to me, as well as the "Copiales 3." In our cipher, there is also a "+" symbol, and it is used only twice--once at the beginning, and once at the end. How is that possible, unless it actually is hand-encrypted with substitution? To show you what I mean, here is the plaintext converted from the hex:

      ³+�:5ºÝfW|$ÁOÉCFÑ1§ÅK¸/þà"aWw?$y#Ü!ö,Ô.‘ògµE«Êí¯aQ
      Nê‡Í3ÇÇ?q10œÄ(´$=TðDùÏb–Ù¿÷9~C˜æ2Ú
      ?äx³¥O]Üiuú÷I„žbYZŸc•‘=à>:¬?8ŒEû…þ‘5AÖÀƒ˜òȃ2¨/ß�(büÜOçäj?éQÅÈ´dã:¹,–†.‹À™¸8�Úy¶?ä¢Y›mHǹSŒîc‘Dôaº’äþu$,Ø?QÖ•Q˜‡j|ª½{@I"A0©f̳Á9F:?~š7ª†?²xü—1ÀœŒy~y“
      @eF²Lšb›&Â?Î*KäXš7_ësÄ«"\„Œøž)²q3—6G?J‰(í֏TiŒ^[PgFövZo%Þ¤Ú@þ¶e?E$i6•ˆ=Ë!æûþû¸Z)‘”€6¥+]

      Notice the green--see that? Our 3 is there (maybe signifying Copiales 3?) but the + sign is at the end and the beginning, with only one other symbol on either side. Is that really possible with actual encryption?

      I'm quite convinced at this point that we are dealing with this type of cipher, and honestly the only way around it is to simply plug things in and hope for the best, or maybe look to see if there are symbols hidden throughout the messages Storm gave us that can help us start to decrypt it. Maybe this is what "time reveals all" means, too--that we will simply have to spend some time doing this. I also recall him saying in his message to me the following: "the n gram results indicate a weak encryption, but one that results in highly entropic data."

      So, yes, we are getting a lot of randomness, but the actual encryption is a simple substitution, therefore not that complicated and quite easy to break once we get the ball rolling.

      On a final note, the Copiale cipher does fit our "Latin" theme as we've discussed many times before: "The Copiale cipher includes abstract symbols, as well as letters from Greek and most of the Roman alphabet."

      You guys that are a lot smarter than me, any of you think we could create a simple program that would help us with this? I can start going at it by hand, but it could take some time. I'm only hoping that Storm did us the favor of making each symbol a direct substitution and not like the Copiale cipher wherein one symbol can be multiple letters--like † = "sch."
      I would rather know a little about all things than a lot about a few things.

      The Pizza Code Mystery Blog
      (Not updated recently due to current stalemate in ARG,
      but will return once something happens with it.)

      The post was edited 2 times, last by Gunsrequiem ().

    • The null terminator happens so frequently inside that HEX code...

      B32B003A 35BADD66 577C24C1 4FC91906 4346D131 A7C54BB8 2FFE03E0 22615777247923DC 21F62CD4 182E91C3 B267B545 ABCAEDAF 0261510D 4EEA1E87 CD33C7C77131309C C4280EB4 243D1154 F044F9CF 6296D9BF F7397E43 90987FE6 3203DA0DE40278B3 A54F5DDC 6975FA04 F749849E 1A62595A 9F630B07 95913DE0 153E3AAC388C45FB 9D850CFE 913541D6 C08398F2 C88332A8 2FDF0028 1D62FCDC 4FE7E46AE90C51C5 C806B411 64E33AB9 2C96862E 068B0C16 C09990B8 381A00DA 7915B67FE4A20F59 9B0F1B6D 481913C7 B9538CEE 639144F4 1561BA92 E4FE751D 1E242CD88F51D695 51988713 6A7C15AA BD7B4004 49220141 30A91F17 0F66CCB3 C139463A7E909A37 AA863FB2 7805FC97 31C09C8C 79067E79 930A4065 46B24C9A 629B26C2CE2A4BE4 8F589A37 5FEB731F C4AB225C 11848CF8 9E291FB2 7133970C 063618474A892801 EDD68F54 698C5E5B 506746F6 765A6F7F 1225DEA4 DA1140FE B60F650745241C69 3695883D CB21E6FB FEFBB85A 29919480 36A52B5D

      This would interrupt a lot of programs, since null-termination usually signals the end of a string.

      Maybe that's where the HEX code block could be broken up?

      Source Code

      1. B32B NULL
      2. 3A35BADD 66577C24 C14FC919 064346D1 31A7C54B B82FFE03 E0226157 77247923 DC21F62C D4182E91 C3B267B5 45ABCAED AF026151 0D4EEA1E 87CD33C7 C7713130 9CC4280E B4243D11 54F044F9 CF6296D9 BFF7397E 4390987F E63203DA 0DE40278 B3A54F5D DC6975FA 04F74984 9E1A6259 5A9F630B 0795913D E0153E3A AC388C45 FB9D850C FE913541 D6C08398 F2C88332 A82FDF NULL
      3. 281D62FC DC4FE7E4 6AE90C51 C5C806B4 1164E33A B92C9686 2E068B0C 16C09990 B8381A NULL
      4. DA7915B6 7FE4A20F 599B0F1B 6D481913 C7B9538C EE639144 F41561BA 92E4FE75 1D1E242C D88F51D6 95519887 136A7C15 AABD7B40 04492201 4130A91F 170F66CC B3C13946 3A7E909A 37AA863F B27805FC 9731C09C 8C79067E 79930A40 6546B24C 9A629B26 C2CE2A4B E48F589A 375FEB73 1FC4AB22 5C11848C F89E291F B2713397 0C063618 474A8928 01EDD68F 54698C5E 5B506746 F6765A6F 7F1225DE A4DA1140 FEB60F65 0745241C 69369588 3DCB21E6 FBFEFBB8 5A299194 8036A5 2B5D
      If the homophonic cipher is the right way to go, then be advised... that there are 255 different hexadecimal numbers. Matching them all up to - for example - the 26 capital letters of the English alphabet would be a huge undertaking. Not to mention what if punctuation marks exist (which the original Copiale did not have within, only for some logographs and necessary word breakages), numbers, foreign numbers, scrambled hex values via bad connections (as are shown in several clues given to us), etc.




      In short, we need a key. Some way to actually translate the HEX Code characters into the original text.

      . . .
      What if the key was a template for a chart to do just that? To keep a key for the translation? I bet that if we just all sat down and ate some grilled pizza, we could figure out a solution...




      ---------------------------

      Reread some of the Wiki. Storm said at one point, that we already had what we needed to solve this, but that it'd still be challenging. And yet here we are, two years + later, thinking up newer ideas about what it could be. Yikes.
      I would not feel ashamed in bowing to the master and saying "welp, this was a toughie. Maybe knock down the difficulty a little bit and help us through this one?" just so we can see what else he's conjured up for us on this little field trip through Black Mesa.

      The post was edited 1 time, last by Miles07: Added a realization ().

    • Has anyone tried using the binary version of the hex code to create a grilled pizza image the same way Storm did? I created a small diagram with 21 rows (21 into 1), and that turns out to be a LOT of triangles, and I started shading in the 1s and leaving the 0s blank, but my drawing sucks and I will need to pick up some graph paper to do it with any sense of consistency. I'm wondering if this will somehow spell something out or perhaps create a picture? Anyway, before I go ham on it, I want to ensure no one else has already done this--otherwise, I'll cramp my hand up for no reason. I'm sure I could do this with some of the programs I have on my desktop, but it's still currently defunct due to the move (still using my "crap"top).

      Anybody able to verify this? If no one's tried it, I'm happy to be the guinea pig--I've got a long weekend due to the holiday, anyway. I'm sure Storm created his in 2 minutes, but I have no shame.
      I would rather know a little about all things than a lot about a few things.

      The Pizza Code Mystery Blog
      (Not updated recently due to current stalemate in ARG,
      but will return once something happens with it.)
    • Gunsrequiem wrote:

      I created a small diagram with 21 rows (21 into 1), and that turns out to be a LOT of triangles
      That's 212 = 441 triangles, to be exact. The number of triangles in the bottom row is 2*21 - 1 = 41.

      In order to use all the bits of the HALOS code, you'll need to draw 3008 / 441 ≈ 6.82 sets of triangles (or grilled pizzas).

      The 3008 bits of the HALOS code won't fill a complete grilled pizza, or a whole multiple of grilled pizzas, except in the cases where the number of rows are 1, 2, 4 or 8 (1, 4, 16, or 64 data triangles/bits, respectively). If you include the single red padding triangle (the forbidden fruit?) at the top, like in the original grilled pizza, the only case where you'll be able to fill a complete set is when the number of rows are 3. In this case each triangle set will contain 8 data triangles/bits, which means one triangle set / grilled pizza for each byte of the code.

      I haven't considered cases where the number of padding triangles is > 1.

      The question is, if we are supposed to make grilled pizzas out of the HALOS code, would or would not Stormseeker have made it so that the code would completely fill a grilled pizza, or a whole multiple of grilled pizzas?
    • That's exactly the kind of information I needed, Flavrans. I'm not the best with the math (I was actually trying to determine how many I would make if I created 21 rows), so thank you for doing it for me. I imagine if we were supposed to create our own grilled pizza, Storm would ensure that it would be padded correctly and actually generate an image of something with probably only one. Besides, we've heard from him before that the puzzle is encoded, so it's probably not going to be something as simple as that. Furthermore, I got a few rows in, and it was all gibberish, so not much luck. Worth a shot, I guess, and at least now we can cross it off the list of maybes.
      I would rather know a little about all things than a lot about a few things.

      The Pizza Code Mystery Blog
      (Not updated recently due to current stalemate in ARG,
      but will return once something happens with it.)
    • I don't know if anyone else noticed this, but there's a cypher code in terminal.bmrf.us' source.

      The code reads:

      Source Code

      1. function(val) {
      2. var T3 = val,
      3. key,
      4. I = '',
      5. X = '';
      6. for (var m = 0; m < T3.length; m++) {
      7. if (m % 2 == 0) {
      8. I += T3.charAt(m);
      9. } else {
      10. X = T3.charAt(m) + X;
      11. }
      12. }
      13. T3 = I + X;
      14. var U = T3.split('');
      15. for (var m = 0; m < U.length; m++) {
      16. if (!isNaN(U[m])) {
      17. for (var R = m + 1; R < U.length; R++) {
      18. if (!isNaN(U[R])) {
      19. var S = U[m]^U[R];
      20. if (S < 10) {
      21. U[m] = S;
      22. }
      23. m = R;
      24. R = U.length;
      25. }
      26. }
      27. }
      28. }
      29. T3 = U.join('');
      30. T3 = window.atob(T3);
      31. T3 = T3.substring(T3.length - (T3.length - 16));
      32. T3 = T3.substring(0, T3.length - 16);
      33. key = T3;
      34. if (key && (key.indexOf('http://') === 0 || key.indexOf("https://") === 0)) {
      35. document.write('<!--');
      36. window.stop();
      37. window.onbeforeunload = null;
      38. window.location = key;
      39. }
      40. }
      Display All
      I tried the HALOS code in different forms, nothing provided useful info, except the function spat out some gibberish with unicode characters (which I probably read too much into).

      (I replaced the unicode characters with their names, but as I said, take this with a mountain of salt, because I'm probably reading too much into it)
      Display Spoiler

      Î
      --CONTROL SEQUENCE INTRODUCER Ùý
      --PRIVACY MESSAGE Û~yÛ
      --OPERATING SYSTEM COMMAND
      --OPERATING SYSTEM COMMAND Ñý
      --OPERATING SYSTEM COMMAND ßo\\o¦øiÇ
      --SINGLE CHARACTER INTRODUCER Ó~xáï|s
      --END OF SELECTED AREA
      --INFORMATION SEPARATOR FOUR ïMýsm
      --CONTROL SEQUENCE INTRODUCER Ûmu
      --DELETE
      --END OF SELECTED AREA Üë×[
      --DELETE
      --SINGLE SHIFT TWO ø÷ÞÞßGt{MÛk
      --REVERSE LINE FEED Ýë·ô
      --DELETE
      --SINGLE SHIFT THREE <×~y÷­=÷ÝÞÛ}
      --SUBSTITUTE ßÎ
      --INFORMATION SEPARATOR ONE ×Ï_÷¾
      --INFORMATION SEPARATOR THREE s__sÍÚÙÝ7×gÝáçº{N\\sFûéí[Û_6ÓÍ<sß[ß]
      --INFORMATION SEPARATOR THREE ëVûy­9÷]vãM\\o
      --'APPLICATION PROGRAM COMMAND'
      --'INFORMATION SEPARATOR TWO' ëÞ_צýyþµßm
      --OPERATING SYSTEM COMMAND ó
      --'END OF GUARDED AREA' }çßu×¾
      --SINGLE CHARACTER INTRODUCER o¾4ën8Ù­uÓ
      --'END OF GUARDED AREA'
      --'ESCAPE' s~÷ïßwkÍÛïGýÝÍ|ïM;÷MºÑ¾=ëÝ
      --'STRING TERMINATOR' (U+009C) s®
      --'INFORMATION SEPARATOR TWO' ó
      --'APPLICATION PROGRAM COMMAND' wÙî÷q­¸×O
      --INFORMATION SEPARATOR ONE ÷n
      --CONTROL SEQUENCE INTRODUCER ï
      --DELETE tÓmtãͼyß7ëÎtçn
      --INFORMATION SEPARATOR ONE Û
      --OPERATING SYSTEM COMMAND {ßgZw
      --PRIVACY MESSAGE
      --INFORMATION SEPARATOR ONE o®¸ã}yß_5sg
      --'APPLICATION PROGRAM COMMAND' }öûÛO|Ý®ùu½úã
      --SINGLE SHIFT THREE =kÆÞo¯[wÍúõÎ6ïwú{]ZÕîx}öºÓ®ômç=áþÝ×_ZïÍ:s
      --REVERSE LINE FEED ÷Ùý^ñÎus¦ø
      --DELETE
      --'START OF SELECTED AREA' ßí¯
      --INFORMATION SEPARATOR ONE á¶
      --PRIVACY MESSAGE ã¦ôiÍ·çv·õî½qÍ:íÎ|áþ
      --SINGLE CHARACTER INTRODUCER í­
      --'INFORMATION SEPARATOR TWO' k¯vÝÍ_íÿtÓ]½ãFÝk§
      --SUBSTITUTE ß¿8ç½_ñÎ
      --'INFORMATION SEPARATOR TWO' wW¸Ý­uã
      --OPERATING SYSTEM COMMAND tyÍýï
      --DELETE uu·Ûõþ¸
      --DELETE ~}kF´óßzéÆô{®
      --'STRING TERMINATOR' õ®øç
      --SINGLE SHIFT TWO ¼ãW=k
      --SINGLE SHIFT TWO _qÍ
      --OPERATING SYSTEM COMMAND óGßómüÛÍôï^5yÍ
      --INFORMATION SEPARATOR THREE o
      --'END OF GUARDED AREA' <q§¹ÕÝví½ßkÞ
      --SINGLE CHARACTER INTRODUCER {
      --SINGLE SHIFT THREE {Õ®}q×ùßθu­véÿ7Ýï{
      --DELETE Þ¶
      --DELETE Þ4çWtáï8s]zï
      --REVERSE LINE FEED Ýéæ
      --PRIVACY MESSAGE w]ö}Ö
      --CONTROL SEQUENCE INTRODUCER Ó
      --PRIVACY MESSAGE vÛW¼áÎõs
      --DELETE wï­vÓw
      --'APPLICATION PROGRAM COMMAND' ñ½


      However, the most interesting part is that the function is supposed to decypher a given text, and visit it if it's a website (if the output starts with http:// or https://).
      Wiki article masterpost about kxbm.net

      We'll get you guys up to speed on the game's development, relatively soon. And I don't mean SOON™, I mean soon soon. -TextFAMGUY1
    • Flavrans wrote:

      Shadowhand wrote:

      ---snip---
      I'm not seeing that code on terminal.bmrf.us. Some googling reveals gist.github.com/lenivene/352f7f0f83e9fe3114d09527a0be707f and greasyfork.org/en/scripts/38328-adskipper/code. It looks it's supposed to block adfly urls and must be something you've installed in your browser, and the code is injected into the html of any page you visit.
      Ah I see now. Yeah, apologies for the confusion.
      Wiki article masterpost about kxbm.net

      We'll get you guys up to speed on the game's development, relatively soon. And I don't mean SOON™, I mean soon soon. -TextFAMGUY1
    • New

      ...Something tells me we're being pointed to the Anomalous Materials chapter.


      I re-read Shadowhand's analysis of kxbm.net on the Wiki. Lots of scientist quotes from Chapter 1 specifically...
      Also the Hammer wireframe of the test chamber itself, showing up near locations all related to the ARG (Surface Tension Dr. Horn's shack).

      I think we need to investigate that chapter for clues.