Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Thu Nov 14, 2024 2:15 pm
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Archive » Archive: MetaCortechs » MetaCortechs: Puzzles
[PUZZLE] The CARELESSLY Files
View previous topicView next topic
Page 40 of 42 [616 Posts]   Goto page: Previous 1, 2, 3, ..., 38, 39, 40, 41, 42  Next
Author Message
yanka
Fickle


Joined: 06 Oct 2003
Posts: 1214
Location: undesirable

Lol, STOP THAT! In order to post the sequence for you, SOMEBODY would have to search for it through this thread. So, why not do it yourself? It's somewhere between p. 30 and here. There are also 2 .doc attachments that list the files in more detail.
_________________
Annushka has already bought the sunflower oil, and has not only bought it, but has already spilled it.

PostPosted: Thu Oct 09, 2003 2:08 pm
 View user's profile
 Back to top 
Guest
Guest


Just a theory I have had for a while, but had 17 pages since last night to read.... Wink

Quote:

Texel is here;

Pic of a 'place' (fire castle)

Also.


Could the speaker be referencing that Texel is at that place with them... or maybe that the castle represents the virtual location of the meeting (Caesar's Palace?)
It was noted in an earlier post that someone recognized that pic as a place that could be seen from a balcony of Caesar's in Vegas.....

PostPosted: Thu Oct 09, 2003 2:40 pm
 Back to top 
Makkura
Boot

Joined: 06 Oct 2003
Posts: 12
Location: La Costa, California

I'm pretty sure what's in the pictures aren't really that important. I think the pictures, and all the files, are to just represent each one of the hackers that are meeting on this FTP site.

The only thing I think the pictures mean is a clue as to each one of the hackers are... their own calling card, if you will.

I don't think we're supposed to put them all together, and decode one giant clue.

Question Question
_________________


PostPosted: Thu Oct 09, 2003 2:53 pm
 View user's profile Visit poster's website AIM Address
 Back to top 
yanka
Fickle


Joined: 06 Oct 2003
Posts: 1214
Location: undesirable

Makkura wrote:
I'm pretty sure what's in the pictures aren't really that important. I think the pictures, and all the files, are to just represent each one of the hackers that are meeting on this FTP site.

The only thing I think the pictures mean is a clue as to each one of the hackers are... their own calling card, if you will.

I don't think we're supposed to put them all together, and decode one giant clue.

Question Question


It is entirely possible. But why then send all of these weird messages? Why not just have everybody report their presence in some more-or-less obvious way and be done with it? Why put a crossword puzzle in there - KNOWING that everybody will be trying to figure it out - if it actually doesn't mean anything more than "I'm here"? That would really be kind of cruel - to dump such a load of apparent "clues" on us, when they are not, in fact, clues at all, and therefore, it doesn't matter how we solve them or IF we solve them at all Evil or Very Mad
_________________
Annushka has already bought the sunflower oil, and has not only bought it, but has already spilled it.

PostPosted: Thu Oct 09, 2003 6:11 pm
 View user's profile
 Back to top 
chancesend
Veteran


Joined: 08 Oct 2003
Posts: 128
Location: Colorado, USA

Because we're assuming these aren't left as "puzzles" by the PMs, but rather as calling cards by these hackers we're tracking. In the Matrix, a hacker has a bit of a mythical connotation, being very mysterious and rogue-like. What better way to be cool/mysterious than to leave a very cryptic calling card who's only point is sort've like a digital signature?

It's kind of like analyzing graffitti. You could go pretty deep, but in reality it's just someone's sig. I believe that if this game progresses on for a long time, we're going to start becoming very familiar with these characters. Perhaps a puzzle in the future will be to figure out which calling card WASN'T left by a member of the baker's dozen (digital forensics, eh?).

How many numbers do people suppose might be in a MetaCortechs employee ID? In the crossword puzzle, the Answer ID is #1031631. Perhaps this is the employee login they are getting ready to strike?
_________________
--
(Chance's End )
Skyway 12" now on sale! (MP3 of Radio Mix)


PostPosted: Thu Oct 09, 2003 9:51 pm
 View user's profile Visit poster's website
 Back to top 
yanka
Fickle


Joined: 06 Oct 2003
Posts: 1214
Location: undesirable

That would be sad, imo. First, because we would never really be sure if a clue is a clue, or if it's just "there". Second, because... let's suppose that you and I were to "meet" like this. So you would sit on some chat, waiting for me, and then suddenly you would see something like "asdkjfnwjfd". From that, you would conclude that that was my message to you. Wouldn't you try to decipher it? Would you really just conclude that there is no body to the message on the FIRST time? And the second time you saw "lkngowertj", you would just dismiss the context and presume "she's not really saying anything, just letting me know she's there"?

I guess I may just be stubborn or something, but given that we have no idea what the "meeting" was about, why it was significant, what we are even chasing after - it just seems very... efortless (can't find the right word)... to take for granted that there are no messages, only signatures.
_________________
Annushka has already bought the sunflower oil, and has not only bought it, but has already spilled it.

PostPosted: Thu Oct 09, 2003 10:26 pm
 View user's profile
 Back to top 
chancesend
Veteran


Joined: 08 Oct 2003
Posts: 128
Location: Colorado, USA

I'm not saying we shouldn't try to decode it. Heck, I've been looking them over off and on. But from the texts/images that seem relatively straight forward (Texel is here, beth@littleboxes is here also., etc.), and because the first picture asked for a roll call, I feel the next link/clue will come from one of the paintover images (either 'eye see' or one of the two Oct9th images). Specifically, the stegged text file in the cabinet.

We'll probably see for sure the next "meeting place" we find. If the hackers all post identical / similar messages or not.

But you probably are right to criticize me for jumping to conclusions based on the first set of signatures we find.
_________________
--
(Chance's End )
Skyway 12" now on sale! (MP3 of Radio Mix)


PostPosted: Thu Oct 09, 2003 10:49 pm
 View user's profile Visit poster's website
 Back to top 
Marl64
Unfettered


Joined: 04 Oct 2003
Posts: 456
Location: Prisoner of Zion

chancesend wrote:
I'm not saying we shouldn't try to decode it. Heck, I've been looking them over off and on. But from the texts/images that seem relatively straight forward (Texel is here, beth@littleboxes is here also., etc.), and because the first picture asked for a roll call, I feel the next link/clue will come from one of the paintover images (either 'eye see' or one of the two Oct9th images). Specifically, the stegged text file in the cabinet.

We'll probably see for sure the next "meeting place" we find. If the hackers all post identical / similar messages or not.


I agree.

It's highly likely that once we figure out the "hacker-id" clues, we'll have a better chance of tracking the hackers. Particulalry if the file extensions are consistant.

If this theory holds out, all we have to do is find one hacker at a meeting and the rest should follow.

Understanding the content of the files could well allow us to decode communications between them on subsequent meeting sites.

or it could all be scarlet fish Very Happy
_________________
Marl
(There is no spoon, oh wait, there it is)


PostPosted: Thu Oct 09, 2003 10:55 pm
 View user's profile
 Back to top 
BrianEnigma
Entrenched


Joined: 05 Oct 2003
Posts: 1199
Location: Pacific Northwest

yanka wrote:
That would be sad, imo. First, because we would never really be sure if a clue is a clue, or if it's just "there". Second, because... let's suppose that you and I were to "meet" like this. So you would sit on some chat, waiting for me, and then suddenly you would see something like "asdkjfnwjfd". From that, you would conclude that that was my message to you. Wouldn't you try to decipher it? Would you really just conclude that there is no body to the message on the FIRST time? And the second time you saw "lkngowertj", you would just dismiss the context and presume "she's not really saying anything, just letting me know she's there"?

I guess I may just be stubborn or something, but given that we have no idea what the "meeting" was about, why it was significant, what we are even chasing after - it just seems very... efortless (can't find the right word)... to take for granted that there are no messages, only signatures.


I have seen filesystem "defacements" like this before in real life. Typically, it starts out as a "capture the flag" sort of thing--hackers show how 'leet they are by dropping a calling card on a server. This is not a "conversation" in the typical sense--not like talking to someone or even messaging or emailing them. It's like someone figures out a way to get past the barbed wire around the freeway sign and tags their sig in spraypaint. Somebody else notices, and puts their tag up there, etc. In real life, though, this doesn't usually stop with just dropping your calling card--it proceeds, depending on the server's space and bandwidth, with people trading large media files (discs and discs of porn, digitized movies, pirated games, etc). Hackers use it as a place to store files that might be too large to transfer to their friends on their cablemodems. After all, would you rather transfer a 1 gig file to 10 separate people, or transfer it to a server, then tell them how to retrieve it?

Sorry, that was pretty off topic game-wise, but provides a little real-life context.

PostPosted: Thu Oct 09, 2003 11:22 pm
 View user's profile Visit poster's website
 Back to top 
Marl64
Unfettered


Joined: 04 Oct 2003
Posts: 456
Location: Prisoner of Zion

BriEnigma wrote:
Sorry, that was pretty off topic game-wise, but provides a little real-life context.


I didn't think it was off-topic, on the contrary, snippets like this could help us to stay on track.
_________________
Marl
(There is no spoon, oh wait, there it is)


PostPosted: Fri Oct 10, 2003 12:04 am
 View user's profile
 Back to top 
Marl64
Unfettered


Joined: 04 Oct 2003
Posts: 456
Location: Prisoner of Zion

There's a post in the updates page

http://forums.unfiction.com/forums/viewtopic.php?t=2675
regarding "new" pictures

menttioned at http://mitglied.lycos.de/Gumpraider/metacortex/index.htm

Might be a non-story but I thought I'd draw you attention to it.

(just in case you don't get out much) Very Happy
_________________
Marl
(There is no spoon, oh wait, there it is)


PostPosted: Fri Oct 10, 2003 2:40 am
 View user's profile
 Back to top 
thebizrock
Boot

Joined: 08 Oct 2003
Posts: 18

New update at USH website on the Terms of Use page. They are unhappy with our hacking attempts on their websites. Very interesting.

http://www.underscorehosting.com/terms.html

PostPosted: Fri Oct 10, 2003 3:24 am
 View user's profile
 Back to top 
Chinghis
Veteran


Joined: 02 Oct 2003
Posts: 135
Location: Somewhere around Barstow on the edge of the desert

Sounds kind of legalistic and real - like it never occurred to them that folks would break in and potentially do stuff, like regular hackers.
_________________
It's the smell....

PostPosted: Fri Oct 10, 2003 5:17 am
 View user's profile
 Back to top 
GOD
Guest


*ROTFLMAO*

Quote:
Sounds kind of legalistic and real - like it never occurred to them that folks would break in and potentially do stuff, like regular hackers.



Confused
Sounds like Warner Brothers lawyers - like this *really bad person* in particular...

Attn: Marc Brandon
Manager, Anti-Piracy Internet Operations
Warner Bros.
4000 Warner Boulevard
Bridge Building 156 South, #5172
Burbank, CA 91522
Tel: +1 818 954 6274
Fax: +1 818 954 7898
Email: Marc.BrandonSPLATwarnerbros.com


I HATE HIM Exclamation Mad Evil or Very Mad Twisted Evil

**edited for language by jamesi

PostPosted: Fri Oct 10, 2003 5:25 am
 Back to top 
yanka
Fickle


Joined: 06 Oct 2003
Posts: 1214
Location: undesirable

BriEnigma wrote:
Sorry, that was pretty off topic game-wise, but provides a little real-life context.

Whether on or off topic, I appreciated that.
_________________
Annushka has already bought the sunflower oil, and has not only bought it, but has already spilled it.

PostPosted: Fri Oct 10, 2003 10:23 am
 View user's profile
 Back to top 
Display posts from previous:   Sort by:   
Page 40 of 42 [616 Posts]   Goto page: Previous 1, 2, 3, ..., 38, 39, 40, 41, 42  Next
View previous topicView next topic
 Forum index » Archive » Archive: MetaCortechs » MetaCortechs: Puzzles
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group