(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for April 22nd, 2009

Zerstorung durch Fortschritte der Technologie: Break The Code

leave a comment »


The producers and writers of Fringe have decided to invite viewers to interact with their program by challenging us to solve a secret code. Near most commercial breaks, they have been displaying a series of images that contain clues to this puzzle.

Producer Pinkner explains here:

This repository contains all the glyph-code data that has aired on the show to date. I’m writing up this puzzle for an Ars post that should go live just before the show returns in April. My write-up is about this puzzle as well as a number of other interactive elements hidde in the show.

So here’s your chance to gain fleeting Internet notoriety by solving the code and revealing a clue central to the show’s mythology. All the data and notes are set up so you can get started right away.


CryptHelper: Some notes on English language frequencies.

DecryptNotes: Treating the images as an English language cypher.

Digraphs: Common English letter pairs Distribution:

Frequency count of unique image/yellow dot pairs FileList:

The image files in the Glyphs folder NumberedLetters:

The base letter set numbered i order NumberedList: The images numbered in order PicList:

The list of pictures, with orientation and dot information ReflectNormed:

The list of pictures normalized for reflection SearchingForSpaces: Attempts to find word divider

Fascinating… Well, I can see that I will be busy for a while…

Written by Krypt3ia

2009/04/22 at 01:53

Posted in Crypto, Fringe

“Zerstorung durch Fortschritte der Technologie”

leave a comment »

Did uncle Ted read read the ZFT?

Did uncle Ted read read the ZFT?

Or perhaps was Uncle Ted a co-writer?

I still want a copy of this “manifesto” C’mon Google!

Written by Krypt3ia

2009/04/22 at 01:44

Posted in Fringe

JSF Data: All are data belong to us!

leave a comment »

Hackers break into Pentagon’s fighter jet project

Hackers allegedly downloaded terabytes of data before they were discovered
By Sumner Lemon , IDG News Service , 04/21/2009

Hackers broke into U.S. Department of Defense computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a $300 billion stealth fighter currently under development, according to The Wall Street Journal.

The stolen files all relate to the design of the Joint Strike Fighter and its electronic systems, The Wall Street Journal reported, saying they could be used to help defend against the jet.

However, the most sensitive files were not compromised since they are stored on computers that are not connected to the Internet, the report said.

The reported attack raised more questions than it answered.

For example, the report did not say how attackers managed to download terabytes of data before being discovered. A single terabyte can take up to several weeks to download over a relatively fast data connection, such as a DSL or cable modem.

The report also suggested China could be behind the stolen data, noting that investigators believe the attack originated in China. However, it said the exact identities of the people behind the attack had not been established.

DOH! So, are we so sure that those “other” systems weren’t connected to the intranet at the very least? C’mon, you know you wanna admit that they were! Ugh, oddly enough I had a conversation with someone in the rings who complained that things were not being done right… Gee…

Of course do you have any idea how long it would have taken to exfiltrate a terabyte of data? A couple weeks at least! So, who was at the switch here? I mean, no one had an IDS or any other monitoring tool network wise to see massive amounts of data being pumped out of their network?

I think that GD and SECDEF Gates need to really step up the hiring process for “Hackers” to protect our networks….