User Tools

Access Dive

They announced the fact that they had retrieved 21 scanner activation codes (invites for Ingress).
These seem to be spread across 21 puzzles each puzzle answer being the invite itself and at the same time the way to find the next puzzle. These puzzles were announced in the form of 2 new storyboards. These seem to lead into 2 chains of puzzles.

Transcript
PAC —

We are Verum Inveniri.

We have been following your work with considerable interest, and we would like your help with the distribution of certain assets that we have acquired. To test the reliability of this distribution channel, we have concealed 21 scanner activation codes for you to share. The first two codes can be found in the attached storyboards.

Follow the two trails down the rabbit hole. Every answer brings its reward, yet every answer poses another question.

storyboards439938
storyboards152080

All the solutions found for this dive are from this document which was made by the players while solving the puzzles in the VerumInveniri IRC room (now preserved for posterity) . Credits are given when names were present.

Chain 00/XX

00

Original Link

Hidden Info
In the left bottom corner there is a series of colors which have the following Hex values

2f4e45 573839 4e424e 2e6874 6d6c20

Translating this to ASCII we obtain /NEW89NBN.html.

This is both a invite (NEW89NBN) and the link to the next puzzle (using the hint given by the text on the left - /pac/accessdive/00/01 ) - http://commondatastorage.googleapis.com/pac/accessdive/00/01/NEW89NBN.html



01

Original Link

Hidden Info
The value on top (75069089) when turned into 75 69 89 and then translated to ASCII we get the word KEY

Taking each number and getting the modulo of the first number gives a binary string:

376355546 % 75069089 = 1010101
526484624 % 75069089 = 1001001
751690991 % 75069089 = 1000101
151139279 % 75069089 = 1001101
301276466 % 75069089 = 1000110
826760089 % 75069089 = 1000110
451414545 % 75069089 = 1000011
226207378 % 75069089 = 1000111

Translating this binary to ASCII we get another invite and the next puzzle - UIEMFFCG



02

Original Link


The image shows The monument to Kurchatov in Chelyabinsk in Russia. Kurchatov was a nuclear physicist

Hidden Info
Faint numbers in the bottom left of the image read:

697264796c6168667362505263736672
Translating this from Hex to ASCII we obtain - irdylahfsbPbcsfr
Using the hint of the Kurchatov and the capital P in Pb we can turn the string into Elements of the Periodic table of elements

Ir Dy La Hf Sb Pb Cs Fr
Getting their nuclear numbers - 77 66 57 72 51 82 21 87
And then just translating once again to ASCII we get another invite and puzzle - MB9H3R7W



03

Original Link

Hidden Info
We can see int he image the following
4gbfct6r
6hu8by
3r5edx
3drx54
24sewxvf
fgv6hbt
wdaxzs3
6vfr345

By mapping each one on a QWERTY keyboard we can get the following image

(credit goes to Bakuman) This is the new invite and the next puzzle - XYY7K66T



04

Original Link

Hidden Info
If you listen to the left and right side, you’ll notice they are not the same tone
So if we split the wave into left and right channel we get 2 DMFT tones
left DTFM is 07140302081320231
right DTFM is 51604152008201312
assuming 01=a 02=b…26=z
07 14 03 02 08 13 20 23 15 16 04 15 20 08 20 13 12 = gncbhmtwopdothtml
This translates to GNCBHM2P.html giving us a new invite and the next puzzle GNCBHM2P
Credits go to pheenyx



05

Original Link

The image is an image of Louis Braille

Hidden Info
Messing with the levels we can find a hidden string


CDEF DA CAD AC CBED FDEC BEA CAF EDCF BAD CDEF BD
Using the braille hint we can convert the letter to braille like this
letter to braille pattern:
AD
BE
CF

This gives us the new invite and puzzle 3MKT8U69



06

Original Link

In the audio we hear a german voice saying “We have to call him immediately” followed by the sound of a phone number being called.

Hidden Info
The number that is heard is 0013476200749 (DTMF analysis)
This is a US number - +1 347-620-0749 - calling this number and you get a morse code played



-.–…. -.–..– -.–..– -.–..-. -..—-. -.—-.- -..–… -..—.-
Doing 1 = dash, 0 = dot we get
10110000 10110011 10110011 10110010 10011110 10111101 10011000 10011101
binary to dec
176 179 179 178 158 189 152 157
Now using the hint of the original file having the artist metadata of 101 we can do this
subtract 101 from each number - 75 78 78 77 57 88 51 56
dec to ascii gives us the new invite and puzzle - KNNM9X38



07

Original Link

Hidden Info
On the image we see
3'-032 103 131 311 010 012 010 012 010 012 010 320 323-5'
Using the DNA hint in the image we can assume 3=A, 2=C, 1=G, 0=U (read from 3’ to 5’)
UAC GUA GAG AGG UGU UGC UGU UGC UGU UGC UGU ACU ACA
We then can convert to the amino acid singlets using the table below for example

YVERCCCCCCCTT
shorten that to - YVER7C2T
Credits go to Amer



08

Original Link



Hidden Info
These audio files are SSTV, or slow-scan television. It means that there were images encoded into audio files that, when played back, produce a rough representation of the original image. These can be seen below

NIA.INT.TRANSMISSION.01

version with noise

NIA.INT.TRANSMISSION.02

version with noise

Checking the spectrogram of the 2 audios we can obtain this
NIA.INT.TRANSMISSION.01

NIA.INT.TRANSMISSION.02

Combining both we can get this

this is a representation of a Pigpen Cipher
Each edge corresponds to which of the four images to look at. The dot signifies the second image. So we can obtain a new invite and the next puzzle - 7H6YWFBK

Hidden Info 2
The 3rd file also has a SSTV decoding

Seems to be a log for a IRC chat with some words removed (these will be the underlined and bold ones)
Dec 4, 2012 [13:23:22] <Dovahkiin> I wonder if Google people are in here
[13:23:31] <CptPlanet> they're watching uss!
[13:23:50] <ecbremner> usually in ARGs they are
[13:24:00] <Dovahkiin> If so, *hint, hint* my friend needs an invite, and I'd like a credit ;)
[13:24:11] <Didactylos> Dovahkiin, I got confused by the keyed and auto key ciphers.
[13:24:20] <ecbremner> during the Valve potato ARG they posted pictures of the chat channel once
[13:24:28] <Dovahkiin> Yeah, I remember that
[13:24:32] <Dovahkiin> With Python pseudocode
[13:24:41] <Didactylos> Long time since I used vigenere
[13:26:38] <fictive> haha, nice =)
[13:26:53] <fictive> great work guys
[13:27:20] <CptPlanet> verily

Dec 6, 2012
[12:47:37] <decodeingress> I added yesterday one bonus one
[12:47:38] <mintyphoenix> Didactylos: The drone code? The change occurred some hours after the original publish
[12:47:41] <grimwulf> Didactylos: they changed the clues some 6 hours later, thats where it came from :(
[12:47:43] <Blinddoctor> Hmm, so I found 'drone' and '2p8p', but the '4qe7' I'm not seeing in the page's source.
[12:47:46] <decodeingress> and it turned to be 4 more :)
[12:48:00] <aardgeek> Didactylos sometime after 10PM Eastern US
[12:48:07] <pallando> Blinddoctor: are you looking at the frame's source?
[12:48:17] <Didactylos> It's the comma, Blinddoctor
[12:48:21] <mintyphoenix> They also changed the newspaper article PNG from a few days ago hours later


There is a track number in the file - 11/8. This leads to a day where the WotD was URB Drone
Also the word drone is mentioned several times in that chat.
Now comes the complicated bit
In the other 2 images you can see the following

; NIA OPS CONFIDENTIAL TIER 1
; XM INVERSION TEST REV 255


urb_init:  
ldi r140, 0x9a
lds r137, PORTD_DIRSET 
xor r154, r145
sts PORTD_DIRSET, r134 
xor r153, r139
xor r136, r144 
cli
rjmp urb_delay  


And in the other

urb_loop:
lds  r142, PORTD_OUTTGL
xor  r139, r136
sts  PORTD_OUTTGL, r144 
rjmp urb_delay

urb_delay: 
ldi  r135, 0x8b 
ldi  r151, 0x8d 
sbiw r154, 0x9a 
brne -.143
rjmp urb_loop 


The “XM INVERSION TEST REV 255”and the xor instructions are hints for a bit flip
So 140, 0x9a, 137, 154, 145, 134, 153, 139, 136, 144 are sevenyftwo
and 142, 139, 136, 144, 135, 0x8b, 151, 0x8d, 154, 0x9a, 143 are qtwoxthreep

Putting all together we get 7yf2droneq2x3p



09

Original Link

This post was given at the time as a clue G+

Hidden Info
Looking at the source we can see <pre title=“This seems to be corrupted, we recovered what we could.”>
===*=*=
*=*== = *===* *===* ====* ==*=* ==* =*===
===== ====* *=*=* ===== =*=== ======= *=*== *==
*=*==*= =
=*=* =*===== =*==*=* ====* *=*== *=*==== ==*==
*====*= =*==*=* ==
*=* *=*==

This is encripted using a Hamming code

Blocks of 11-bits (= → 0, * → 1), cleanly divide the puzzle into 19 blocks; applying a Hamming(11, 7) to each block interpreted as little-endian (so reversing the bit order) and then bit reversing (BE → LE back) each block we get:

1100100 1101001 1110110 1100101 0101011 0111010 0110000 0101011 0110001 0110000 0101011 1011000 1011010 0110100 1001011 1010000 1000001 1000111 0111001

bin → hex: 64 69 76 65 2b 3a 30 2b 31 30 2b 58 5a 34 4b 50 41 47 39

Hex to Ascii
dive+:0+10+XZ4KPAG9

Credit goes to Amer



10

Original Link

Hidden Info
The word shapers can be seen on the bench in different colors. The hex values of those colors are
357565 367236 753271
Hex → ASCII gives us 5ue6r6u2q
This is a new passcode - 5ue6shapersr6u2q
Hidden Info 2
There are 4 parts of a QR code hidden in the image

They look like this
Apple
Sky
bench
window

The rest of this solution requires the last puzzle in the other chain



Chain 01/XX

00

Original Link

Hidden Info
Hidden in the image in the black border you can see
/pac/accessdive/01/01
and
00000 00111 11100 00001 11110 11111 11000 00001 10000 00000 00000 11000 10000 10000 11000 11000
replace 0 → . and 1 → -
….. ..— —.. ….- —-. —– –… ….- -…. ….. ….. –… -…. -…. –… –…
Translate the morse
5284907465576677
decimal to ASCII
4TZJA9BM



01

Original Link


Hidden Info
Overlapping the 2 images you obtain this one

On the corner you can find the other invite code - JW6DVJ9U
Credit goes to Amer



02

Original Link

Hidden Info
Messing with the levels you can see some blocks

which refer to computer punch cards

Make the translation you get
9FVUY7D7



03

Original Link

Hidden Info
The numbers are actual coordinates. when looking to them you will see building that resemble numbers and letters


44.9587550 -093.2723810 5
53.5348910 -002.2760750 9
44.9562590 -093.2980230 3
34.0957260 -118.3018980 3
41.7089040 -087.7944090 4
55.7720350 037.7505040 D
34.9704670 135.7640370 5
49.1303340 -001.4094990 8
46.7888360 -071.2844050 4
35.0128540 135.7836120 8
41.7089040 -087.7944090 4
41.7102620 -081.3594490 7
41.9609900 123.5074730 5
46.7888360 -071.2844050 4
41.7089040 -087.7944090 4
13.7542770 100.4949580 A

This gives 59 33 4D 58 48 47 54 4A
Convert from Hex to Ascii - Y3MXHGTJ

Credit go to CrabbyData and Bakuman



04

Original Link

Hidden Info
0MiRgYDRgMzIGBCNjYEIzMCRgQjQgMTRgUDR
reverse
RDUgRTMgQjQgRCMzIEYjNCBGIzMgRDYgRiM0
base64 → ASCII
D5 E3 B4 D#3 F#4 F#3 D6 F#4

musical note MIDI code using this: http://www.phys.unsw.edu.au/jw/notes.html
Solved to:
74 52 71 51 66 54 86 66 which in a decimal ASCII conversion gets us:
J4G3B6VB



05

Original Link

Hidden Info
In the images there are parts of a QR code



All put together gives us this one


It reads 8\8|76\0/4\96| → Substitution cipher with telephone symbols:
TU7MZG9N
Credit goes to Maveric and Amer



06

Original Link

Hidden Info
Solving the sudoku we obtain
374b374536594a55
hex → ascii
7K7E6YJU



07

Original Link

The image is of the statue of King Jagiello

Hidden Info
In the shield this image can be seen

Using the hint given by Verum Inveniri we can turn the image into something like this

Which is interpreting everything as a 4×4 pattern
Colors are for simpler understanding and were applied to single /’s and \’s

Filling with ‘chess like’ pattern of the green/blue lines to make the next step easier to understand:


Each square is now turned to 4 bits each. Only using the color in the middle of the square, interpret for each border in NESW order (as given by the clue) a line as 1 and a dot as 0, e.g.:


Only a blue line in case of a green square is also a 0.

This gives the binary:
0100 1011 0100 1110
0100 0010 0100 1101
0101 0010 0101 0100
0011 1000 0101 0110

which is ASCII code for:
KNBMRT8V



08

Original Link


Hidden Info
The log mentions 2 files
Original Link

Original Link

The deck hints to a Pontifex Cypher (It is printed in the box)
After decrypting ciphertext of “YPEJO ZLPHR ZMKAP LVUMA IHXDS FOXMH PPGHC JKEMQ AVSTJ” (second image) with key phrase “DEALTWITHBYDISCRETEMACHINERY” (quote from Alan Turing hinted in the first image) you get
EIGHTCHARACTERACTIVATIONCODEYDFJTHREEPKNINE
which becomes
“8 CHARACTER ACTIVATION CODE YDFJ3PK9”
Credit goes to adini and bubwit among others



09

Original Link

Hidden Info
In the audio you can hear the following words
flytrap, determine, gravity, jawbone, existence, eskimo, equipment, chopper, drifter, equation, enchanting, chatter, flatfoot, component, escapade, checkup, enlist, eightball, confidence, commando, drunken, goggles, existence, hesitate, flytrap, hazardous, equipment, chiseled, drifter, detector, edict, keyboard, drifter, checkup, existence, impetus, flytrap, everyday, dogsled, crowfoot

Using the PGP word list we can get
64 47 68 79 5A 57 55 35 4E 54 51 31 63 32 56 32 5A 57 34 30 51 6D 5A 70 64 6D 55 33 4E 45 55 7A 4E 32 5A 76 64 58 4A 42
Hex to Ascii
dGhyZWU5NTQ1c2V2ZW40QmZpdmU3NEUzN2ZvdXJB
treating the string as a base 64
three9545seven4Bfive74E37fourA
3954574b574e374a is hex that when turned to ascii becomes 9TWKWN7J which the invite code.

the problem is the path forward requires something extra as hinted by the link redirect when we get to the puzzle http://commondatastorage.googleapis.com/pac/accessdive/01/09/YDFJ3PK9-xxnxn.html

the second can be obtained in 2 ways
binary M/F:
MFFMFFFMMFFMMFFMMMFFMMFFMFFMMFMMMMFFMFMM
01101110 01100110 00110011 01100100 00110100
convert to ascii: nf3d4

OR

Syllables (all words by females have 3 syl, and by males 2 syl, thus it is the same thing)

2332333223322332223322332332232222332322
0110111001100110001100110110010000110100
ascii=nf3d4



10

Original Link

Hidden Info
In the source we can find the following things

#MK
VIIvh3
pDAUs6y

Making the proper replacements like dau being 2 in gaelic and MK being a reference to project MK ultra, we get 7vh3ultrap2s6y
Hidden Info2
Like in part 10 of the other chain this image contains QR parts


Putting them together we get



and then adding the one from the other chain



We get



This one reads to
WMFDK9GE
End of Transmission.



End of the dive

Original Link
AND
Original Link

Hidden Info
00/11 title text:
noitceted
u3r2q

01/11 title text:
6dr7

6dr7 + noitceted + u3r2q (passcode format)

noitceted = detection (reversed)

other parts reversed as well results in right passcode - 7rd6detectionq2r3u