Access Dive
They announced the fact that they had retrieved 21 scanner activation codes (invites for Ingress).
These seem to be spread across 21 puzzles each puzzle answer being the invite itself and at the same time the way to find the next puzzle. These puzzles were announced in the form of 2 new storyboards. These seem to lead into 2 chains of puzzles.
- Transcript
-
PAC —
We are Verum Inveniri.
We have been following your work with considerable interest, and we would like your help with the distribution of certain assets that we have acquired. To test the reliability of this distribution channel, we have concealed 21 scanner activation codes for you to share. The first two codes can be found in the attached storyboards.
Follow the two trails down the rabbit hole. Every answer brings its reward, yet every answer poses another question.
All the solutions found for this dive are from this document which was made by the players while solving the puzzles in the VerumInveniri IRC room (now preserved for posterity) . Credits are given when names were present.
Chain 00/XX
00
- Hidden Info
-
In the left bottom corner there is a series of colors which have the following Hex values
2f4e45 573839 4e424e 2e6874 6d6c20
Translating this to ASCII we obtain /NEW89NBN.html.
This is both a invite (NEW89NBN) and the link to the next puzzle (using the hint given by the text on the left - /pac/accessdive/00/01 ) - http://commondatastorage.googleapis.com/pac/accessdive/00/01/NEW89NBN.html
01
- Hidden Info
-
The value on top (75069089) when turned into 75 69 89 and then translated to ASCII we get the word KEY
Taking each number and getting the modulo of the first number gives a binary string:
376355546 % 75069089 = 1010101
526484624 % 75069089 = 1001001
751690991 % 75069089 = 1000101
151139279 % 75069089 = 1001101
301276466 % 75069089 = 1000110
826760089 % 75069089 = 1000110
451414545 % 75069089 = 1000011
226207378 % 75069089 = 1000111
Translating this binary to ASCII we get another invite and the next puzzle - UIEMFFCG
02
The image shows The monument to Kurchatov in Chelyabinsk in Russia. Kurchatov was a nuclear physicist
- Hidden Info
-
Faint numbers in the bottom left of the image read:
697264796c6168667362505263736672
Translating this from Hex to ASCII we obtain - irdylahfsbPbcsfr
Using the hint of the Kurchatov and the capital P in Pb we can turn the string into Elements of the Periodic table of elements
Ir Dy La Hf Sb Pb Cs Fr
Getting their nuclear numbers - 77 66 57 72 51 82 21 87
And then just translating once again to ASCII we get another invite and puzzle - MB9H3R7W
03
- Hidden Info
-
We can see int he image the following
4gbfct6r
6hu8by
3r5edx
3drx54
24sewxvf
fgv6hbt
wdaxzs3
6vfr345
By mapping each one on a QWERTY keyboard we can get the following image
(credit goes to Bakuman) This is the new invite and the next puzzle - XYY7K66T
04
- Hidden Info
-
If you listen to the left and right side, you’ll notice they are not the same tone
So if we split the wave into left and right channel we get 2 DMFT tones
left DTFM is 07140302081320231
right DTFM is 51604152008201312
assuming 01=a 02=b…26=z
07 14 03 02 08 13 20 23 15 16 04 15 20 08 20 13 12 = gncbhmtwopdothtml
This translates to GNCBHM2P.html giving us a new invite and the next puzzle GNCBHM2P
Credits go to pheenyx
05
Original Link
The image is an image of Louis Braille
- Hidden Info
-
Messing with the levels we can find a hidden string
CDEF DA CAD AC CBED FDEC BEA CAF EDCF BAD CDEF BD
Using the braille hint we can convert the letter to braille like this
letter to braille pattern:
AD
BE
CF
This gives us the new invite and puzzle 3MKT8U69
06
In the audio we hear a german voice saying “We have to call him immediately” followed by the sound of a phone number being called.
- Hidden Info
-
The number that is heard is 0013476200749 (DTMF analysis)
This is a US number - +1 347-620-0749 - calling this number and you get a morse code played
-.–…. -.–..– -.–..– -.–..-. -..—-. -.—-.- -..–… -..—.-
Doing 1 = dash, 0 = dot we get
10110000 10110011 10110011 10110010 10011110 10111101 10011000 10011101
binary to dec
176 179 179 178 158 189 152 157
Now using the hint of the original file having the artist metadata of 101 we can do this
subtract 101 from each number - 75 78 78 77 57 88 51 56
dec to ascii gives us the new invite and puzzle - KNNM9X38
07
- Hidden Info
-
On the image we see
3'-032 103 131 311 010 012 010 012 010 012 010 320 323-5'
Using the DNA hint in the image we can assume 3=A, 2=C, 1=G, 0=U (read from 3’ to 5’)
UAC GUA GAG AGG UGU UGC UGU UGC UGU UGC UGU ACU ACA
We then can convert to the amino acid singlets using the table below for example
YVERCCCCCCCTT
shorten that to - YVER7C2T
Credits go to Amer
08
- Hidden Info
-
These audio files are SSTV, or slow-scan television. It means that there were images encoded into audio files that, when played back, produce a rough representation of the original image. These can be seen below
NIA.INT.TRANSMISSION.01
version with noise
NIA.INT.TRANSMISSION.02
version with noise
Checking the spectrogram of the 2 audios we can obtain this
NIA.INT.TRANSMISSION.01
NIA.INT.TRANSMISSION.02
Combining both we can get this
this is a representation of a Pigpen Cipher
Each edge corresponds to which of the four images to look at. The dot signifies the second image. So we can obtain a new invite and the next puzzle - 7H6YWFBK
- Hidden Info 2
-
The 3rd file also has a SSTV decoding
Seems to be a log for a IRC chat with some words removed (these will be the underlined and bold ones)
Dec 4, 2012 [13:23:22] <Dovahkiin> I wonder if Google people are in here
[13:23:31] <CptPlanet> they're watching uss!
[13:23:50] <ecbremner> usually in ARGs they are
[13:24:00] <Dovahkiin> If so, *hint, hint* my friend needs an invite, and I'd like a credit ;)
[13:24:11] <Didactylos> Dovahkiin, I got confused by the keyed and auto key ciphers.
[13:24:20] <ecbremner> during the Valve potato ARG they posted pictures of the chat channel once
[13:24:28] <Dovahkiin> Yeah, I remember that
[13:24:32] <Dovahkiin> With Python pseudocode
[13:24:41] <Didactylos> Long time since I used vigenere
[13:26:38] <fictive> haha, nice
[13:26:53] <fictive> great work guys
[13:27:20] <CptPlanet> verily
Dec 6, 2012
[12:47:37] <decodeingress> I added yesterday one bonus one
[12:47:38] <mintyphoenix> Didactylos: The drone code? The change occurred some hours after the original publish
[12:47:41] <grimwulf> Didactylos: they changed the clues some 6 hours later, thats where it came from :(
[12:47:43] <Blinddoctor> Hmm, so I found 'drone' and '2p8p', but the '4qe7' I'm not seeing in the page's source.
[12:47:46] <decodeingress> and it turned to be 4 more :)
[12:48:00] <aardgeek> Didactylos sometime after 10PM Eastern US
[12:48:07] <pallando> Blinddoctor: are you looking at the frame's source?
[12:48:17] <Didactylos> It's the comma, Blinddoctor
[12:48:21] <mintyphoenix> They also changed the newspaper article PNG from a few days ago hours later
There is a track number in the file - 11/8. This leads to a day where the WotD was URB Drone
Also the word drone is mentioned several times in that chat.
Now comes the complicated bit
In the other 2 images you can see the following
; NIA OPS CONFIDENTIAL TIER 1
; XM INVERSION TEST REV 255
urb_init: ldi r140, 0x9a lds r137, PORTD_DIRSET xor r154, r145 sts PORTD_DIRSET, r134 xor r153, r139 xor r136, r144 cli rjmp urb_delay
And in the other
urb_loop: lds r142, PORTD_OUTTGL xor r139, r136 sts PORTD_OUTTGL, r144 rjmp urb_delay urb_delay: ldi r135, 0x8b ldi r151, 0x8d sbiw r154, 0x9a brne -.143 rjmp urb_loop
The “XM INVERSION TEST REV 255”and the xor instructions are hints for a bit flip
So 140, 0x9a, 137, 154, 145, 134, 153, 139, 136, 144 are sevenyftwo
and 142, 139, 136, 144, 135, 0x8b, 151, 0x8d, 154, 0x9a, 143 are qtwoxthreep
Putting all together we get 7yf2droneq2x3p
09
This post was given at the time as a clue G+
- Hidden Info
-
Looking at the source we can see
<pre title=“This seems to be corrupted, we recovered what we could.”>
===*=*=
*=*== = *===* *===* ====* ==*=* ==* =*===
===== ====* *=*=* ===== =*=== ======= *=*== *==
*=*==*= ==*=* =*===== =*==*=* ====* *=*== *=*==== ==*==
*====*= =*==*=* ==*=* *=*==
This is encripted using a Hamming code
Blocks of 11-bits (= → 0, * → 1), cleanly divide the puzzle into 19 blocks; applying a Hamming(11, 7) to each block interpreted as little-endian (so reversing the bit order) and then bit reversing (BE → LE back) each block we get:
1100100 1101001 1110110 1100101 0101011 0111010 0110000 0101011 0110001 0110000 0101011 1011000 1011010 0110100 1001011 1010000 1000001 1000111 0111001
bin → hex: 64 69 76 65 2b 3a 30 2b 31 30 2b 58 5a 34 4b 50 41 47 39
Hex to Ascii
dive+:0+10+XZ4KPAG9
Credit goes to Amer
10
- Hidden Info
-
The word shapers can be seen on the bench in different colors. The hex values of those colors are
357565 367236 753271
Hex → ASCII gives us 5ue6r6u2q
This is a new passcode - 5ue6shapersr6u2q
- Hidden Info 2
-
There are 4 parts of a QR code hidden in the image
They look like this
Apple
Sky
bench
window
The rest of this solution requires the last puzzle in the other chain
Chain 01/XX
00
- Hidden Info
-
Hidden in the image in the black border you can see
/pac/accessdive/01/01
and
00000 00111 11100 00001 11110 11111 11000 00001 10000 00000 00000 11000 10000 10000 11000 11000
replace 0 → . and 1 → -
….. ..— —.. ….- —-. —– –… ….- -…. ….. ….. –… -…. -…. –… –…
Translate the morse
5284907465576677
decimal to ASCII
4TZJA9BM
01
- Hidden Info
-
Overlapping the 2 images you obtain this one
On the corner you can find the other invite code - JW6DVJ9U
Credit goes to Amer
02
- Hidden Info
-
Messing with the levels you can see some blocks
which refer to computer punch cards
Make the translation you get
9FVUY7D7
03
- Hidden Info
-
The numbers are actual coordinates. when looking to them you will see building that resemble numbers and letters
44.9587550 -093.2723810 5
53.5348910 -002.2760750 9
44.9562590 -093.2980230 3
34.0957260 -118.3018980 3
41.7089040 -087.7944090 4
55.7720350 037.7505040 D
34.9704670 135.7640370 5
49.1303340 -001.4094990 8
46.7888360 -071.2844050 4
35.0128540 135.7836120 8
41.7089040 -087.7944090 4
41.7102620 -081.3594490 7
41.9609900 123.5074730 5
46.7888360 -071.2844050 4
41.7089040 -087.7944090 4
13.7542770 100.4949580 A
This gives 59 33 4D 58 48 47 54 4A
Convert from Hex to Ascii - Y3MXHGTJ
Credit go to CrabbyData and Bakuman
04
- Hidden Info
-
0MiRgYDRgMzIGBCNjYEIzMCRgQjQgMTRgUDR
reverse
RDUgRTMgQjQgRCMzIEYjNCBGIzMgRDYgRiM0
base64 → ASCII
D5 E3 B4 D#3 F#4 F#3 D6 F#4
musical note MIDI code using this: http://www.phys.unsw.edu.au/jw/notes.html
Solved to:
74 52 71 51 66 54 86 66 which in a decimal ASCII conversion gets us:
J4G3B6VB
05
- Hidden Info
-
In the images there are parts of a QR code
All put together gives us this one
It reads 8\8|76\0/4\96| → Substitution cipher with telephone symbols:
TU7MZG9N
Credit goes to Maveric and Amer
06
07
Original Link
The image is of the statue of King Jagiello
- Hidden Info
-
In the shield this image can be seen
Using the hint given by Verum Inveniri we can turn the image into something like this
Which is interpreting everything as a 4×4 pattern
Colors are for simpler understanding and were applied to single /’s and \’s
Filling with ‘chess like’ pattern of the green/blue lines to make the next step easier to understand:
Each square is now turned to 4 bits each. Only using the color in the middle of the square, interpret for each border in NESW order (as given by the clue) a line as 1 and a dot as 0, e.g.:
Only a blue line in case of a green square is also a 0.
This gives the binary:
0100 1011 0100 1110
0100 0010 0100 1101
0101 0010 0101 0100
0011 1000 0101 0110
which is ASCII code for:
KNBMRT8V
08
- Hidden Info
-
The log mentions 2 files
Original Link
Original Link
The deck hints to a Pontifex Cypher (It is printed in the box)
After decrypting ciphertext of “YPEJO ZLPHR ZMKAP LVUMA IHXDS FOXMH PPGHC JKEMQ AVSTJ” (second image) with key phrase “DEALTWITHBYDISCRETEMACHINERY” (quote from Alan Turing hinted in the first image) you get
EIGHTCHARACTERACTIVATIONCODEYDFJTHREEPKNINE
which becomes
“8 CHARACTER ACTIVATION CODE YDFJ3PK9”
Credit goes to adini and bubwit among others
09
- Hidden Info
-
In the audio you can hear the following words
flytrap, determine, gravity, jawbone, existence, eskimo, equipment, chopper, drifter, equation, enchanting, chatter, flatfoot, component, escapade, checkup, enlist, eightball, confidence, commando, drunken, goggles, existence, hesitate, flytrap, hazardous, equipment, chiseled, drifter, detector, edict, keyboard, drifter, checkup, existence, impetus, flytrap, everyday, dogsled, crowfoot
Using the PGP word list we can get
64 47 68 79 5A 57 55 35 4E 54 51 31 63 32 56 32 5A 57 34 30 51 6D 5A 70 64 6D 55 33 4E 45 55 7A 4E 32 5A 76 64 58 4A 42
Hex to Ascii
dGhyZWU5NTQ1c2V2ZW40QmZpdmU3NEUzN2ZvdXJB
treating the string as a base 64
three9545seven4Bfive74E37fourA
3954574b574e374a is hex that when turned to ascii becomes 9TWKWN7J which the invite code.
the problem is the path forward requires something extra as hinted by the link redirect when we get to the puzzle http://commondatastorage.googleapis.com/pac/accessdive/01/09/YDFJ3PK9-xxnxn.html
the second can be obtained in 2 ways
binary M/F:
MFFMFFFMMFFMMFFMMMFFMMFFMFFMMFMMMMFFMFMM
01101110 01100110 00110011 01100100 00110100
convert to ascii: nf3d4
OR
Syllables (all words by females have 3 syl, and by males 2 syl, thus it is the same thing)
2332333223322332223322332332232222332322
0110111001100110001100110110010000110100
ascii=nf3d4
10
- Hidden Info
-
In the source we can find the following things
#MK
VIIvh3
pDAUs6y
Making the proper replacements like dau being 2 in gaelic and MK being a reference to project MK ultra, we get 7vh3ultrap2s6y
- Hidden Info2
-
Like in part 10 of the other chain this image contains QR parts
Putting them together we get
and then adding the one from the other chain
We get
This one reads to
WMFDK9GE
End of Transmission.
End of the dive
Original Link
AND
Original Link
- Hidden Info
-
00/11 title text:
noitceted
u3r2q
01/11 title text:
6dr7
6dr7 + noitceted + u3r2q (passcode format)
noitceted = detection (reversed)
other parts reversed as well results in right passcode - 7rd6detectionq2r3u