Jan 18, 2008

Morse code in voicemail

There is a lot of speculation going around about the morse code in Sam's last voicemail but people differ in the actual lines and dots and of course, translation...

Thx to a lot of DarkUFO's reader, especially Jess, Wesley, Sandman, Viper and so many others....

here is a screencap of the Morse Code (thx to Persagax)


and another option from Jess:
--- .--. . -. ... - . --. ---
translation is OPENSTEGO

42 comments:

Cobines said...

Nice find. OpenStego software was used on the dino-saurus-thingy picture.

Sprocket said...
This comment has been removed by the author.
travis said...

I downloaded openStego, but I have no idea how to run it. help

Megagreg said...

I'm using OpenStego on the stegosaurus.png image, but It seems that whatever is hidden in the image (if anything) is password protected.

Any ideas?

travis said...

I guess you have to be a l33t hacker to play this game.

Cobines said...

@megagreg
Check out the other thread. There's some discussion.

@travis
You need Java VM (download from java.sun.com). Then you run it either by 'openstego.bat' or 'openstego.sh' (depends on your OS).

Matt the Pale said...

I think the password is README.txt, but I can't open the steg because of the following error: "java.io.IOException: Not in GZIP format"

travis said...

cobines: ahh. New laptop doesn't have java...old one does...so I didn't even think about not having Java. Thanks for the help.

thebruce said...

yes this morse isn't very helpful... we already know openstego, I found it manually (see other thread)... but the program is returing an error on the PNG -only- when using README.txt as the password - everything else says invalid password. We can't find a way to get OpenStego just to store what it finds, even if it's not decrypted.

Brandon said...

Actually... if you email baliholidayfun@gmail.com (email address is from the baliholidayfun.com site in today's email) you'll get a response with a bunch of characters in it... if you decode the message you'll find this url:

http://www.find815.com/steg/stegosaurus.png

Is this a picture from the set of Season 4???

Matt the Pale said...

thebruce - Ah, yes, I didn't notice your post earlier. You're right. Well, I guess this is a goof.

Cobines said...

@brandon
No, it's a picture from a Jurassic Park in Poland :)

Opium said...

can i just ask... how did they get that URL from that coded email?? I can't see it anywhere

Victor Hugo said...
This comment has been removed by the author.
Victor Hugo said...

at least we can assure that it has something hidden, cause any other random image doenst even start to be processed... so it HAS smtgh.

what can the pass be??

ben said...

README.txt

Victor Hugo said...

README.txt does not work. Java throws an exception but it's a strange one, since the program does not work with other formats than bmp and png. The tool is not made for the lost experience so the error is not on purpose.

Brendan said...

I've been trying all loose ends I could think of for the pass to OpenStego but nothing is working.

Carpe Diem (and all of it's variations) are getting no results, same with all the rest of the obvious stuff...

Limekat4 said...

HEY! So cloverfield cam out... any Lost clues???

Franech Johilan said...

So know we are looking for the password to get the message out of stegosaurus.png.

I tried

OPENSTEGO
SAMUELMORSE
samuelmorse

with the OpenStego program.

Adam said...

found a LOT of data. tryin to figure out how to sort through it/post it. it goes on for pages

Hipster Doofus said...

really, like what kind of data?

Bolivar Baez (2006-5715) said...

Adam, post it on Google Documents, or upload it to Google pages

http://docs.google.com
http://pages.google.com

Opium said...

u figured out the password adam? what is it?

Adam said...

i tried loading it on google docs, but the file is too big. i put it on a blog (takes a bit to load): http://find815stegosaurus.blogspot.com

(note, some of the weirder symbols appeared as boxes for some reason)

basically, i opened the picture as a text file. I would normally think i was on the wrong track, but the resulting mess looks a lot like that email we were sent from the bali guy in the first place...

any idea what this means??

Global-Trance said...

Not to crash the party or anything, but that's just the literal encrypted code of the image file itself. What we're looking for is encrypted in that. Nice effort, but I'm afraid it may not be of much use at the moment.

Opium said...

Ive got an idea: nothing. Thought you had figured out the password argh. Most files would look something like that if opened in a text editor... maybe the previous coded files are actually some other file type *shrug*

Would seem that we've got a pretty clear direction on what to do with this stego file though... the fact it actually asks us for a password in openstego seems like proof that we're meant to find the password somewhere...

Adrian said...

anyone try to see if there is anything in the maxwell logo?

Global-Trance said...

I have an idea. I know we have Morse Code from THIS phone message... but do you think we can get Morse Code from the messages from Sam's mum?

Maqrkk said...

Nope no morse at all there. The morse in this message was very clear, you can even zoom in to see it better. Just right mouse click in the middle of the phone and select 'Zoom in'.

Megagreg said...

couldn't README.txt be the filename of the embedded (and encrypted) file? Why do so many people think it's the password?. I've tried it, and gotten the GZIP exception.

Just saw Cloverfield -- really liked it!

Opium said...

OK now im confused... what README.txt?? where's there a README.txt file?

And there's not an embeded file in the stegosaurus image... there's an embeded image...

"why do so many people thing it's the password?" - think WHAT'S the password?? TRIED WHAT?? what GZIP exception? GZIP on what? where? aaaaaarrrgh

Pablo said...

Try with PBEWithMD5AndDES also the same message of mistake gives that with README.txt

Victor Hugo said...

opium, using openstego on the file requires a password that we dont know to extract secret information (we already know that the image contains something, since it has FOR SURE been processed with the openstego).

if you try to use "README.txt" as password to extract the info, the application reacts different to other words, giving a java exception instead the typical "invalid password". BUT a java exception is a result of a malfunction of a java program (in this case openstego). i mean, it's not that the exception message can be controlled, it's a part of the java world, so it's not a hint or at least i don't think so. the creators of the game haven't programmed the application so they have no control over the bugs.

i hope it clears a bit your thoughts. ;)

Pablo said...

if you try to use "PBEWithMD5AndDES" as password is the same message of Error gives that with "README.txt" as password....PBEWithMD5AndDES is http://syvaidya.blogspot.com/2008/01/cryptography-support-in-openstego.html

Yves said...

how can i view the contents of the directories on find815.com? like /bhf/ or /steg/?
Has anyone tried looking there for a file called README.txt? Where else could it be located. Maybe the file itself is hidden somewhere on the server and contains the password.

XaRen said...

What about making a list, where everyone can write down the passwords he/she tried, so we don't try the same words over and over again?

Maybe we have new ideas, when we see the already tried words?

Sprocket said...

Just a note, but the screencap was actually made by me.. you can see where i've tweaked the contrast and brightness to make the waveforms more visible. And the first translation came almost immediately after by Jess.
Persagax has edited my screencap to show his morsecode translation but the originals can be found at

www.ryanleston.com/pics/cell.jpg
and
www.ryanleston.com/pics/cell2.jpg

Morgan said...

Just a shot in the dark, but I couldn't figure out why we got a 3 digit code as the season four clue from the last clue hunt.

Has anyone tried that somewhere?

36-15-28?

SpOOky said...

Awesome Jess :)

Dvast8or said...

Actually...Sprocket IS responsible for the screencap. Persa used it and added morse to it, which is incorrect. Jess has the right translation.

You can tell by following the wavelength. 1 peak between dot/dash means that is part of the same letter. 2 peaks means start the next letter. I admit the image is hard to see but you can tell where the dots are and Persa has added a few too many. Kudos to Jess.

tvwatcherinvt said...

36-15-28 looks like a school locker combination.