There is a lot of speculation going around about the morse code in Sam's last voicemail but people differ in the actual lines and dots and of course, translation...
Thx to a lot of DarkUFO's reader, especially Jess, Wesley, Sandman, Viper and so many others....
here is a screencap of the Morse Code (thx to Persagax)
and another option from Jess:
--- .--. . -. ... - . --. ---
translation is OPENSTEGO
Thx to a lot of DarkUFO's reader, especially Jess, Wesley, Sandman, Viper and so many others....
here is a screencap of the Morse Code (thx to Persagax)
and another option from Jess:
--- .--. . -. ... - . --. ---
translation is OPENSTEGO
42 comments:
Nice find. OpenStego software was used on the dino-saurus-thingy picture.
I downloaded openStego, but I have no idea how to run it. help
I'm using OpenStego on the stegosaurus.png image, but It seems that whatever is hidden in the image (if anything) is password protected.
Any ideas?
I guess you have to be a l33t hacker to play this game.
@megagreg
Check out the other thread. There's some discussion.
@travis
You need Java VM (download from java.sun.com). Then you run it either by 'openstego.bat' or 'openstego.sh' (depends on your OS).
I think the password is README.txt, but I can't open the steg because of the following error: "java.io.IOException: Not in GZIP format"
cobines: ahh. New laptop doesn't have java...old one does...so I didn't even think about not having Java. Thanks for the help.
yes this morse isn't very helpful... we already know openstego, I found it manually (see other thread)... but the program is returing an error on the PNG -only- when using README.txt as the password - everything else says invalid password. We can't find a way to get OpenStego just to store what it finds, even if it's not decrypted.
Actually... if you email baliholidayfun@gmail.com (email address is from the baliholidayfun.com site in today's email) you'll get a response with a bunch of characters in it... if you decode the message you'll find this url:
http://www.find815.com/steg/stegosaurus.png
Is this a picture from the set of Season 4???
thebruce - Ah, yes, I didn't notice your post earlier. You're right. Well, I guess this is a goof.
@brandon
No, it's a picture from a Jurassic Park in Poland :)
can i just ask... how did they get that URL from that coded email?? I can't see it anywhere
at least we can assure that it has something hidden, cause any other random image doenst even start to be processed... so it HAS smtgh.
what can the pass be??
README.txt
README.txt does not work. Java throws an exception but it's a strange one, since the program does not work with other formats than bmp and png. The tool is not made for the lost experience so the error is not on purpose.
I've been trying all loose ends I could think of for the pass to OpenStego but nothing is working.
Carpe Diem (and all of it's variations) are getting no results, same with all the rest of the obvious stuff...
HEY! So cloverfield cam out... any Lost clues???
So know we are looking for the password to get the message out of stegosaurus.png.
I tried
OPENSTEGO
SAMUELMORSE
samuelmorse
with the OpenStego program.
found a LOT of data. tryin to figure out how to sort through it/post it. it goes on for pages
really, like what kind of data?
Adam, post it on Google Documents, or upload it to Google pages
http://docs.google.com
http://pages.google.com
u figured out the password adam? what is it?
i tried loading it on google docs, but the file is too big. i put it on a blog (takes a bit to load): http://find815stegosaurus.blogspot.com
(note, some of the weirder symbols appeared as boxes for some reason)
basically, i opened the picture as a text file. I would normally think i was on the wrong track, but the resulting mess looks a lot like that email we were sent from the bali guy in the first place...
any idea what this means??
Not to crash the party or anything, but that's just the literal encrypted code of the image file itself. What we're looking for is encrypted in that. Nice effort, but I'm afraid it may not be of much use at the moment.
Ive got an idea: nothing. Thought you had figured out the password argh. Most files would look something like that if opened in a text editor... maybe the previous coded files are actually some other file type *shrug*
Would seem that we've got a pretty clear direction on what to do with this stego file though... the fact it actually asks us for a password in openstego seems like proof that we're meant to find the password somewhere...
anyone try to see if there is anything in the maxwell logo?
I have an idea. I know we have Morse Code from THIS phone message... but do you think we can get Morse Code from the messages from Sam's mum?
Nope no morse at all there. The morse in this message was very clear, you can even zoom in to see it better. Just right mouse click in the middle of the phone and select 'Zoom in'.
couldn't README.txt be the filename of the embedded (and encrypted) file? Why do so many people think it's the password?. I've tried it, and gotten the GZIP exception.
Just saw Cloverfield -- really liked it!
OK now im confused... what README.txt?? where's there a README.txt file?
And there's not an embeded file in the stegosaurus image... there's an embeded image...
"why do so many people thing it's the password?" - think WHAT'S the password?? TRIED WHAT?? what GZIP exception? GZIP on what? where? aaaaaarrrgh
Try with PBEWithMD5AndDES also the same message of mistake gives that with README.txt
opium, using openstego on the file requires a password that we dont know to extract secret information (we already know that the image contains something, since it has FOR SURE been processed with the openstego).
if you try to use "README.txt" as password to extract the info, the application reacts different to other words, giving a java exception instead the typical "invalid password". BUT a java exception is a result of a malfunction of a java program (in this case openstego). i mean, it's not that the exception message can be controlled, it's a part of the java world, so it's not a hint or at least i don't think so. the creators of the game haven't programmed the application so they have no control over the bugs.
i hope it clears a bit your thoughts. ;)
if you try to use "PBEWithMD5AndDES" as password is the same message of Error gives that with "README.txt" as password....PBEWithMD5AndDES is http://syvaidya.blogspot.com/2008/01/cryptography-support-in-openstego.html
how can i view the contents of the directories on find815.com? like /bhf/ or /steg/?
Has anyone tried looking there for a file called README.txt? Where else could it be located. Maybe the file itself is hidden somewhere on the server and contains the password.
What about making a list, where everyone can write down the passwords he/she tried, so we don't try the same words over and over again?
Maybe we have new ideas, when we see the already tried words?
Just a note, but the screencap was actually made by me.. you can see where i've tweaked the contrast and brightness to make the waveforms more visible. And the first translation came almost immediately after by Jess.
Persagax has edited my screencap to show his morsecode translation but the originals can be found at
www.ryanleston.com/pics/cell.jpg
and
www.ryanleston.com/pics/cell2.jpg
Just a shot in the dark, but I couldn't figure out why we got a 3 digit code as the season four clue from the last clue hunt.
Has anyone tried that somewhere?
36-15-28?
Awesome Jess :)
Actually...Sprocket IS responsible for the screencap. Persa used it and added morse to it, which is incorrect. Jess has the right translation.
You can tell by following the wavelength. 1 peak between dot/dash means that is part of the same letter. 2 peaks means start the next letter. I admit the image is hard to see but you can tell where the dots are and Persa has added a few too many. Kudos to Jess.
36-15-28 looks like a school locker combination.
Post a Comment