PAX USB Drive: Difference between revisions

From IFWiki

(Infobox)
 
(65 intermediate revisions by 8 users not shown)
Line 1: Line 1:
{{Event
|Type=Other event
|Series=No
|Event dates={{Event date
|Event what=Event begins
|Event when=2010/04/01
}}{{Event date
|Event what=Event ends
|Event when=2019/04/25
}}
}}
This article does not refer to any USB drive containing IF promotional material, information, or games intended for beginners. Rather, it refers to a USB drive supposedly found in the IF suite at [[PAX East 2010]], the files on this drive, or the puzzle involving it. The name ''PAX USB Drive'' was arbitrarily chosen by the [[ifMUD]] user Jaybird when he created the ifMUD channel on which people discuss solving the puzzle.
This article does not refer to any USB drive containing IF promotional material, information, or games intended for beginners. Rather, it refers to a USB drive supposedly found in the IF suite at [[PAX East 2010]], the files on this drive, or the puzzle involving it. The name ''PAX USB Drive'' was arbitrarily chosen by the [[ifMUD]] user Jaybird when he created the ifMUD channel on which people discuss solving the puzzle.


Line 5: Line 16:
[[Image:PAX USB.jpg|right|thumb|The mysterious USB drive, as pictured in the file "usb.jpg".]]
[[Image:PAX USB.jpg|right|thumb|The mysterious USB drive, as pictured in the file "usb.jpg".]]


(Note: I did see two such USB drives in the IF Suite. Nobody plugged them into computers during PAX, as far as I know. I do not remember who wound up with them, but I'll ask around. --Z)
=== How it Began ===
 
== How it Began ==


Shortly after six o'clock Eastern time on the evening of April 1, 2010, a guest logged on to [[ifMUD]]. People log on as guests if they don't have an account, have forgotten or lost their username or password, or for any number of other reasons. This guest, however, had a different agenda. Following is a very brief log of the important things this guest said. This log has been edited down to include only the essentials for privacy reasons.
Shortly after six o'clock Eastern time on the evening of April 1, 2010, a guest logged on to [[ifMUD]]. People log on as guests if they don't have an account, have forgotten or lost their username or password, or for any number of other reasons. This guest, however, had a different agenda. Following is a very brief log of the important things this guest said. This log has been edited down to include only the essentials for privacy reasons.
Line 25: Line 34:
Guest1 says, "Oops got to go. Talk to you later"
Guest1 says, "Oops got to go. Talk to you later"


== The USB Drive ==
''(Wiki notes also say: Some very strange guests showed up on [[ifMUD]] on April 1. One talked about someone at [[PAX East 2010]] with green hair, and the guest who posted this USB drive to Sendspace said he/she was the person with brown hair.)''
 
=== How it Continued ===
 
Four other USB drives with identical markings were found throughout the IF suite during the weekend. During the final cleanup of the suite, these drives were collected. For two weeks they gathered dust on the desk of a Harvard University staff member before the contents were opened and investigated. They were uploaded on April 15, 2010.
 
Bradley Momberger reports having found a fifth ("vol2"); he sent me the contents, and I uploaded it on 8/3/10. (--Z)
 
=== 2011 Update ===
 
After the 2011 PAX East IF gathering, on March 17, this twitter message appeared:
 
    [http://twitter.com/babyjarson/status/48481209508044800 babyjarson]: courier delivered it unto the bathroom. if its lost
    i can send by mail. ask for follow then DM the address
 
At this point [[Jason McIntosh]] remembered that he'd found such a drive during cleanup on Sunday.
 
== The USB Drives ==
 
The contents of all the USB drives are now available on the [http://pr-if.org/doc/paxeast-usb/ People's Republic of Interactive Fiction web site].


When downloaded and unzipped, you will find a picture of the USB drive, a bmp screenshot of a game, a "welcome.txt" with reference to @babyjarson, a Twitter screen name, two password-protected RAR archives, and two .par2 RAR parity files, which are used to reconstruct a corrupt RAR archive.
Each of the USB drives contains a bmp screenshot of a game, a "welcome.txt" with reference to @babyjarson, a Twitter screen name, two password-protected RAR archives, and two .par2 RAR parity files, which are used to reconstruct a corrupt RAR archive. With the exception of the two parity files, the contents of the drives are all identical.


== Cracking the Code ==
Links to compressed versions of the USB files are included below, as is a list of all the contents found within each of the six drives. The drives were arbitrarily designated as "USB_XX" where "XX" corresponds to the volume number of the drive's parity files. The "original" drive (the drive mentioned by the mysterious guest on ifMUD) is "USB_01". The other five drives were found in the IF hospitality suite.
 
====[http://pr-if.org/doc/paxeast-usb/usb_01.zip USB_01] ====
* level1.rar
* level2.rar
* level3.rar.vol1+1.PAR2
* level4.rar.vol1+1.PAR2
* snap00.bmp
* welcome.txt
 
====[http://pr-if.org/doc/paxeast-usb/usb_02.zip USB_02] ====
* level1.rar
* level2.rar
* level3.rar.vol2+1.PAR2
* level4.rar.vol2+1.PAR2
* snap00.bmp
* welcome.txt
 
====[http://pr-if.org/doc/paxeast-usb/usb_03.zip USB_03] ====
* level1.rar
* level2.rar
* level3.rar.vol3+1.PAR2
* level4.rar.vol3+1.PAR2
* snap00.bmp
* welcome.txt
 
====[http://pr-if.org/doc/paxeast-usb/usb_04.zip USB_04] ====
* level1.rar
* level2.rar
* level3.rar.vol4+1.PAR2
* level4.rar.vol4+1.PAR2
* snap00.bmp
* welcome.txt
 
====[http://pr-if.org/doc/paxeast-usb/usb_07.zip USB_07] ====
* level1.rar
* level2.rar
* level3.rar.vol7+1.PAR2
* level4.rar.vol7+1.PAR2
* snap00.bmp
* welcome.txt
 
====[http://pr-if.org/doc/paxeast-usb/usb_08.zip USB_08] ====
* level1.rar
* level2.rar
* level3.rar.vol8+1.PAR2
* level4.rar.vol8+1.PAR2
* snap00.bmp
* welcome.txt
 
====[http://pr-if.org/doc/paxeast-usb/pax_east_2011_puzzlestick.zip USB-2011]====
 
* welcome.txt 
* level1.rar 
* snap00.bmp
 
== Cracking the Code: 2010 ==
 
The welcome.txt file on the drive contained this text:
 
    finders keepers
    part . of .
    enjoy
    @babyjarson


Within minutes of the initial announcement of the USB drive, people on [[ifMUD]] had cracked the two password-protected RAR archives.
Within minutes of the initial announcement of the USB drive, people on [[ifMUD]] had cracked the two password-protected RAR archives.
Each RAR yields a "Read Me" text file, supposedly from [[Infocom]] to their distributors, describing the wonders of their newest gaming products. Included in each archive is also a demo of a new game supposedly from Infocom.
'''The following description has spoilers for the solution methods and rewards.'''
=== The First RAR Archive ===
[[schep]] noticed that the picture of the USB drive itself had thirteen Wingdings characters. These characters translate to "INFOCOM" and six other characters. The six other characters, "8F0BC8", are the password for the first RAR archive. Then, ScottG remarked that the screenshot contained in the BMP, accessible without a password, was from a game called "Todd's Adventures in Slime World." As it turns out, the characters that make up the password for the first RAR are the [http://www.cheatscodesguides.com/lynx-cheats/todds-adventures-in-slime-world/ final cheat code for the normal mode of that game].
Cracking the first file, level1.rar, yields a second BMP image with a clue to the password for the second archive. The "new game" is a musical version of [[Zork I]]. Shortly after the game begins, a sharply-dressed man appears and taps you on the shoulder. This turns out to be Rick Astley, and a few turns later, he begins dancing and singing "Never Gonna Give You Up." When he's finished, he dances off into the sunset, and the game ends. This game is a [[Z-Code]] version 3 game, with a release number of 104, and a serial number of 880401.
=== The Second RAR Archive ===
The BMP image in the first RAR archive was a screenshot of the same game as before. [[Gunther Schmidl|Gunther]] noticed the presence of a timer in this screenshot, and noted that only one mode of this game, "suspense mode," has a time limit. People then attempted to open the second RAR with the cheat codes from suspense mode. [[Dan Shiovitz|inky]] succeeded after trying the first code, "DD0114".
The second game is a "Top Gun" adaptation of [[Seastalker]]. The word "adaptation" is used loosely here. The game has all people and location names changed, but play is, for the most part, identical to Seastalker. It does not start the way Seastalker normally starts, asking for the player's name. Instead, the game starts immediately. It also has a twenty-four-turn time limit, and some very strange bugs. It is a Z3, with release 104, serial number 870401.
=== The Third RAR Archive ===
Using the parity files found across the five drives, the third password-protected RAR archive was reconstructed. The password for this file was cracked using the same information gleaned from the first two archives.
The third game appears to be an adaptation of James Cameron's film ''The Abyss''. This was a game that was being authored by [[Bob Bates]] at Infocom when the company was shut down. It is a Z6, with release 1, serial number 890320. At this time, there is no verification that this game has any relation to the original Infocom project.
=== The Fourth RAR Archive ===
The level4 .par2 files are a format are used to reconstruct a corrupt RAR archive. The original five drives were not enough to reconstruct the archive, however.
On August 3, 2010, [[zarf]] was sent the contents of drive 2. This added enough information to reconstruct the fourth RAR archive, which contains ZIL source code for Mini-Zork.
== Cracking the Code: 2011 ==
The welcome.txt file contained this message:
    finders keepers again
    part 1 of 1 of 2 of .
    enjoy
    @babyjarson
The snap00.bmp file is identical to the Slime World snapshot from 2010.


=== The First RAR Archive ===
=== The First RAR Archive ===


The user schep noticed that the picture of the USB drive itself had thirteen Wingdings characters. These characters translate to "INFOCOM" and six other characters. The six other characters are the password for the first RAR archive. Then, ScottG remarked that the screenshot contained in the BMP, accessible without a password, was from a game called "Todd's Adventures in Slime World." As it turns out, the characters that make up the password for the first RAR are the final cheat code for the normal mode of that game.
The level1.rar file responded to the "8F0BC8" password. It contained a new image file with two screenshots (Slime World and Chip's Challenge), plus a second RAR archive.


=== The Second RAR Archive ===
=== The Second RAR Archive ===


One of the items contained in the first RAR archive, and available once its password was cracked, was another BMP image, a screenshot of the same game as before. The [[ifMUD]] user [[Gunther Schmidl|Gunther]] noticed the presence of a timer in this screenshot, and noted that only one mode of this game, "suspense mode," has a time limit. People then attempted to open the second RAR with the cheat codes from suspense mode, with [[Dan Shiovitz|inky]] succeeding after trying the first code.
The Chip's Challenge screenshot showed level 9 of that game (no doubt [[Level 9|an incidental IF reference]]). The [http://www.gamewinners.com/LYNX/ChipsChallenge.htm cheat code for level 9] is "KCRE". A brute-force search through the Slime World codes (the first one on each level) determined that the password was "D9E275KCRE". (D9E275 is the [http://www.cheatscodesguides.com/lynx-cheats/todds-adventures-in-slime-world/ first password in Logic mode].)
 
The level2.rar file contains an MP3 audio file and a third RAR archive.
 
The audio file is, inevitably, "Never Gonna Give You Up". However, there are distortions or additions at six points (0:06-0:10, 0:40-0:45, 1:22-1:26, 2:00-2:09, 2:38-2:42, 3:25-3:28 -- the last of these is after the song itself has faded out).
 
=== The Third RAR Archive ===
 
genericgeekgirl was able to [https://youtu.be/0A0ZooghjE8 view the distorted audio with a spectrogram analyzer], and transcribed four texts and two images:
 
    Welcome to the IF Suite at PAX East 2011! I hope you have a great
    time. -- babyjarson
 
    Last year there were 4 parts placed in the IF Suite, 4 placed at PAX
    itself, and 1 leaked online. Only 1 part from PAX was recovered (that
    we know of). Only 6 parts were needed to unlock the final puzzle.
 
    Did you know: "Todd's Adventures in Slime World" is an anagram
    for "means Don Wods did it, letr luvers"
 
    Murder is in the air under the temple of ra death awaits on the
    final curtain
 
The final line is a quote from an episode of MacGyver, in which it is an acrostic clue for "MURDOC". This is the password for the third archive. The archive contains a fourth RAR archive, a collection of ZIL documentation and code, and this message:
 
    hi good job you win pax east 2011.
    level4 is a special curse that wont open until doomsday and only
    if you are good and only if i am bad and that wont happen so stash
    it away for someday just in case
    enjoy your time at pax.
    cul8r
    @babyjarson
 
If we accept this at face value, this is the end of this year's puzzle, and level4.rar cannot be opened at this time.
 
=== The Fourth RAR Archive ===
 
Little is known at this time. So far, all attempts to guess or brute force the password for level4.rar have met with failure. In response, Babyjarson posted to Twitter that the password consists of thirty-two characters, uppercase, lowercase, digits and symbols, and is totally random. If this is accepted as valid information, brute force is the only attack method which will work, and by the time a brute force attack succeeded, everybody who cared about the contents would be long dead anyway.


== Spoilers ==
== April 1st, 2011 Additions ==


In case you are not familiar with "Todd's Adventures in Slime World" or otherwise just want to open the RAR archives, here are the passwords. The password for the first RAR is 8F0BC8, and the password for the second and third RAR is DD0114.
On April 1st, the modification date of the level3 rar from the 2011 USB stick, BabyJarson tweeted, "uggcovgyls1Ulaa" followed by "sorry that was rotten :///" and "13 hrs left = plenty of time to get down today! uggc ://." The latter two tweets were hints that the first was encoded in rot13. Decoded, it comes out to "httpbitlyf1Hynn" which, of course, is a URL. That points to a sendspace page with a download for a "message.z5" file. It's a quick little "game"; its winning text gives another [http://www.sendspace.com/file/1ssemn sendspace URL], this time leading to a mp3 that has another spectroscope message inside it:


== The Contents ==
    SymwhZkgOyialKnjtEdjRqpuFtkvcXkb
    &OqwhxqvlRknjIuFmbLadmcgKzSyqtep
    dQAau$qaTmR!zKkRL*xqU_zTKi@FqfuO
    Cke#edJ_TjqR&AQLLvKtx*MI(qzTQmx!
    lJJ&ukY!qe~AQG#Jqle$EVjCeuEvjrnJ


Cracking the first file, level1.rar, yields a second BMP image with a clue to the password for the second archive. See above for details. Each RAR yields a "Read Me" text file, supposedly from [[Infocom]] to their distributors, describing the wonders of their newest gaming products. Included in each archive is also a demo of a new game supposedly from Infocom. In the first case, the "new game" is a musical version of [[Zork I]]. Shortly after the game begins, a sharply-dressed man appears and taps you on the shoulder. This turns out to be Rick Astley, and a few turns later, he begins dancing and singing "Never Gonna Give You Up." When he's finished, he dances off into the sunset, and the game ends. This game is a [[Z-Code]] version 3 game, with a release number of 104, and a serial number of 880401.
This is a simple substitution cipher and translates to:


The second game is a "Top Gun" adaptation of [[Seastalker]]. The word "adaptation" is used loosly here. The game has all people and location names changed, but play is, for the most part, identical to Seastalker. It does not start the way Seastalker normally starts, asking for the player's name. Instead, the game starts immediately. It also has a twenty-four-turn time limit, and some very strange bugs. It is a Z3, with release 104, serial number 870401.
    QuickFoxJumpsOverTheLazyBrownDog
    &JackdawsLoveMyBigSphinxOfQuartz
    hAPpy apRiL fOoLS daY fROm BabyJ
    Not thE ReaL PASSwOrd IM afRAid!
    sEE yoU at PAX East TWeNtyTwelvE


== The Puzzle ==
== April 25, 2019 Additions ==


The remaining puzzle concerns the .par2 files. These files are used to reconstruct a corrupt RAR archive. However, no corrupt RAR is included, and there aren't enough parity files included to reconstruct a RAR by themselves. The assumption is that there are other files somewhere on the Internet, and the currently known files contain clues to their whereabouts. However, playing the fake Infocom games, hacking out the turn limits where necessary, and even running them through various [[Z-code]] disassembly tools, has failed to provide any useful information.
On April 25, 2019 [https://twitter.com/babyjarson @BabyJarson] posted the following [https://twitter.com/babyjarson/status/1121401756288634880 tweet]:


== Possible clues ==
    4e79 6775 6268 7475 2067 7572 2071 6e67
    7220 6668 7474 7266 6766 206e 2063 656e
    6178 2c20 5620 756e 6972 6127 6720 7362
    6861 7120 6e61 6c20 6e61 6e79 6c66 7666
    2062 7320 6775 7666 206e 616c 6a75 7265


The people trying to solve this puzzle are up against a brick wall of frustration at this point. There are a few possible leads which have not, as yet, been fully investigated.
Translated to ASCII this is:


* Both [[Z-code]] games have release number 104. This is almost certainly not a coincidence.
    Nygubhtu gur qngr fhttrfgf n cenax, V unira'g sbhaq nal nanylfvf bs guvf naljure


* Some very strange guests showed up on [[ifMUD]] on April 1. One talked about someone at [[PAX East 2010]] with green hair, and the guest who posted this USB drive to Sendspace said he/she was the person with brown hair.
and ROT-13 decoded this is:


* It has been suggested that maybe the passwords to the RAR archives are RRGGBB values.
    Although the date suggests a prank, I haven't found any analysis of this anywher


[[Category:Events]]
[[Category:Events]]
[[Category:2010]]
[[Category:2011]]
[[Category:2010]]
[[Category:2010]]

Latest revision as of 22:02, 11 November 2024

PAX USB Drive
Other event
Frequency
[[File:|385px|center]]
Part of series
Website [http:// ]
Organiser
IFDB event page Event
IFDB series page Series
Total entries
Event dates
Event begins 1 Apr 2010
Event ends 25 Apr 2019
Edit this infobox

This article does not refer to any USB drive containing IF promotional material, information, or games intended for beginners. Rather, it refers to a USB drive supposedly found in the IF suite at PAX East 2010, the files on this drive, or the puzzle involving it. The name PAX USB Drive was arbitrarily chosen by the ifMUD user Jaybird when he created the ifMUD channel on which people discuss solving the puzzle.

On April 1, 2010, somebody uploaded the contents of a USB drive which had supposedly been left in the IF suite at PAX East 2010. This turned out to be a series of puzzles which, as of April 4, are not completely solved.

The mysterious USB drive, as pictured in the file "usb.jpg".

How it Began

Shortly after six o'clock Eastern time on the evening of April 1, 2010, a guest logged on to ifMUD. People log on as guests if they don't have an account, have forgotten or lost their username or password, or for any number of other reasons. This guest, however, had a different agenda. Following is a very brief log of the important things this guest said. This log has been edited down to include only the essentials for privacy reasons.

Guest1 says, "I unpacked my bag yesterday and I think someone lost their usb drive because I found it in there"

inky says, "ha ha"

Ellison says, "huh! maybe it was one of the SpeedIF usb things going around"

Guest1 says, "I took a picture of the usb drive, it looks dangerous"

Guest1 says, "And here are the files too, sorry to trouble you"

Guest1 says, "http://www.sendspace.com/file/66r5nn has everything, hope it gets back to its owner"

Guest1 says, "Oops got to go. Talk to you later"

(Wiki notes also say: Some very strange guests showed up on ifMUD on April 1. One talked about someone at PAX East 2010 with green hair, and the guest who posted this USB drive to Sendspace said he/she was the person with brown hair.)

How it Continued

Four other USB drives with identical markings were found throughout the IF suite during the weekend. During the final cleanup of the suite, these drives were collected. For two weeks they gathered dust on the desk of a Harvard University staff member before the contents were opened and investigated. They were uploaded on April 15, 2010.

Bradley Momberger reports having found a fifth ("vol2"); he sent me the contents, and I uploaded it on 8/3/10. (--Z)

2011 Update

After the 2011 PAX East IF gathering, on March 17, this twitter message appeared:

   babyjarson: courier delivered it unto the bathroom. if its lost
   i can send by mail. ask for follow then DM the address

At this point Jason McIntosh remembered that he'd found such a drive during cleanup on Sunday.

The USB Drives

The contents of all the USB drives are now available on the People's Republic of Interactive Fiction web site.

Each of the USB drives contains a bmp screenshot of a game, a "welcome.txt" with reference to @babyjarson, a Twitter screen name, two password-protected RAR archives, and two .par2 RAR parity files, which are used to reconstruct a corrupt RAR archive. With the exception of the two parity files, the contents of the drives are all identical.

Links to compressed versions of the USB files are included below, as is a list of all the contents found within each of the six drives. The drives were arbitrarily designated as "USB_XX" where "XX" corresponds to the volume number of the drive's parity files. The "original" drive (the drive mentioned by the mysterious guest on ifMUD) is "USB_01". The other five drives were found in the IF hospitality suite.

USB_01

  • level1.rar
  • level2.rar
  • level3.rar.vol1+1.PAR2
  • level4.rar.vol1+1.PAR2
  • snap00.bmp
  • welcome.txt

USB_02

  • level1.rar
  • level2.rar
  • level3.rar.vol2+1.PAR2
  • level4.rar.vol2+1.PAR2
  • snap00.bmp
  • welcome.txt

USB_03

  • level1.rar
  • level2.rar
  • level3.rar.vol3+1.PAR2
  • level4.rar.vol3+1.PAR2
  • snap00.bmp
  • welcome.txt

USB_04

  • level1.rar
  • level2.rar
  • level3.rar.vol4+1.PAR2
  • level4.rar.vol4+1.PAR2
  • snap00.bmp
  • welcome.txt

USB_07

  • level1.rar
  • level2.rar
  • level3.rar.vol7+1.PAR2
  • level4.rar.vol7+1.PAR2
  • snap00.bmp
  • welcome.txt

USB_08

  • level1.rar
  • level2.rar
  • level3.rar.vol8+1.PAR2
  • level4.rar.vol8+1.PAR2
  • snap00.bmp
  • welcome.txt

USB-2011

  • welcome.txt
  • level1.rar
  • snap00.bmp

Cracking the Code: 2010

The welcome.txt file on the drive contained this text:

   finders keepers
   part . of .
   enjoy
   @babyjarson

Within minutes of the initial announcement of the USB drive, people on ifMUD had cracked the two password-protected RAR archives.

Each RAR yields a "Read Me" text file, supposedly from Infocom to their distributors, describing the wonders of their newest gaming products. Included in each archive is also a demo of a new game supposedly from Infocom.

The following description has spoilers for the solution methods and rewards.

The First RAR Archive

schep noticed that the picture of the USB drive itself had thirteen Wingdings characters. These characters translate to "INFOCOM" and six other characters. The six other characters, "8F0BC8", are the password for the first RAR archive. Then, ScottG remarked that the screenshot contained in the BMP, accessible without a password, was from a game called "Todd's Adventures in Slime World." As it turns out, the characters that make up the password for the first RAR are the final cheat code for the normal mode of that game.

Cracking the first file, level1.rar, yields a second BMP image with a clue to the password for the second archive. The "new game" is a musical version of Zork I. Shortly after the game begins, a sharply-dressed man appears and taps you on the shoulder. This turns out to be Rick Astley, and a few turns later, he begins dancing and singing "Never Gonna Give You Up." When he's finished, he dances off into the sunset, and the game ends. This game is a Z-Code version 3 game, with a release number of 104, and a serial number of 880401.

The Second RAR Archive

The BMP image in the first RAR archive was a screenshot of the same game as before. Gunther noticed the presence of a timer in this screenshot, and noted that only one mode of this game, "suspense mode," has a time limit. People then attempted to open the second RAR with the cheat codes from suspense mode. inky succeeded after trying the first code, "DD0114".

The second game is a "Top Gun" adaptation of Seastalker. The word "adaptation" is used loosely here. The game has all people and location names changed, but play is, for the most part, identical to Seastalker. It does not start the way Seastalker normally starts, asking for the player's name. Instead, the game starts immediately. It also has a twenty-four-turn time limit, and some very strange bugs. It is a Z3, with release 104, serial number 870401.

The Third RAR Archive

Using the parity files found across the five drives, the third password-protected RAR archive was reconstructed. The password for this file was cracked using the same information gleaned from the first two archives.

The third game appears to be an adaptation of James Cameron's film The Abyss. This was a game that was being authored by Bob Bates at Infocom when the company was shut down. It is a Z6, with release 1, serial number 890320. At this time, there is no verification that this game has any relation to the original Infocom project.

The Fourth RAR Archive

The level4 .par2 files are a format are used to reconstruct a corrupt RAR archive. The original five drives were not enough to reconstruct the archive, however.

On August 3, 2010, zarf was sent the contents of drive 2. This added enough information to reconstruct the fourth RAR archive, which contains ZIL source code for Mini-Zork.

Cracking the Code: 2011

The welcome.txt file contained this message:

   finders keepers again
   part 1 of 1 of 2 of .
   enjoy
   @babyjarson

The snap00.bmp file is identical to the Slime World snapshot from 2010.

The First RAR Archive

The level1.rar file responded to the "8F0BC8" password. It contained a new image file with two screenshots (Slime World and Chip's Challenge), plus a second RAR archive.

The Second RAR Archive

The Chip's Challenge screenshot showed level 9 of that game (no doubt an incidental IF reference). The cheat code for level 9 is "KCRE". A brute-force search through the Slime World codes (the first one on each level) determined that the password was "D9E275KCRE". (D9E275 is the first password in Logic mode.)

The level2.rar file contains an MP3 audio file and a third RAR archive.

The audio file is, inevitably, "Never Gonna Give You Up". However, there are distortions or additions at six points (0:06-0:10, 0:40-0:45, 1:22-1:26, 2:00-2:09, 2:38-2:42, 3:25-3:28 -- the last of these is after the song itself has faded out).

The Third RAR Archive

genericgeekgirl was able to view the distorted audio with a spectrogram analyzer, and transcribed four texts and two images:

   Welcome to the IF Suite at PAX East 2011! I hope you have a great
   time. -- babyjarson
   Last year there were 4 parts placed in the IF Suite, 4 placed at PAX
   itself, and 1 leaked online. Only 1 part from PAX was recovered (that
   we know of). Only 6 parts were needed to unlock the final puzzle.
   Did you know: "Todd's Adventures in Slime World" is an anagram
   for "means Don Wods did it, letr luvers"
   Murder is in the air under the temple of ra death awaits on the
   final curtain

The final line is a quote from an episode of MacGyver, in which it is an acrostic clue for "MURDOC". This is the password for the third archive. The archive contains a fourth RAR archive, a collection of ZIL documentation and code, and this message:

   hi good job you win pax east 2011.
   level4 is a special curse that wont open until doomsday and only
   if you are good and only if i am bad and that wont happen so stash
   it away for someday just in case
   enjoy your time at pax.
   cul8r
   @babyjarson

If we accept this at face value, this is the end of this year's puzzle, and level4.rar cannot be opened at this time.

The Fourth RAR Archive

Little is known at this time. So far, all attempts to guess or brute force the password for level4.rar have met with failure. In response, Babyjarson posted to Twitter that the password consists of thirty-two characters, uppercase, lowercase, digits and symbols, and is totally random. If this is accepted as valid information, brute force is the only attack method which will work, and by the time a brute force attack succeeded, everybody who cared about the contents would be long dead anyway.

April 1st, 2011 Additions

On April 1st, the modification date of the level3 rar from the 2011 USB stick, BabyJarson tweeted, "uggcovgyls1Ulaa" followed by "sorry that was rotten :///" and "13 hrs left = plenty of time to get down today! uggc ://." The latter two tweets were hints that the first was encoded in rot13. Decoded, it comes out to "httpbitlyf1Hynn" which, of course, is a URL. That points to a sendspace page with a download for a "message.z5" file. It's a quick little "game"; its winning text gives another sendspace URL, this time leading to a mp3 that has another spectroscope message inside it:

   SymwhZkgOyialKnjtEdjRqpuFtkvcXkb
   &OqwhxqvlRknjIuFmbLadmcgKzSyqtep
   dQAau$qaTmR!zKkRL*xqU_zTKi@FqfuO
   Cke#edJ_TjqR&AQLLvKtx*MI(qzTQmx!
   lJJ&ukY!qe~AQG#Jqle$EVjCeuEvjrnJ

This is a simple substitution cipher and translates to:

   QuickFoxJumpsOverTheLazyBrownDog
   &JackdawsLoveMyBigSphinxOfQuartz
   hAPpy apRiL fOoLS daY fROm BabyJ
   Not thE ReaL PASSwOrd IM afRAid!
   sEE yoU at PAX East TWeNtyTwelvE

April 25, 2019 Additions

On April 25, 2019 @BabyJarson posted the following tweet:

   4e79 6775 6268 7475 2067 7572 2071 6e67
   7220 6668 7474 7266 6766 206e 2063 656e
   6178 2c20 5620 756e 6972 6127 6720 7362
   6861 7120 6e61 6c20 6e61 6e79 6c66 7666
   2062 7320 6775 7666 206e 616c 6a75 7265

Translated to ASCII this is:

   Nygubhtu gur qngr fhttrfgf n cenax, V unira'g sbhaq nal nanylfvf bs guvf naljure

and ROT-13 decoded this is:

   Although the date suggests a prank, I haven't found any analysis of this anywher