2 date: 2014-04-26 18:05:01+00:00
3 slug: april-1st-2014-followup
4 title: April 1st 2014, Followup
7 It's been almost too long for this blog post to arrive here after the April Fools quiz this year. Thanks to everyone who participated!
11 The first ten people who completed the challenges are, in descending order of aprilness:
13 (times are listed in UTC)
22 1. 2014-04-02T18:25:17 booto
24 2014-04-02T23:36:53 Fuchs *
26 2. 2014-04-03T00:29:29 furry
29 3. 2014-04-03T01:34:18 mniip
32 4. 2014-04-03T09:41:38 jojo
35 5. 2014-04-03T16:29:51 redi
38 6. 2014-04-03T18:57:21 BlueShark
41 7. 2014-04-04T15:33:24 larinadavid
44 8. 2014-04-04T22:27:20 Omniflux
47 9. 2014-04-04T23:02:19 apoc
50 10. 2014-04-04T23:13:02 thommey
55 _(*) user opted out of any prizes_
57 There were 25 additional nicks who completed the quiz and made it to the winner's circle but weren't fast enough to place in the top 10.
61 The prizes were cloaks for those in the top-10. In addition to the top-10 cloaks everyone else who finished the challenge that 'opted-in' were eligible for the _cloak lottery_. This was a lottery for 3 runnerup cloaks.
65 Out of the 25 additional people that completed the challenge, the following 3 won a cloak through the cloak lottery:
83 Here are the riddles and their solutions, in the original order:
94 * The clue was given in the [April 1st blog post](http://blog.freenode.net/wp-content/uploads/2014/04/freenode41.png): _IyMjI3hrY2Q=_
97 * That is the string `"####xkcd"` encoded using [base64](https://en.wikipedia.org/wiki/Base64).
99 * The answer: **####xkcd**, which was the first channel in the quiz.
109 * Clue: _Tnl2cHItbmFxLU9iby1qbnl4LXZhZ2Itbi1vbmU=_
112 * This is a [rot13](https://en.wikipedia.org/wiki/ROT13)'ed and base64'ed string.
115 * In [Python](https://en.wikipedia.org/wiki/Python_%28programming_language%29): `"Tnl2cHItbmFxLU9iby1qbnl4LXZhZ2Itbi1vbmU=".decode('base64').decode('rot13')`
118 * The answer: **####Alice-and-Bob-walk-into-a-bar**
131 * This is another string that is encoded with a series of base64 and rot13 transformations.
134 * In Python: `"MKWkpKMa".decode('rot13').decode('base64').decode('rot13')`
137 * The answer: **####reddit**
147 * Clue: _SHg5RkR4SUpIeHFGSnlXVUlJSVFJeHFKCg== | Save this for a later level: [https://i.imgur.com/87cX9y4.jpg](https://i.imgur.com/87cX9y4.jpg) | 4 decodes needed_
150 * Yet another string encoded with a series of base64 and rot13 transformations.
153 * In Python: `"SHg5RkR4SUpIeHFGSnlXVUlJSVFJeHFKCg==".decode('base64').decode('rot13').decode('base64').decode('rot13')`
156 * This yields: EBEORIETEMETHHPITI
159 * Contestants were expected to do a web search for this and find out it is the end of the [Zodiac Killer's infamous message](https://en.wikipedia.org/wiki/File:Zodiac_cipher.png).
162 * The answer: **####zodiac**
172 * Clue: _[https://i.imgur.com/x4nejBh.png](https://i.imgur.com/x4nejBh.png) | LaTeX right direction | [Google!](https://lmsptfy.com/?q=alternatives%20to%20Google%20searching) | No maths needed_
175 * The topic changed several times as contestants seemed pretty stumped on this level, the topic line above was its final form.
178 * The answer: **####exner** - this was expected from figuring out what the equation is. Simply put, the equation in the image is [Exner's Equation](https://en.wikipedia.org/wiki/File:PaolaExnerEqnRock.jpg).
188 * Clue: _[https://i.imgur.com/SandvWX.gif](https://i.imgur.com/SandvWX.gif) | Save this for a later level: [https://i.imgur.com/QpTubts.jpg](https://i.imgur.com/QpTubts.jpg)_
191 * This level was pretty tricky. This is an image that has more to it than meets the eye.
194 * Steps for recovering useful information:
197 * Un[zip](https://en.wikipedia.org/wiki/Zip_%28file_format%29) the [.gif](https://en.wikipedia.org/wiki/Graphics_Interchange_Format)
200 * Open the secret.txt file.
206 * Inside secret.txt is: ####Kolmogorov
209 * The answer: **####Kolmogorov**
219 * Clue: _[https://www.dropbox.com/s/emz7xy3p9r2ivxe/wat.unknown](https://www.dropbox.com/s/emz7xy3p9r2ivxe/wat.unknown) (verify the file, sha256sum: 0efade1bb29d1b7fdd65e5612159e262cbd41a2e27ed89a0144701a5556da68f)_
222 * This file is more stenography:
225 * Use '[file](https://en.wikipedia.org/wiki/File_%28command%29)' to determine what the file type is.
228 * Un-[7zip](https://en.wikipedia.org/wiki/7-Zip) the .unknown file
231 * Base64 decode the output
234 * Use 'file' to determine that the output is a [.jpg](https://en.wikipedia.org/wiki/JPEG)
240 * Un[tar](https://en.wikipedia.org/wiki/Tar_%28computing%29) two.tar.[gz](https://en.wikipedia.org/wiki/Gzip)
243 * Open the surprised.txt file.
249 * The content of surprised.txt is: ####ImSoMetaEvenThisAcronym
252 * The answer: **####ImSoMetaEvenThisAcronym**
262 * Clue: _AQwPfPN1ZBXNfvNj4bPmVR4fVQYPfPNlZBXNfvNkAP4jZhXNflOS and "Da Vinci" | Jules Verne | s/.02/.03/ in the decrypted text
265 * The clue is base64'ed and rot13'ed. To decode it in Python: `print "AQwPfPN1ZBXNfvNj4bPmVR4fVQYPfPNlZBXNfvNkAP4jZhXNflOS".decode('rot13').decode('base64')`
268 * This yields: 48° 50′ 0″ N, 2° 20′ 14.02″ E
271 * These are GPS coordinates for the [Paris meridian](https://en.wikipedia.org/wiki/Paris_Meridian).
274 * From this and the "Da Vinci" clue contestants were expected to find the [Wikipedia](https://www.wikipedia.org/) page about the [Rose Line](https://en.wikipedia.org/wiki/Rose_Line).
277 * The specific quote that contestants were suppose to find:
279 "Dan Brown simply invented the 'Rose Line' linking Rosslyn and Glastonbury. The name 'Roslin' definitely does not derive from any 'hallowed Rose Line'. It has nothing to do with a 'Rose Bloodline' or a 'Rose Line meridian'. There are many medieval spellings of 'Rosslyn'. 'Roslin' is certainly not the 'original spelling': it is now the most common spelling for the village."[18]
283 * The "Jules Verne" clue is suppose to reaffirm to contestants that they were on the right track:
285 The competition between the Paris and Greenwich meridians is a plot element in Jules Verne's "Twenty Thousand Leagues Under the Sea", published just before the international decision in favor of the British one.
289 * The answer: **####roslin**
299 * Original topic: Clue: _ZANKNMEPAXULMJCAGLKHKTOLUPSRDD | [https://i.imgur.com/6ayrOMq.png](https://i.imgur.com/6ayrOMq.png)_
302 * New topic: _UIVXUJZIULMJCAGLKHKTOLUPSRDD | [https://i.imgur.com/6ayrOMq.png](https://i.imgur.com/6ayrOMq.png)_
305 * The string in both topics is encoded with a [Four-square cipher](https://en.wikipedia.org/wiki/Four-square_cipher).
308 * Here are two scripts that were built for Four-square:
311 * encrypt, [http://git.io/Y6JIww](http://git.io/Y6JIww)
314 * decrypt, [http://git.io/CQuh8g](http://git.io/CQuh8g)
320 * Using "IRC" and "xkcd" - the keys saved earlier, the text decrypts to: POVAROVOSOLNECHNOGORSKRUSSIA
323 * Originally it was: ZELENOGRADSOLNECHNOGORSKRUSSIA
326 * The answer: **####POVAROVOSOLNECHNOGORSKRUSSIA**
336 * Clue: _ZCLVLLCOIUTKKJSCEKHHHSMKTOOPBA | OGUCSSGAPVGVLUMBTVOGICUNJDHSTB | RUTJJGNXUNTY | Letters that would repeat in a typical word do not repeat in the key(s), example 'freenode' would be 'frenod' | [https://i.imgur.com/pGIBjEE.png](https://i.imgur.com/pGIBjEE.png) | [http://is.gd/TgNsvm](http://is.gd/TgNsvm)_
339 * Alright this one is really really really tricky. The topic changed _several_ times.
342 * The three strings are encoded with [Four-square](https://en.wikipedia.org/wiki/Four-square_cipher) from the previous level with the same keys.
345 * Contestants were expected to use 'UVB' and 'RUSSIA' as keys for the Four-square cipher.
348 * It was expected that contestants arrive at 'UVB' from the channel name, ####POVAROVOSOLNECHNOGORSKRUSSIA
351 * The former transmitter[27] was located near Povarovo, Russia[28] at 56°5′0″N 37°6′37″E which is about halfway between Zelenograd and Solnechnogorsk and 40 kilometres (25 mi) northwest of Moscow, near the village of Lozhki.
355 * The is.gd link points to a file that has the "No Q" image from a previous level hidden in it.
358 * The "RUTJJGNXUNTY" decrypts to [AaronHSwartz](https://en.wikipedia.org/wiki/Aaron_Swartz)
361 * The answer: **####AaronHSwartz**
371 * Clue: _HKGJSUOJVRLGSBELAUHOUIGLVRURWMGTUGJGWTKN_
374 * Originally this channel (####AaronHSwartz) was suppose to be the winner's circle, however due to too many people leaking answers and channel names, one more challenge was added.
377 * Same cipher as before, this time the keys were 'DEMAND' and 'PROGRESS'
380 * [_Demand Progress_](http://www.demandprogress.org/) is an Internet activist-related organization specializing in petitions to help gain traction for legal movements against Internet censorship and related subjects, started by Aaron Swartz, [source](https://en.wikipedia.org/wiki/Demand_Progress).
383 * The clue decrypts to JOINUSNOWANDSHARETHESOFTWAREWRITTENBYRMS
386 * RMS is [Richard Matthew Stallman](https://en.wikipedia.org/wiki/Richard_Stallman), and [_'Join Us Now and Share the Software'_](https://www.gnu.org/music/free-software-song.html) is an openly licensed song by Richard Stallman.
389 * The answer: **####JOINUSNOWANDSHARETHESOFTWAREWRITTENBYRMS**
399 The topic in ####JOINUSNOWANDSHARETHESOFTWAREWRITTENBYRMS was: _Congratulations on solving the freenode's April Fools 2014 Crypto Challenge | Want MOAR? #ircpuzzles_
402 Congratulations to those who participated this year!
408 The 25 additional people that completed the challenge:
415 * 2014-04-05T04:06:53 knivey
418 * 2014-04-05T10:00:12 Tordek
421 * 2014-04-05T15:40:50 jacob1 *
424 * 2014-04-05T15:48:48 stac
427 * 2014-04-05T16:24:01 Changaco *
430 * 2014-04-05T17:30:01 Arch-TK *
433 * 2014-04-05T17:35:05 ar *
436 * 2014-04-05T18:16:20 Weetos *
439 * 2014-04-05T18:38:39 nyuszika7h
442 * 2014-04-05T18:56:26 vi[NLR]
445 * 2014-04-05T19:06:38 tkd *
448 * 2014-04-05T21:54:56 Chiyo
451 * 2014-04-05T22:46:01 slidercrank
454 * 2014-04-05T22:54:10 jojoa1997
457 * 2014-04-06T00:55:51 Pixelz *
460 * 2014-04-06T02:53:25 Transfusion
463 * 2014-04-06T02:58:15 DonkeyHotei
466 * 2014-04-06T03:04:01 sdamashek *
469 * 2014-04-06T03:07:49 Cypi *
472 * 2014-04-06T03:36:03 FXOR
475 * 2014-04-06T13:44:35 pad
478 * 2014-04-06T19:22:06 skasturi
481 * 2014-04-06T19:37:13 Bloodhound
484 * 2014-04-07T08:16:22 molly *
487 * 2014-04-07T14:42:32 Bijan-E
492 _(*) user opted out of the cloak lottery_