A global internet puzzle that requires advanced computer skills to solve has reopened online.
It is the third year running that the mysterious Cicada 3301 has appeared, with no clues as to who is behind the puzzle.
Some believe it is a recruitment process for a government spy agency, while others believe it could be the work of a bank.
The puzzle takes people on a treasure trail around the so-called dark net.
This year’s competition was announced via a Twitter account to which was attached an image file with the following message: “Hello. Epiphany is upon you. Your pilgrimage has begun. Enlightenment awaits. Good luck. 3301.”
Thousands of fans have been drawn into the competition and have eagerly awaited its relaunch.
This year’s iteration already appears to be fiendishly difficult, requiring understanding of OutGuess, a complex steganography tool.
Steganography hides data inside images, and is often used for nefarious purposes by terrorists and paedophiles.Anglo-Saxon runes
Computer scientist Prof Alan Woodward is one of those who has previously taken part in the competition.
“The puzzles are very complicated and require knowledge of steganography, cryptography as well as obscure existential texts,” he told the BBC.
Previous competitions have taken people on both a mental and physical journey, encompassing cyber-punk literature, Anglo-Saxon runes and the work of occultist and magician Aleister Crowley.
Last year, part of the treasure trail also required people to travel to physical locations to decode QR codes posted on telegraph poles dotted around the US.
Now that the competition is widely known about there has been a spate of fakes but for those with the necessary knowledge it is easy to spot the real thing.
“The group uses a PGP signature and put up a key signed with this,” explained Prof Woodward.
Speculation about who is behind the puzzle has been gaining momentum as the competition attracts more publicity.
“It could be a criminal organisation looking for recruits or it could be a start-up looking to set up a new crypto-currency, possibly even a bank,” said Prof Woodward.
“Lots of people think it could be a government agency and that looks reasonably likely as whoever is being recruited isn’t telling anybody afterwards,” he added.
The Latest on: Steganography
via Google News
The Latest on: Steganography
- Cryptology, cryptography, and cryptanalysison January 28, 2020 at 4:00 pm
There are a bunch of other terms like steganography, homophones, polyphones, digraphs, bigrams, and polygrams, but they are just variations of coding and decoding techniques. Cryptology, the study of ...
- Cheating AI Caught Hiding Data Using Steganographyon January 28, 2020 at 4:00 pm
AI today is like a super fast kid going through school whose teachers need to be smarter than if not as quick. In an astonishing turn of events, a (satelite)image-to-(map)image conversion ...
- Shakespeare In A Zip In A RAR, Hidden In An Image On Twitteron January 14, 2020 at 4:00 pm
Steganography involves hiding data in something else — for example, encoding data in a picture. [David Buchanan] used polyglot files not to hide data, but to send a large amount of data in a sin ...
- Attackers Invent New Evasion Techniques to Conceal Web Skimmer Activityon January 6, 2020 at 9:26 am
As reported by Malwarebytes, a security researcher disclosed the first publicly documented payment card web skimmer to ever use steganography on Dec. 26, 2019. They found that the skimmer used ...
- New Magecart skimmers practice steganography, data transfer via WebSocketon January 3, 2020 at 4:06 pm
A researcher has discovered a pair of new Magecart-style web skimmers, each one featuring an evasion technique that’s not typically employed by this breed of malware: steganography and the transfer a ...
- How To Hide Data in Images Using Pythonon December 29, 2019 at 5:45 am
Steganography is the art of hiding secret data in any file. The secret data can be data of any format like text or even a file. In a nutshell, the main motive of steganography is to hide the ...
- Hide Secret Files in Office 2007 Documentson December 19, 2019 at 4:00 pm
We've featured some of our favorite steganography tricks before, but if you don't feel like downloading extra software or diving into the command line, here's an easy way to hide more sensitive ...
- New cryptomining malware uses WAV audio files to conceal its trackson October 17, 2019 at 4:02 am
This technique of obfuscating malicious code in plain sight — a method called steganography — was uncovered by BlackBerry’s cybersecurity subsidiary Cylance. “When played, some of the WAV ...
- Steganography meets VoIP in hacker worldon September 13, 2019 at 5:00 pm
Techniques that fall under the category of VoIP steganography have been discussed in academic circles for a few years, but now more chatter is coming from the hacker community about creating easy ...
- Introduction to Steganographyon March 19, 2019 at 5:10 pm
Security is a big issue in today's world. The world today has completely or mostly started working on computers. Computer stores data which can be vital information in the form of electronic files.
via Bing News