Survivalist Pro
Photo by Digital Buggu Pexels Logo Photo: Digital Buggu

What is the hardest code ever?

Let's get cracking with a countdown of some of the world's most difficult and amusing codes and ciphers. Australia's Somerton Man. ... The MIT Cryptographic 'Time-Lock' Puzzle - LCS35. ... Dorabella Cipher. ... The Voynich Manuscript. ... The Code Book. ... Kryptos at the CIA HQ. ... Zodiac Killer. ... The Beale Papers. ‍ More items...

What's the 5 second rule game?
What's the 5 second rule game?

5 second rule is a fast, funny, family board game based on a series of videos from Ellen Degeneres. It's a party game very similar to 30 seconds....

Read More »
What is sniper weakness?
What is sniper weakness?

Sniper doesn't have an inbuilt escape mechanism, which is his only weakness. Mar 8, 2021

Read More »

To be a master cryptanalyst like the legendary Abe Sinkov and Alan Turing you’ll need to sharpen your skills. Let’s get cracking with a countdown of some of the world's most difficult and amusing codes and ciphers.

10. Sherlock Holmes: The Dancing Men Cipher

Hint: Look for single-letter words and count the number of times each symbol appears. Also, keep an eye out for apostrophes or repeated letter patterns.

9. China's Yuan Dynasty Coin Inscriptions

An award has been offered for help with China's puzzling coins

Chinese numismatists are baffled by six centuries-old Indian coins discovered in Hunan province in the 1960s - so much so, they offered a $1,500 reward to anyone who can decipher the inscriptions and shed light on the etchings. The coins were found inside a small, glazed pot which arrived at Jinshi City's museum in the 1980s. The front of the coins are believed to bear the name of a king, written in a rare form of Arabic, but archeologists are puzzled about the etchings on the back of the coins. Hint: The coins were manufactured in the Delhi Sultanate, the main Muslim sultanate in northern India, around the late 13th century during China's Yuan dynasty.

‍Solution: You’ll need to discover the solution to claim the prize money.

8. Australia’s Somerton Man

Somerton Man is an Australian murder mystery with a cryptic twist

Australia is so obsessed with Somerton Man the authorities exhumed his body in 2021. The well-dressed man was found on an Adelaide beach, slumped against a seawall in 1948. He carried no ID. His clothing labels were removed. His pocket held a ripped piece of paper - torn from a poetry book, the Rubaiyat of Omar Khayyam - with the Persian words Tamam Shud, which means ‘it is finished’. The book itself revealed another clue: a handwritten message or code that has never been deciphered. The coroner suspected Somerton Man was poisoned but couldn’t be certain. Australia hopes DNA tests will finally reveal his identity and cause of death but what about the code?

Hints: There are no hints, just a few curious coincidences. The code was written in the Rubaiyat of Omar Khayyam, a poetry book that was not found at the crime scene. John Freeman, a chemist, later handed the book over to the police. Its pages also revealed a phone number for Jessie Thomson, a nurse who claimed she did not know Somerton Man.

Is it legal to jailbreak?
Is it legal to jailbreak?

FAQ. Is jailbreaking legal? Jailbreaking is legal in the US thanks to an exemption in the Digital Millennium Copyright Act for smartphones,...

Read More »
What is most useful to a homeless person?
What is most useful to a homeless person?

What Do People Experiencing Homelessness Need Most Besides Shelter? Socks. Living on the street, many unsheltered people rarely take their shoes...

Read More »

‍Solution: Unsolved.

‍‍

7. The MIT Cryptographic ‘Time-Lock’ Puzzle - LCS35

Ron Rivest's MIT puzzle is inspired by his algorithm

Ron Rivest, co-inventor of the RSA algorithm - an asymmetric cryptography algorithm for encrypting online communications - devised a ‘time-lock’ puzzle in 1999. Rivest estimated it would take 35 years to solve but Bernard Fabrot, a self-taught Belgian programmer, came up with the solution 15 years early. Rivest's problem is this: compute 2^(2^t) (mod n) for specified values of t and n. Hint: The puzzle is an example of a verifiable delay function, which means the answer can only be solved after a certain number of steps. It uses the ideas described in the paper Time-lock puzzles and timed-release Crypto.

Solution: You will find a description of the solution here.

6. Dorabella Cipher

Edward Elgar sent notes in code to the daughter of a British vicar Edward Elgar, the composer of the Enigma Variations, wrote coded notes to Dora Penny in the late 1800s. She was the daughter of a British vicar and 17 years his junior. If the correspondence was an expression of love, however, his deepest desires were lost on Dora. She never did decipher the contents. Mark Pitt, a member of Cleveland Police's specialist operations unit, later claimed he cracked the code using a revolving cipher and a musical cipher but hasn’t revealed the answer. Hint: The cipher appears to be made up of 24 symbols, each symbol consisting of 1, 2, or 3 approximate semicircles oriented in one of eight directions. Solution: Pitt believes the cipher is a romantic note and he is writing a book on the topic.

What will happen if I leave sugar for a month?
What will happen if I leave sugar for a month?

Reducing added sugar intake can encourage weight loss and improve various aspects of your health, including your blood sugar levels and heart,...

Read More »
Do they get condoms on Survivor?
Do they get condoms on Survivor?

Using protection. According to Koth, who premiered on the series early on in the Amazon, one of the medical pack necessities is condoms. While it...

Read More »

5. The Voynich Manuscript

Some think the Voynich code may not be genuine

Cryptographers still haven’t been able to crack the Voynich code, leading some to believe it may be a hoax. Yale University Press released the first authorized copy of the mysterious, centuries-old puzzle in 2015. The original, illustrated manuscript, believed to date back to the 14th century, is handwritten in a script unrelated to European languages. The alphabet has up to 28 characters, used without punctuation throughout the text. Hint: There is strong evidence that many of the book's bifolios were reordered at various points in its history.

Solution: Unsolved.

4. The Code Book

The Code Book contains 10 challenges

A team of Swedish computer buffs fought off thousands of rivals in 2000 to crack what was billed as the toughest code challenge ever set. The Swedes took the equivalent of 70 years of computer time to decipher 10 codes ranging from ancient Greece ciphers to a German WWII Enigma code laid out in Simon Singh’s The Code Book. The book also discusses the Man in the Iron Mask, Arabic cryptography, Charles Babbage, and public-key cryptography. The Swedish team was awarded £10,000 ($13,600).

Hint: Pace yourself. It took the Swedes more than a year to resolve the 10 puzzles.

Solution: You will find the solutions here.

Who has the best military history?
Who has the best military history?

According to historian Niall Ferguson, France is the most successful military power in history. It participated in 50 of the 125 major European...

Read More »
What do low income families eat?
What do low income families eat?

Low income is associated with a poor quality dietary intake [1, 2]. Compared to those with higher income, lower income individuals consume fewer...

Read More »
Where do people go to the bathroom on naked and afraid?
Where do people go to the bathroom on naked and afraid?

For those people who want to know, you 'go' where you feel comfortable. "Some people from my season only went T2 on the land and would never go in...

Read More »
How does fat leave the body?
How does fat leave the body?

The triglycerides release fat as carbon dioxide and water atoms during fat metabolism or oxidation. In other words, fat leaves the body as carbon...

Read More »