Handmade Encryption Challenge 95
Pike writes: "Amateur cryptographers may wish to get out their pens, calculators and scratch paper to take a shot at this short encryption challenge. Solve it, get a $25 gift certificate from thinkgeek. It's pretty hard though, so good luck." But since this isn't wartime, there is at least the stub of the plaintext to check against.
Slash Dotted at the moment (Score:1)
I'd like to get a look at the problem, but it looks like it will have to wait for an hour until the site recovers from being slash-dotted.
An encryption method that can actually be encoded by hand isn't too terribly useful in this day and age of hundred plus bit encryption. Any code complex enough to actually hold up to computer analysis is likely to take too long to generate with pen and paper to do any good. However, it might be possible to change some of the word in a message ("4or" for "for", "l8" for "late", etc, or even word substitution), before using an encoding scheme to make an attempt to break by computer useless. Interesting problem.
Re:Break this code... (Score:1)
since it's /.ed at the moment (Score:5)
In conjunction with geeky.org, here is JIPW's first cryptographic challenge; probably the last. I actually doubt anyone will be able to solve this, barring visitors from the NSA. In fact, if you can solve it and be the first to send an email to contest@geeky.org with the full decrypted message, I'll give you a $25 gift certificate at thinkgeek.com, and a good dose of general recognition and fame on this site of course.
For a discussion about this and other crypto puzzles, see the story on geeky.org.
Getting you started
If the Amish did cryptography, this is what it would look like; nothing was used to create this code but a pen and spiral-bound notebook. No computer tricks or supremely advanced algorithms. It is very tricky however. Here are a few parameters and guidelines:
The plaintext is hidden in the encoded section below begins with "the message is" (without quotes). This allows you to know when you've solved the puzzle.
The ciphertext begins and ends with clearly defined markers which are not part of the ciphertext. The rest of this page and this website provide no clue to the solution.
If by some miracle you do it, send an email to contest@geeky.org with the full decrypted message in it.
It's really hard. Harder than it looks. Be warned.
-----CIPHERTEXT BEGIN-----
From: The House at Outspar Ave
[image]
"Sirs and Ladies, we regret to explain by means of our seven couriers, commissioned in the fall of the thirteenth year ago how that our chicken house, killing its quixotic jouster -- in fact the boxer and jouster combined -- has made us reexamine our feelings on the ghastly meanings and other sundry implications. Now that the hedonistic quantities and kilometers of really red staple studded tracks have been and will be made subject to judicial committees and kin, they will probably seek to march the crooked gaffers out of hill country. To us, regulations are all much too far from common people. For example, killjoy laws about jousters counteract the will of the vulgar people. The key to special gun enhanced treatment tells some undisciplined underlings where to go and who understands. Should we let the puny minority override the nation? If not, undulate. Research for hairiness is no priority. As for us (yes, sounds zany), most won't gulp these incredible sacks of stuff many of the lawyers decided to let print in sans-serif. On the jelly front, the Olson brand that aspirates in very damp conditions was yanked because of kryptonite concerns. The notice that was on it was quizzical. If they quit, I say every big Crimean fool or other wag should have bitten their own can. They nixed our yew nativity, in spite of Geneva."
-----CIPHERTEXT END-----
There you have it. Expect to see updates to this page as participation warrants.
- JD
Re:Goin' Commercial (Score:1)
Seriously, though. I'd agree that it's just another kick in the teeth every time Slashdot slips a little more in the commercial realm. I guess if they're not even going to pretend to be unbiased, I can deal with it. Still, it feels like we're watching a sell-out in progress, and it's sad.
----
For more hand cipher amusement, check out Mirdek (Score:2)
--
Whoops, wrong URL (Score:2)
--
Re:Possible ideas regarding how it works (Score:1)
astro uiuc edu.
There's another fellow who rot13s his address as well as having a word to subtract, that one is a little trickier.
Wrong definition of code (Score:1)
With the mapping:
bird = bomb
cat = house
The phrase:
put the bird in the house
has been encoded rather than enciphered, but the difference lies in the fact that the key is a pattern less mapping instead of a system that's applied.
If you took a sentence, and replaced each word with its antonym you'd have a subsititution cipher rather than a code, even those your units are words.
A mono-alphabetic substibution cipher w/ a "patternless" mapping (ex: not shift, etc.) is both code and cipher.
i just solved it! (Score:2)
Buy more Ovaltine
The image (Score:1)
Anyone? Know their heraldic terms? How about alt.heraldry (IIRC)?
Droit devant soi on ne peut pas aller bien loin...
Re:The image (Score:1)
I'm not an expert, but I'll give a try based on what little I know. Someone who knows this stuff a lot better than me is sure to come along and correct it. Here goes anyway.
Purpure, chief sable, bend azure, molet or at middle chief, square or at sinister chief, arrowheads argent dexter and sinister.
Note, molet is a cadency specifying the third son of the family, but it is usually a 5 pointed star. So possibly, replace "molet" with "star of David". And this isn't really my forte anyway. Oh well. It's a start.
Re:The image (Score:1)
Purple field
chief sable,
A black bar at the top of the crest.
bend azure
A diagonal bar (bend) from top left to bottom right in blue.
molet or
A star of cadencey (indicating that the third son of the family carries the shield) in gold. (a molet is usually a five-pointed star, though)
at middle chief
At the top of the shield, in the center.
square or at sinister chief
A square, in gold, at the top left of the shield (as seen by the person carrying the shield.)
arrowheads argent dexter and sinister
Arrowhead insignia in silver on both left and right sides.
See? Not that hard. (Not that correct, either). Some info can be found at this link, [geocities.com] provided it isn't mangled by the slashdot daemons.
What about the Poe encryption challenge? (Score:1)
Re:Goin' Commercial (Score:1)
Re:Hmmm... (Score:1)
That's not funny. I know.. but it's still +4 funny. If you don't like the joke, look at it this way - the really amusing thing is that the moderators thought it was funny.
Hmmm... (Score:2)
Re:since it's /.ed at the moment (Score:1)
"From: The House at Outspar Ave"
crypto or not?
I would assume yes.. but you never know
Re:hrmm Just one question.... (Score:1)
So far as using a book as your key... I'd think that wouldn't be the wisest decision... A book is hardly random data. Not that I could break your code, or write a program that could, but i'm sure if it was at all important enough that someone with the resources wanted to figure out what you were talking about, they could.
I solved it! (Score:2)
"The message is not here."
That's great steganography if I've ever seen it!
Re:Search for a browser that can print from memory (Score:1)
Not really comparable... (Score:1)
Yes. (Score:1)
If it's a fully reusable effect not involving one-time pads, then observing several messages would probable clue people in on the general nature of the encryption.
Now, if you will accept that fact, then allowing any crypto person in the world scrutinize the method and pass comment could lead to greater strength for the algo...
So in theory, an open development model can help in crypto, past a certain point. Look at various public key encryption systems on the market now: As best as is known from massive scrutiny, they are still impossible to break outside of brute force. Yet their inner workings are hardly a secret...they are strong for reasons other than obscurity.
You did ask...
Re:Missed the point, people. (Score:1)
This is the only reason it was never broken. Had it been written out and transmitted in morse code, as most machine ciphers were, it would have been broken very quickly. The nature of spoken navajo as being very alien to the japanese language was the only thing preventing them from interpreting it. Add to that the fact that it was spoken in high-stress combat situations by men who were probably trying to take cover while yelling responses into a radio, and you can see why the japanese never broke it.
In point of fact, the US navy used one-time pads for all of it's critically secret transmissions. These are provably unbreakable. They are however, inconvenient. Machine ciphers were used for less critical communication.
Code-talkers were used because rapid communication was required. It had nothing to do with the security of the navajo tongue. This is a misconception that is largely the fault of the semi-illiterate hacks at the X-Files.
No! (Score:2)
Pope
Freedom is Slavery! Ignorance is Strength! Monopolies offer Choice!
Stego'd. (Score:3)
My guess is is that it's stego'd into the jpg image. Hmm, maybe not, that'd require a bit more than pen and notebook unless one was really a glutton for punishment. So it's likely in the text. But $25 isn't enough to persuade me to spend much more time on it.
Re:An Poc ar Buile (Score:1)
Whining Moron BS. (Score:1)
So my town was on the news the other day because of a law passed saying cats have to be on leashes. The news in Philadelphia runs a story about it, and interviews this woman with one nasty blacktooth who has about 20 cats. The point? For some reason it is inevitable that the idiots will have the loudest mouth. That is also evident here, where we find people pointing out such "obvious commercialism" as somebody COMPLETELY INDEPENDENT of Andover.net and Slashdot getting their news posted because they ran a contest and were nice enough to buy a $25 gift certificate from Thinkgeek. You really think timothy gave a rats-posterior about the fact Thinkgeek was in there? If you do, I have a great e-mail where Bill Gates will give you money for forwarding it along. Seriously. It works.
Point is, why don't you people who constantly criticize Slashdot and it's authors create your own site, post your own news, and get your own userbase. Then, when you've done that, you can whine about whatever you wish.
Later,
-Jeff
So where are... (Score:3)
Re:Not really comparable... (Score:1)
That actually depends. If the system of encryption creates a "group", a mathematical structure which is closed under the encryption operation, then for all keys k_i, where E(k_i,P) denotes encryption of P using the key k_i:
E(k_j,E(k_i,P)) = E(k_m,P)
for some k_m in the keyspace. Encrypting twice is just like encrypting with some third key. Some ciphers are not groups (although showing one is not a group is a non-trivial task), including DES. That's why triple DES is more secure than standard DES. None of the ciphers mentioned by the first poster have increased security under multiple encryption. Vigenere multiple times with different keys is just Vigenere with another key. Hill involves multiplying matrices against plaintext vectors, and decryption involves multiplying by their inverses, and that means A*B*C*D*p is just M*p for some matrix M which is the product of our 4 keys, so multiple encryption with Hill doesn't help either, since finding M^-1 is no harder than finding A^-1 alone, or B^-1 alone, etc. Permutations are groups, so multiple encryption doesn't help there either. I'm not entirely sure that chaining several together as suggested might not help though, even though individually multiple encryptions by any of the three schemes is useless. Would somebody with more mathematical background care to comment on whether making the encryptions within a single system non adjacent in the chain? i.e. is V(H(P(H(V(p))))) more secure than V(V(H(H(P(p))))) which we know is definitely no better than V(H(P(p)))?
--
One time pad (Score:1)
--
"take the red pill and you stay in wonderland and I'll show you how deep the rabitt hole goes"
An Poc ar Buile (Score:4)
Re:Stego'd. (Score:3)
Don't assume my friend, you can't post a web page without a computer either.
That image is easily drawn on a piece of paper. I have a feeling that the image and it's caption are very much involved.
Of course they could be there to throw you off the track...
Here's a start: (Score:2)
If I had more time, I'd proceed on the theory that the passage is just full of really bad puns based on the words' phonetic sounds.
Re:Not really comparable... (Score:1)
Re:Stego'd. (Score:2)
Furthermore, the sentences have correct (or close to correct) grammatical structure. So there's a constraint on how you form the sentences... More than just first or second order random selection of words would suggest...
let's assume that the image itself is not involved, because you couldn't create a jpeg image without a computer.
As someone has already pointed out though, while it's always harder to decrypt something where the algorithm is unknown, a real cypher challenge would release the algorithm as well, and see whether the attacker can either decode the message without the key, or guess/derive the key from the message and any other known quantities (ie. plaintext fragments etc)...
Image caption (Score:1)
An and ar are common in gaelic languages, typically being an article (ie, "the"), a preposition ("in") or a pronoun of some sort, depending on the language. Buile means "frenzy" in Irish, but I could not find poc in Irish, although I did find pog, which means "kiss". An Old Irish form of pog is poc.
In Scots Gaelic, poc means "put into the pocket," according to the online dictionary I used. I could not find buile in Scots Gaelic, though. My best guess is that the caption is in a form of Irish Gaelic. Possible translations I can come up with from the meanings of the individual words are:
None of these appear to make much sense, but they don't have to make sense. Of course, this could be a deception meant to lead me off track.
Re:hrmm (Score:1)
Re:Search for a browser that can print from memory (Score:1)
Re:hrmm (Score:3)
Now I'm really curious to see if anyone figures this out, because if no one does, it would mean that (gasp!) criminals still have easy ways of communicating securely over the net without using government-restricted encryption techniques. On the other hand, I've made it tough enough that I'll be really surprised if anyone solves it.
I might even jack up the reward if this survives an attack by the slashdot crowd...
-JD
Re:So where are... (Score:3)
-JD
Re:Missed the point, people. (Score:5)
On a side note, it's kind of funny to see people saying "I'd never do this for a mere $25". I know people who solve puzzles like this in the newspaper with absolutely no incentive. I figured the prize and the (relatively) small recognition would just be frosting on the cake.
-JD
Re:An Poc ar Buile (Score:1)
Seems more than a coincidence..
I would have solved it ... (Score:1)
An Poc Ar Buile (Score:1)
For some real ciphers/codes/puzzles... (Score:3)
BTW- These puzzles were actually solved (by multiple independant groups) in just a few days. Too bad all the old ones aren't still online.
Re:Not really comparable... (Score:1)
Not at all true. You would be considered very skilled if you could, say, recover the plaintext of a message encrypted with 128-bit keyed Blowfish given only the ciphertext. You know the algorithm, but it's still a major challenge.
Of course it is not _required_ that one know the algorithm in order to test skillz. Especially attacking a cipher which can be implemented by hand. Though there are do-it-by-hand ciphers which would be quite hard to crack - for instance encrypting with Vigenere, Hill, Permutation, Hill, Vignere [all with different keys] would be a major challenge. Though also very slow.
Re:hrmm (Score:1)
OK, say you're using this in some country like China. Do you really think the cops are not going to come knock on your door and take you away, just because you've been using a paper-and-pencil cipher and not 3DES? Yeah, right. If they can't break it, they'll come get it out of you personally. "Secure communication" and "not government restricted" are diametrcally opposite in such countries, no matter what method is used.
And if you're not in such a crappy country, you have easy access to SSH, PGP/GnuPG, OpenSSL (well except the US because of the damned RSA patent), S/MIME clients, etc, etc. Not to mention the dozens of crypto libraries floating around. So there is no reason to use such a slow and relativley insecure method.
Re:hrmm (Score:1)
Well then you don't want crypto, you want stego. Different (though related).
Re:Not really comparable... (Score:1)
Yes, but if you use the ciphers in the order I suggested, they don't commute. Unless I'm doing something stupid (BTW, yes, I do know something about crypto, I'm just finishing up a 300 level crypto class and a 400 level crypto class this semester). Matrix multiplication, permuations, and xor should not commute with each other under most circumstances, however. Consider this:
Lets say we choose a set of keys for the ciphers and then encrypt the plaintext x. Specifically, we choose the keys for the Vignere ciphers to be the same (call then K1). Remember V_K(V_K(x)) == x (I'm using the xor version of Vignere here), and that the keys for the Hill and Permuation ciphers stay the same.
Then choose another set of Vignere keys (again equal to each other), and encrypt x again (I'm encrypting copies of x, not the first x again). Call these keys K2.
However: Each ciphertext letter of a Hill cipher depends on several letters of the plaintext. Since V_K1(x) != V_K2(x), and we don't change the keys for the Hill ciphers, H(V_K1(x)) != H(V_K2(x)). By extending this we see that H(P(H(V_K1(x)))) != H(P(H(V_K2(x)))).
This last step is not mathematically correct (in the sense that I can't prove it): it's just intuition. However, it seems highly unlikely that H(P(H(V_K2(x))) would change in such a way that
V_K1(H(P(H(V_K1(x))))) is equal to V_K2(H(P(H(V_K2(x))))) [most of the time, anyway], due to the avalanch cause by changing the key in the first step (the first Vignere cipher), and the subsequent Hill and Permuation ciphers.
So [assuming you agree that my last step sounds reasonable], we see that V(H(P(H(V(x))))) is more secure than V(V(H(H(P(x))))) in at least this one special case (there are other I can think of too). I can't think of a general case proof right at the moment, and anyway I have a Calc III final in 2 hours that I really need to study for.
Re:Search for a browser that can print from memory (Score:1)
Perhaps that because IE5 is light years ahead of Netscape 4.7 in every conceivable way, except for the lack of OS compatibility. And since AOL does not care about that *right now*, they have to choose the superior browser. The Mozilla project will change that, and rumor (not to mention logic) has it the next version of AOL will be be based on Netscape 6, and an upcoming set-top box will be based on Linux.
-rt-
Re:since it's /.ed at the moment (Score:2)
right, then an six-pointed star on a row below
that. Then there are two arrows facing left,
a big "\" bar, and two arrows facing right.
Let's see if this comes across
(square)
(star)
\ (left-pointing arrow)
\ (left-pointing arrow)
\
(right-pointing arrow)
(right-pointing arrow)
I'm thinking there may be some element of
"read two rows right-to-left, then two rows
left-to-right".
Or maybe not.
Re:Not really comparable... (Score:2)
Re:hrmm Just one question.... (Score:1)
For example if the shapes in the picture above the text were a key to the letters needed to find the message. That would only be secure if no one else could find out how you encrypted your message.
Still it's a nice challange thanks.
Re:Hmmm... (Score:1)
Re:hrmm Just one question.... (Score:1)
You can come close enough by encrypting with almost random data, but then it's more a question of "how good is your pseudo random generator", rather than "how good is one time pad".
One more note - with one time pad, the key length is identical to the plaintext length, making it a not very strong encryption in terms of key length/encryption strength ratios. Nothing close to DES/3DES/Blowfish/Serpent etc.
In fact, it is so weak that if the key length is very short (say, square root of the plaintext, which is still very long), an english text is vulneruble to cyphertext only attacks (which are much less likely with DES, even if you don't use CBC).
Shachar.
Break this code... (Score:1)
Thad
Re:some thoughts (Score:1)
This is by no means the kind of crypto the /. audience is interested in,
Wow, am I glad that there's finally someone who can speak for the entire slashdot audience. Because, as we all know, we're all exactly the same kind of person, and all of us have the same opinion of everything.
Re:Possible ideas regarding how it works (Score:1)
To email me, subtract my nick from my email address, starting with the second character. (hint: adto.uiuc.edu is wrong)
Dude, you should give US$ 25,00 to the guy who discover your e-mail address.
--
hrmm (Score:2)
Re:Huh ?!? (Score:1)
The good thing is that there are many other vegetarian sources for gelatin, such as agar agar.
Re:So where are... (Score:2)
If you don't understand cryptography, don't mouth off!
Re:An Poc ar Buile (Score:1)
Celtic?? WTF is Celtic? Furrfu! It looks like Irish Gaelic, which is a celtic (for various values of celtic) language, but there's no such language as 'celtic'.
Possible ideas regarding how it works (Score:2)
On the other hand, they may be employing steganography, and or some algorithim in which every Nth character/letter is skipped. If I was really interested in solving this, a perl script that could analyze all possible skipping patterns would probably be my first attempt. But neither fame nor $25 bucks at ThinkGeek are enough motivation to zorch my finals. Good luck to the rest of you.
Re:since it's /.ed at the moment (Score:1)
Re:Missed the point, people. (Score:1)
Re:Goin' Commercial (Score:1)
Trolls for $0.99! Everything must go!
Re:So where are... (Score:1)
Re:Missed the point, people. (Score:1)
(My use of Linux being another side effect of hideous optimism.)
Missed the point, people. (Score:4)
Slashdot's posting of the token prize is irrelevant. $25 will not make or break Andover. They obviously thought it was a neat little challenge to anyone who is interested in such mind games, and having a prize is nice but unnecessary. Okay, now that's done. Real post follows:
It seems to me that the point "Joel" is trying to get across is that even today in the age of high encryption, and old fashioned handwritten code can be quite useful. Remember the "code-talkers" of World War II. The risk of the Allies having their codes broken was too great. Their were encryption schemes (Enigma, anyone, even though it was the enemy's), but since the fate of much of the world was at stake, an ingenious plan was created. They used members of the Navaho tribe to develop a secret, unbreakable code.
This step away from the technological methods of the day proved to be not only as secure as existing technologies, but it was never broken. The technological way may currently be the easiest, but their is always room for ingenuity.
One last example: have you ever been talking to a friend and understood each other perfectly, but nobody around had any idea what it all meant? All the script kiddies in all the world might not figure that one out (but you might want to mix technology and old-fashioned ingenuity, considering you might have the NSA, corporations, script kiddies, your old girlfriend, three lawyers, and Metallica after your communications).
If this post is redundant by the time it shows up, you have my apologies. I just figured I'd think first and post later. No offense, anyone, okay?
Re:hrmm Just one question.... (Score:1)
then when you want to email someone something secret, just xor each char of your plaintext with each char of the file you gave them, and voila... an effectively random stream, that even brute force would have trouble with...for instance if you made sure the first 99% of your message was junk in the first place, so even a successful decrypt looked like rubbish.
Re:The image (Score:1)
This must be what my friends hear when I'm talking code. Not a clue what you're talking about here, I had no idea there was so much to heraldry, I'm gonna have to check this out.
Actually a few more samples would be better (Score:1)
But there are weak algorithms which are difficult to crack if you have only one sample and not told what the algorithm is.
Even I could come up with an algorithm that's uncrackable with only a single sample.
In effect it's similar to the case of a one time pad - except that it's more of a one time algorithm. If you use a different algorithm for each kilobyte, people are going to have serious difficulty cracking your stuff.
In order for a proper evaluation/examination there should be more samples and the algorithm should be provided as well.
Cheerio,
Link.
Re:Huh ?!? (Score:1)
Re:What about the Poe encryption challenge? (Score:1)
Ciao
Re:An Poc ar Buile (Score:2)
An Puc ar Buille (translated by R. Kavana and T. Woods)
As I set out for Dromore town,
Pike in hand to go a-workin',
Who did I meet on the hillside
But a tan puck goat stone mad for scrappin'.
He chased me through the hedges and ditches
Around the bog in frenzied runnin',
But when his horns got caught up in in gorse
I leapt on his back despite his buckin'.
There were no rocks nor gaps between
He didn't jump, the puc ar buille,
And me hanging on to save me life
When he jumped clean of the Faille Brice
The garda sergeant at Rochestown
Called all his forces to surround us,
But the goat stuck both horns suas his thoin,
And gobbled up his brand new trousers.
In Dingle town the next afternoon,
The parish priest addressed the meeting
And swore it was the Devil himself
He'd seen riding on the puc ar buille.
Craking the code. (Score:1)
Re:One time pad (Score:1)
Re:Missed the point, people. (Score:1)
Re:An Poc ar Buile (Score:1)
Ar mo ghabháil dom siar chun Droichead Uí Mhórdha, and
Ag gabháil dom sior chun Droichead Uí Mhóradha.
are the first lines of the song according to Here [indigo.ie] and here. [www.ucc.ie]
It seems odd that the song name would be put in there as the rest of the text of the message seems to be words chosen randomly (Probably for their letters, not their meaning).
Currently I'm guessing that the image is something you have to cut out and then after aligning the text properly and running the cut-out over the page and putting the yellow square over a certain letter then the arrows will point to 4 letters of the message. Something just needs to determine the alignment of the text.
Or something to that effect....
Possible solution using Babelfish decryption (Score:2)
some thoughts (Score:2)
Moreover, if the message is not something like "this is the message aeroigb ekrgjlk jpojp jpojerjgkrj rjpgorjij ...", the encryption method is even more useless, since it in some way must be related to the message been send, as obviously takes more things into account than what characters/symbols are included in the message.
This is by no means the kind of crypto the /. audience is interested in, and I doubt this $25-to-solve-a-close-to-impossible-crypto-contest belongs anywhere at all but on some kind of puzzel-page.
That said, I should make clear that I understand that the author did not intend to make this the new RSA, and that some /.ers may find this kind of stuff interesting.
But then again, wednesday just happens to be my whining day of the week.
Re:Search for a browser that can print from memory (Score:2)
Does anyone else find it amusing that AOL owns Netscape yet uses IE in their software? Or that the U.S. govt is the largest customer of Microsoft?
Re:since it's /.ed at the moment (Score:2)
I'm going to work on this for 8 more hours, but the thing I want to comment on is that from what I've done alone, I can say that this message did *not* require a word database to cypher. By using simple rules (not that they are being used) such as, "vowels negate all leading consenants within a cypher word" (just for example), you would turn sentences into groups of cyphered consenants which need only vowels between them.
That way, you could add quite a bit of wording to the cypher'd message which would be easily skipped over (knowing the rules) when decrypting. Any sentence, if you have rules to allow you to increase its cyphered size can be made to sound legitimate, the problem is you will end up with a message 4 times as large.
I think that's what's being done here, if you look at, "From: The House at Outspar Ave", you can already see there are more letters than there are within, "The message is". The annoying part of it is, is that the sentence backwards is the perfect amount of letters in the first 3 words.
I'm going insane. I apologize to everyone who does not follow.
Anyone here ever write messages down the left hand side of there high-school essays, a guy I knew used to write "Catholics Smell" down his margin in every essay. He was an A+ student.
Re:since it's /.ed at the moment (Score:1)
But yeah, that picture probably has something to do with it. Probably tells the recipient what he needs to do to decode it.
Dyolf Knip
Re:some thoughts (Score:1)
Brett
Sick Basterd! (Score:1)
Re:Possible ideas regarding how it works (Score:1)
"spare the lachrymosity when the fulminations have inveighed"
Re:Possible ideas regarding how it works (Score:1)
"spare the lachrymosity when the fulminations have inveighed"
Re:Hmmm... (Score:1)
Re:Hmmm... (Score:2)
> I know.. but it's still +4 funny. If you
> don't like the joke, look at it this way -
> the really amusing thing is that the
> moderators thought it was funny.
So it's meta-funny: we laugh at the people who laugh at the joke. Reminds me of Beavis and Butthead...
Hmmm (Score:1)
probably not.
Re:Search for a browser that can print from memory (Score:1)
Re:So where are... (Score:1)
Re:Search for a browser that can print from memory (Score:2)
Re:since it's /.ed at the moment (Score:1)