Space Pirate Science

Technomaner Puzzles and Traps
Some Examples have been provided.

Technomancer Ruins are often secured with Traps and Puzzles that must be solved or traversed to proceed. These obstacles are modeled after the principle of the Four Tests. The Four Tests are as follows: The Test of Pattern, The Test of Disorder, The Test of Evasion, and The Test of Confrontation.

The Test of Pattern requires the observer to examine and analyze for patterns before he acts, with the understanding that many patterns are subtle or hidden.

The Test of Disorder requires the observer to proceed systematically when no pattern is perceived. When the observer recognizes that many things must be done, and in no specific order; the procedure is to perceive and order all the things to be done, and, upon doing a thing, to recall how and when that thing has been done. For example, the observer must remember the initial position of a thing, and also the new position of that thing.

The Test of Evasion requires the observer to examine the obstacle, and compare his resources and abilities; if the obstacle is too difficult, seek for a path around the difficulty.

The Test of Confrontation requires the observer to examine the obstacle, and compare his resources and abilities; if the obstacle is too difficult, look for a path around the difficulty… but if no path around can be found, confront the obstacle directly.
_______________________________________________________________

Technomancer Ruins: The Laser Lock Puzzle.

Type: Test of Pattern.

Description: An obstacle such as a door or barrier blocks the way. There is a system of colored lasers along with multiple colored lenses that are connected to it. Both the lasers and lenses are Red, Green, and Blue. There are buttons between the lenses.

Solution: This is a color matching puzzle. The lasers must be connected to the other side of the system forming a circuit. You must strike the buttons between the lenses with something to rotate them so that the colors of them match the colors of the beams that touch them. This means you must line them up with the appropriate colored lasers so that they can pass though them to the other side.
_______________________________________________________________

Technomancer Ruins: Rotating Floor Puzzle.

Type: Test of Disorder.

Description: At the center of this large circular room is an artifact. The artifact is protected by a forcefield which blocks access to it. This barrier is connected to the floor which appears to be a chaotic mess of abstract disconnected lines. There are four control modules in the room that are different colors.

Solution: This is a bit tricky since this puzzle can disorient people in the room when attempting to solve it. The floor is divided into multiple concentric rings that can rotate. These rings are connected to the four control modules. Each one rotates the floor rings according to some specific rules. More then one module can control the same ring and they can rotate them in a clockwise or counter clockwise direction. To solve the puzzle and remove the forcefield, you must figure out the rules each control module moves the floor by and align the rings so that the lines connect to each other forming a pattern. However anyone standing on the floor will move with the floor when it rotates.
_______________________________________________________________

Technomancer Ruins: The Watery Hallway.

Type: Test of Confrontation.

Description: A long hallway stands before you. The floor is a deep pit filled with water. Metal barred gates extend from the ceiling to the water. The sides of the pit have some odd array of objects. The floor is covered in solid gold lines. You can see what looks like a long platform under the water. There is a control panel on the wall that might be connected to it and the gates.

Solution: What you see under the water is a mechanical bridge. This can be raised so that you can cross the pit safely. The gates prevent you from flying or levitating across the pit but don’t even think of trying to swim under them. The arrays of objects that line the pit walls are sensors connected to the purification systems. Any organic matter that is spotted in the pit will send a powerful stream of electricity though the water. To cross to the other side you must figure out how to work the control panel to raise the bridge. This will also raise the gates allowing you to cross.
_______________________________________________________________

Technomancer Ruins: The Laser Grid Room.

Type: Test of Evasion.

Description: You finally reach the Data Vaults. The ancient computers are still fully intact and functional after all of these years. The floor of the room is made of lit up tiles. A disabled control panel is on the wall next to the entrance.

Solution: The floor is connected to the security systems and is pressure sensitive. The slightest increase in weight will trigger a Laser Grid to sweep across the room and burn anyone who touches it to a crisp. Since the control panel that can deactivate the floor is disabled, you must access the computers without touching the floor or allowing anything to fall on it. This can be done by flying or levitation.
_______________________________________________________________

View
REVISED Azerothian Operations Document
Latest version as of now.

Here is the latest version of this document.

TOP SECRET SCI EYES ONLY
Azerothian Joint Operations Command (AJOC)
Overview of all operational resources
NO-DIST, NO-FORN

List of Active Facilities on Planet Azeroth >>

Sector Zero: GM Island and Others
Space Pirate Arzerothian Operations Command HQ >> SPAOC
Azerothian Hacker Underground Central HQ >> AHU
Public Test Realm Joint Operations Research Facility >> PTR Facility
S7DII/AJOC Section N44E >> (Basically the Guantanamo Bay of the Planet Azeroth)
S7DII Numbers Station GM Island
Joint Operations Numbers Station GM Island
Programmers Isle Code Monkey R&D Facility
Azerothian Central Intelligence Department >> ACID
Telecomix Azeroth Central HQ
Anonymous Azeroth Central HQ
Azerothian Joint Operations Command Central HQ >> AJOC-0
AHU People’s Liberation Front Central HQ >> AHUPLF

Sector 1: Azeroth
Anonymous Azeroth Intelligence Agency
Temple of Cryptographia
Telecomix Azeroth Numbers Station
Telecomix Azeroth WeRebuild
Azerothian Joint Operations Command HQ >> AJOC
AHU People’s Liberation Front Main Operating Base

Sector 2: Kingdoms of Kalimdor
Kalimdor Joint Operations Command Center >> Kalimdor Facility
AHU Numbers Station Sennon
Sennon Fortress AHU Black Site >> Sennon
WAR10CK’s Lair Primary Location
World Of Warcaft Aerospace Defence Command >> WORAD
AHU People’s Liberation Front Kalimdor Installation

Sector 3: Outland
Space Pirate Science Team Special RESTRICTED Area No. 52 >> Area 52
Storm Spire Research Institute >> SRI
Alliance Medical Research Institute for Infectious Diseases >> AMRIID
Azerothian Research Institute for Alchemical Science >> ARIAS
National Data Administration Primary Data Center
Azerothian Centers for Disease Control HQ >> ACDC
Anonymous Azeroth Numbers Station Outland

Sector 4: Northrend
Aperture Science Azerothian Enrichment Center
ACID Numbers Station Ice Crown Citadel
SkyTown Joint Operations Bureau of Surveillance Research and Exposure >> SkyTown
Space Pirate Science Team Phazon Leviathan Seed Research Facility >> Leviathan Facility
Space Pirate Azerothian Research Facility >> SPARF >> RELOCATED DUE TO AREA 52 EXPANSION.
Scarlet Monastery AHU Black Site >> The Tomb
National Data Administration Off Site Secure Data Center
AHU People’s Liberation Front Northrend Installation
AHU People’s Liberation Front Northrend Forward Operating Base

Sector 5: Malstorm
Space Pirate Geothermal Clean Energy Facility

Sector 6: Pandaria
Azerothian Hacker Underground Pandarian Headquarters >> Pandarian Headquarters
WAR10CK’s Lair Undisclosed Secure Location
National Data Administration Data Haven Facility
Telecomix Azeroth Crypto Munitions Bureau
Telecomix Azeroth News Agency
SPAOC Numbers Station Pandaria
AHUPLF Numbers Station Pandaria

Sector 7: Azerothian Space
AJOC Moon Base Alpha-1 >> Under Construction
AJOC Night Star Space Colony >> Under Construction

Offsite: NeverEndlessWoW
AJOC Azerothian Department of Defense HQ >> The Hexagon
______________________________________________________________________

Cipherspace Darknet Stats for Planet Azeroth >>

Protocols in use:
The Onion Router (Tor)
Invisible Internet Project (I2P)
AnonNet
ShadowWalker >> Being Tested
Drac >> Being Tested
Hordes >> Being Deployed

Cipherspace Darknet Nodes:
Number of active Planetary AnonNet Nodes: 36,000
Number of active Planetary Tor Nodes: 20,087
Number of active Planetary I2P Nodes: 17,576
Number of active Planetary Horde Nodes: 512
Number of active Planetary Drac Nodes: 128
Numner of active Planetary ShadowWalker Nodes: 256

Cipherspace Darknet Sites:
Number of active Planetary AnonNet .anon Sites: 22,576
Number of active Planetary Tor Hidden Service .onion Sites: 16,542
Number of active Planetary I2P .i2p eepsites: 13,564

Current Cipherspace Authentication: Telecomix Azeroth Root Certificate CA: Telecomix Azeroth Crypto Munitions Bureau.

Current DNS Server ISP: TCMB (Telecomix Crypto Munitions Bureau) DNS
______________________________________________________________________

Mission Critical Websites >>

Sektor 7: azeroth.sektorseven.org, .anon
WeRebuild Azeroth Wiki: werebuild.azeroth.nerr, .anon
Telecomix Azeroth Crypto Munitions Bureau Wiki: cryptoanarchy.azeroth.nerr, .anon
SkyTown Joint Operations Bureau of Surveillance Research and Exposure: bluecabinet.azeroth.nerr, .anon
Telecomix Azeroth News Agency: interfax.azeroth.nerr, .anon
BHU/AHU Public Free Web Hosting Service Battle.Hax: name.battle.hax, .anon ex. kommandos.battle.hax
Azerothipedia Dramatica: azerothipediadramatica.azeroth.nerr, .battle.hax, .anon
Par:AnoIA: par-anoia.azeroth.nerr, .anon
Wikileaks Azeroth: wikileaks.azeroth.nerr, .battle.hax, .anon
Telecomix Azeroth: telecomix.azeroth.nerr, .anon
Anonymous Azeroth: anonops.azeroth.nerr, .battle.hax, .anon
Intellipedia Azeroth: AJOCIntellipedia.azeroth.anon (Often filled with Edit Wars, Vandalism, POV, BLANKING IN PROGRESS, and other Wiki Related Drama because the people from Anonymous Azeroth who are cleared for access to the wiki are so immature… The classified area of wiki has plenty of drama but the Unclassified area… we are thinking about renaming it to Intellipedia Dramatica.)
_______________________________________________________________________

Mission Critical IRC Channels >> GET ON IRC FGT

IRC Server URLs >>
irc.battle.hax, .anon
irc.sektorseven.org, .nerr, .anon
irc.wtfux.nerr, .anon
irc.anonnet.nerr, .anon
irc.telecomixAz.nerr, .anon

Ports: 2600, 1337
Encryption: Digital Fortress SSL RSA: 16384
Logging: Secured NDA Data Haven Facility

Channels >>
#TelecomixAzIRC
#WikileaksAzIRC
#AnonOpsAzIRC
#AHUhaxIRC
#adIRC
#par-anoiaAzIRC
#WeRebuildAzIRC
#tcmbAzIRC
#BlueCabinetAzIRC

Numbers Relay Pages >>
NumbersBin >> NumbersBin API, OTR, No IP Logs, TCMB-Numbers-Web-Station >> numbersbin.azeroth.anon, .nerr, .battle.hax
AnonNumbers >> ZeroBin PHP Software, OTR, No IP Logs
TheNumbersStation >> DoxBin API, OTR, No IP Logs
TorNumbers >> DoxBin API with .onion domain, OTR, No IP Logs
I2Numbers >> DoxBin API with .i2p eepsite domain, OTR, No IP Logs
PasteNumbers >> ZeroBin PHP Software, OTR, No IP Logs
Telecomix Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR, No IP Logs
Cryptoanarchy Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR. No IP Logs
______________________________________________________________________

Telecomix Azeroth TCMB Erebus Numbers Station Stats >>

Erebus Numbers Stations Approved Ciphers >>
OTP-MODE1: ROT-X
OTP-MODE2: VIGENERE S-BOX
OTP-MODE3: NUMBERS
OTP-MODE4: TCMB-MFSK-1337 CYPHER (Digitrx RDFT Analogue Transmission of binary data)
OTP-MODE5: ROT-NUMBERS
OTP-MODE6: TCMB-CYPHER-XPA1337 (Polytone Analogue Transmission of binary data)

Station Terminal Specs >>
OS: Telecomix Cipher Operating System wth Telecomix Cipher Secure Linux Kernel
CPU: Kahos Krypto Processor with embedded dual Kahos QRNGs
Keygen: Dual Kahos Quantum Random Number Generators (QRNGs)
Key Management: Marutukku RAM File System
Crypto: TCMB-CYPHER Cryptosystem
Network: TCMB-Erebus Secured Lines

Active Erebus Numbers Stations on Planet Azeroth >>
STATION NAME: The Torture Chamber TCMB Erebus 1
OPERATORS: Azerothian Hacker Underground AHU
LOCATION: Sennon Fortress, Sector 2 Kalimdor
CALL SIGN: Sound of man being tortured by Ynen followed by Yankee, November, Echo, November
FREQUENCY: 13375 kHz
~~~
STATION NAME: Ing Hive TCMB Erebus 2
OPERATORS: Anonymous Azeroth
LOCATION: Area 52, Sector 3 Outland
CALL SIGN: Screeches of Warrior Ing followed by Delta, Romeo, Alpha, Yankee, Kilo, Echo
FREQUENCY: 16475 kHz
~~~
STATION NAME: White Room TCMB Erebus 3
OPERATORS: Sektor 7 Department of Intelligence & Information S7DII
LOCATION: GM Island, Sector Zero
CALL SIGN: SSTV image of white room followed by Zulu, Echo, Echo
FREQUENCY: 5422 kHz
~~~
STATION NAME: Frostmourne TCMB Erebus 4
OPERATORS: Azerothian Central Intelligence Department ACID
LOCATION: Ice Crown Citadel, Sector 4 Northrend
CALL SIGN: Frostmourne curse text followed by Juliet, Alpha, Zulu, Mike, Yankee, November
FREQUENCY: 10426 kHz
~~~
STATION NAME: Chozo Station TCMB Erebus 5
OPERATORS: Telecomix Azeroth
LOCATION: Temple of Cryptographia, Sector 1 Azeroth
CALL SIGN: Chozo language recital of station name followed by Alpha, Zulu, Oscar, Romeo, India
FREQUENCY: 6900 kHz
~~~
STATION NAME: Azerothian Music Station TCMB Erebus 6
OPERATORS: Space Pirate Azerothian Operations Command SPAOC
LOCATION: AHU Pandarian Headquarters, Sector 6 Pandaria
CALL SIGN: Continually plays Azerothian music and then numbers on a schedule. Sierra, Alpha, November, Golf, Uniform, India, November, Echo plays before the numbers
FREQUENCY: 15682 kHz
~~~
STATION NAME: Erebus 7 TCMB Erebus 7
OPERATORS: AHU/Joint Operations (Backup Station)
LOCATION: GM Island, Sector Zero
CALL SIGN: CHARLIE ONE EREBUS X2 followed by Bravo, Alpha, Zulu
FREQUENCY: 3133.7 kHz
~~~
STATION NAME: Patriot Broadcasting Station TCMB Erebus 8
OPERATORS: AHU People’s Liberation Front
LOCATION: Undisclosed Location, Sector 6 Pandaria
CALL SIGN: Some random military song followed by Delta, Romeo, Alpha, Kilo
FREQUENCY: 1337 mHz

Active TCMB Numbers Web Stations >>
Voice of Northrend
Panda Free Radio
The Havenshire Poacher


AHU Media Channels with Dynamic Anti Jamming Technology >>
Covert Encrypted Pirate Mirror Channels are also active in case of technical problems.

TV: (Both HD Analogue and Digital via Satellite Grid, Unencrypted and DRM Free)
Hack The Planet Channel
Telecomix Azeroth News Agency

Pirate TV Satellite Service: Hack The Planet TV Azeroth (Part of the Hack The Universe TV: Intergalactic Pirate Satellite TV Network)
Subscription is a one time payment for the hardware dish receiver with DVR and multimedia and networked device playback plus all other Sat TV features. After that, service is FREE! Content is encrypted but DRM Free. Rip away. Donations accepted.

Radio: (Shortwave HF and Satellite channels Excludes Numbers Stations)
Hack The Planet Radio
Voice of Azeroth
Telecomix Azeroth Interfax
Free Azeroth Radio
_____________________________________________________________________

Civil Defence and DEFCON Systems >>

Defense Condition (DEFCON):
DEFCON 5 >> Peace
DEFCON 4
DEFCON 3
DEFCON 2
DEFCON 1 >> WAR!

Threat Level (THREAT-CON)
RED 5 EPSILON >> PANIC!
ORANGE 4 OMEGA
YELLOW 3 GAMMA
BLUE 2 BETA
GREEN 1 ALPHA >> SAFE

Emergency Broadcast System (EBS)

View
Azerothian Operations Document
Very Detailed

If anyone on here is currently doing a World of Warcraft based Campaign or is planning on doing one, then I have this document I would like to share with you. This is a outline of the settings in my WoW based stories on another site. Feel free to use just give me some credit plz.

TOP SECRET SCI EYES ONLY
Azerothian Joint Operations Command AJOC
Overview of Operations Resources
NO-DIST NO-FORN INTERNAL USE ONLY

List of Active Facilities on Planet Azeroth >>

Sector Zero: GM Island and Others
Space Pirate Arzerothian Operations Command HQ >> SPAOC
Azerothian Hacker Underground Central HQ >> AHU
Public Test Realm Joint Operations Research Facility >> PTR Facility
S7DII/AJOC Section N44E >> (Basically the Guantanamo Bay of the Planet Azeroth)
S7DII Numbers Station GM Island
Joint Operations Numbers Station GM Island
Programmers Isle Code Monkey R&D Facility
Azerothian Central Intelligence Department >> ACID
Telecomix Azeroth Central HQ
Anonymous Azeroth Central HQ
Azerothian Joint Operations Command Central HQ >> AJOC-0
AHU People’s Liberation Front Central HQ >> AHUPLF

Sector 1: Azeroth
Anonymous Azeroth Intelligence Agency
Temple of Cryptographia
Telecomix Azeroth Numbers Station
Telecomix Azeroth WeRebuild
Azerothian Joint Operations Command HQ >> AJOC
AHU People’s Liberation Front Main Operating Base

Sector 2: Kingdoms of Kalimdor
Kalimdor Joint Operations Command Center >> Kalimdor Facility
AHU Numbers Station Sennon
Sennon Fortress AHU Black Site >> Sennon
WAR10CK’s Lair Primary Location
World Of Warcaft Aerospace Defence Command >> WORAD
AHU People’s Liberation Front Kalimdor Installation

Sector 3: Outland
Space Pirate Science Team Special RESTRICTED Area No. 52 >> Area 52
Space Pirate Azerothian Research Facility >> SPARF
Storm Spire Research Institute >> SRI
Alliance Medical Research Institute for Infectious Diseases >> AMRIID
Azerothian Research Institute for Alchemical Science >> ARIAS
National Data Administration Primary Data Center
Azerothian Centers for Disease Control HQ >> ACDC
Anonymous Azeroth Numbers Station Outland

Sector 4: Northrend
Aperture Science Azerothian Enrichment Center
ACID Numbers Station Ice Crown Citadel
SkyTown Joint Operations Bureau of Surveillance Research and Exposure >> SkyTown
Space Pirate Science Team Phazon Leviathan Seed Research Facility >> Leviathan Facility
Scarlet Monastery AHU Black Site >> The Tomb
National Data Administration Off Site Secure Data Center
AHU People’s Liberation Front Northrend Installation
AHU People’s Liberation Front Northrend Forward Operating Base

Sector 5: Malstorm
Space Pirate Geothermal Clean Energy Facility

Sector 6: Pandaria
Azerothian Hacker Underground Pandarian Headquarters >> Pandarian Headquarters
WAR10CK’s Lair Undisclosed Secure Location
National Data Administration Data Haven Facility
Telecomix Azeroth Crypto Munitions Bureau
Telecomix Azeroth News Agency
SPAOC Numbers Station Pandaria
AHUPLF Numbers Station Pandaria

Sector 7: Azerothian Space
AJOC Moon Base Alpha-1 >> Under Construction
AJOC Night Star Space Colony >> Under Construction

Offsite: NeverEndlessWoW
AJOC Azerothian Department of Defense HQ >> The Hexagon
______________________________________________________________________

Cipherspace Darknet Stats for Planet Azeroth >>

Protocols in use:
The Onion Router (Tor)
Invisible Internet Project (I2P)
AnonNet
ShadowWalker >> Being Tested
Drac >> Being Tested
Hordes >> Being Deployed

Cipherspace Darknet Nodes:
Number of active Planetary AnonNet Nodes: 36,000
Number of active Planetary Tor Nodes: 20,087
Number of active Planetary I2P Nodes: 17,576
Number of active Planetary Horde Nodes: 512
Number of active Planetary Drac Nodes: 128
Numner of active Planetary ShadowWalker Nodes: 256

Cipherspace Darknet Sites:
Number of active Planetary AnonNet .anon Sites: 22,576
Number of active Planetary Tor Hidden Service .onion Sites: 16,542
Number of active Planetary I2P .i2p eepsites: 13,564

Current Cipherspace Authentication: Telecomix Azeroth Root Certificate CA: Telecomix Azeroth Crypto Munitions Bureau.

Current DNS Server ISP: TCMB (Telecomix Crypto Munitions Bureau) DNS
______________________________________________________________________

Mission Critical Websites >>

Sektor 7: azeroth.sektorseven.org, .anon
WeRebuild Azeroth Wiki: werebuild.azeroth.nerr, .anon
Telecomix Azeroth Crypto Munitions Bureau Wiki: cryptoanarchy.azeroth.nerr, .anon
SkyTown Joint Operations Bureau of Surveillance Research and Exposure: bluecabinet.azeroth.nerr, .anon
Telecomix Azeroth News Agency: interfax.azeroth.nerr, .anon
BHU/AHU Public Free Web Hosting Service Battle.Hax: name.battle.hax, .anon ex. kommandos.battle.hax
Azerothipedia Dramatica: azerothipediadramatica.azeroth.nerr, .battle.hax, .anon
Par:AnoIA: par-anoia.azeroth.nerr, .anon
Wikileaks Azeroth: wikileaks.azeroth.nerr, .battle.hax, .anon
Telecomix Azeroth: telecomix.azeroth.nerr, .anon
Anonymous Azeroth: anonops.azeroth.nerr, .battle.hax, .anon
Intellipedia Azeroth: AJOCIntellipedia.azeroth.anon (Often filled with Edit Wars, Vandalism, POV, BLANKING IN PROGRESS, and other Wiki Related Drama because the people from Anonymous Azeroth who are cleared for access to the wiki are so immature… The classified area of wiki has plenty of drama but the Unclassified area… we are thinking about renaming it to Intellipedia Dramatica.)
_______________________________________________________________________

Mission Critical IRC Channels >> GET ON IRC FGT

IRC Server URLs >>
irc.battle.hax, .anon
irc.sektorseven.org, .nerr, .anon
irc.wtfux.nerr, .anon
irc.anonnet.nerr, .anon
irc.telecomixAz.nerr, .anon

Ports: 2600, 1337
Encryption: Digital Fortress SSL RSA: 16384
Logging: Secured NDA Data Haven Facility

Channels >>
#TelecomixAzIRC
#WikileaksAzIRC
#AnonOpsAzIRC
#AHUhaxIRC
#adIRC
#par-anoiaAzIRC
#WeRebuildAzIRC
#tcmbAzIRC
#BlueCabinetAzIRC

Numbers Relay Pages >>
NumbersBin >> NumbersBin API, OTR, No IP Logs, TCMB-Numbers-Web-Station >> numbersbin.azeroth.anon, .nerr, .battle.hax
AnonNumbers >> ZeroBin PHP Software, OTR, No IP Logs
TheNumbersStation >> DoxBin API, OTR, No IP Logs
TorNumbers >> DoxBin API with .onion domain, OTR, No IP Logs
I2Numbers >> DoxBin API with .i2p eepsite domain, OTR, No IP Logs
PasteNumbers >> ZeroBin PHP Software, OTR, No IP Logs
Telecomix Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR, No IP Logs
Cryptoanarchy Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR. No IP Logs
______________________________________________________________________

Telecomix Azeroth TCMB Erebus Numbers Station Stats >>

Erebus Numbers Stations Approved Ciphers >>
OTP-MODE1: ROT-X
OTP-MODE2: VIGENERE S-BOX
OTP-MODE3: NUMBERS
OTP-MODE4: TCMB-MFSK-1337 CYPHER
OTP-MODE5: ROT-NUMBERS

Station Terminal Specs >>
OS: Telecomix Cipher Operating System
CPU: Data Dyne Cryptographically Secure Processor with embedded dual QRNGs
Keygen: Dual Quantum Random Number Generators (QRNGs)
Key Management: Marutukku RAM File System
Crypto: TCMB-CYPHER Cryptosystem
Network: TCMB-Erebus Secured Lines

Active Erebus Numbers Stations on Planet Azeroth >>
STATION NAME: The Torture Chamber TCMB Erebus 1
OPERATORS: Azerothian Hacker Underground AHU
LOCATION: Sennon Fortress, Sector 2 Kalimdor
CALL SIGN: Sound of man being tortured by Ynen followed by Yankee, November, Echo, November
FREQUENCY: 13375 kHz
~~~
STATION NAME: Ing Hive TCMB Erebus 2
OPERATORS: Anonymous Azeroth
LOCATION: Area 52, Sector 3 Outland
CALL SIGN: Screeches of Warrior Ing followed by Delta, Romeo, Alpha, Yankee, Kilo, Echo
FREQUENCY: 16475 kHz
~~~
STATION NAME: White Room TCMB Erebus 3
OPERATORS: Sektor 7 Department of Intelligence & Information S7DII
LOCATION: GM Island, Sector Zero
CALL SIGN: SSTV image of white room followed by Zulu, Echo, Echo
FREQUENCY: 5422 kHz
~~~
STATION NAME: Frostmourne TCMB Erebus 4
OPERATORS: Azerothian Central Intelligence Department ACID
LOCATION: Ice Crown Citadel, Sector 4 Northrend
CALL SIGN: Frostmourne curse text followed by Juliet, Alpha, Zulu, Mike, Yankee, November
FREQUENCY: 10426 kHz
~~~
STATION NAME: Chozo Station TCMB Erebus 5
OPERATORS: Telecomix Azeroth
LOCATION: Temple of Cryptographia, Sector 1 Azeroth
CALL SIGN: Chozo language recital of station name followed by Alpha, Zulu, Oscar, Romeo, India
FREQUENCY: 6900 kHz
~~~
STATION NAME: Azerothian Music Station TCMB Erebus 6
OPERATORS: Space Pirate Azerothian Operations Command SPAOC
LOCATION: AHU Pandarian Headquarters, Sector 6 Pandaria
CALL SIGN: Continually plays Azerothian music and then numbers on a schedule. Sierra, Alpha, November, Golf, Uniform, India, November, Echo plays before the numbers
FREQUENCY: 15682 kHz
~~~
STATION NAME: Erebus 7 TCMB Erebus 7
OPERATORS: AHU/Joint Operations (Backup Station)
LOCATION: GM Island, Sector Zero
CALL SIGN: CHARLIE ONE EREBUS X2 followed by Bravo, Alpha, Zulu
FREQUENCY: 3133.7 kHz
~~~
STATION NAME: Patriot Broadcasting Station TCMB Erebus 8
OPERATORS: AHU People’s Liberation Front
LOCATION: Undisclosed Location, Sector 6 Pandaria
CALL SIGN: Some random military song followed by Delta, Romeo, Alpha, Kilo
FREQUENCY: 1337 mHz

Active TCMB Numbers Web Stations >>
Voice of Northrend
Panda Free Radio
The Havenshire Poacher


AHU Media Channels with Dynamic Anti Jamming Technology >>
Covert Encrypted Pirate Mirror Channels are also active in case of technical problems.

TV: (Both HD Analogue and Digital via Satellite Grid, Unencrypted and DRM Free)
Hack The Planet Channel
Telecomix Azeroth News Agency

Pirate TV Satellite Service: Hack The Planet TV Azeroth (Part of the Hack The Universe TV: Intergalactic Pirate Satellite TV Network)
Subscription is a one time payment for the hardware dish receiver with DVR and multimedia and networked device playback plus all other Sat TV features. After that, service is FREE! Content is encrypted but DRM Free. Rip away.

Radio: (Shortwave HF and Satellite channels Excludes Numbers Stations)
Hack The Planet Radio
Voice of Azeroth
Telecomix Azeroth Interfax
Free Azeroth Radio
_____________________________________________________________________

Civil Defence and DEFCON Systems >>

Defense Condition (DEFCON):
DEFCON 5 >> Peace
DEFCON 4
DEFCON 3
DEFCON 2
DEFCON 1 >> WAR!

Threat Level (THREAT-CON)
RED 5 EPSILON >> PANIC!
ORANGE 4 OMEGA
YELLOW 3 GAMMA
BLUE 2 BETA
GREEN 1 ALPHA >> SAFE

Emergency Broadcast System (EBS)

View
NUMBERS STATION Revised
0096 2251 2001 8105 1211

I have revised the Numbers Station Document to include Numbers Relay Pages and some of my own fictional Numbers Relay Pages too.

TOP SECRET SCI EYES ONLY
Telecomix Intergalactic
Telecomix Crypto Munitions Bureau Erebus Network Project

The Telecomix Crypto Munitions Bureau under the order of Cipher Cat has deployed the Erebus Project. The Erebus Project is a series of covert Numbers Stations that are scattered across the land in a complex network of terminals utilizing the highly classified TCMB CYPHER Crypto System.

This network of covert shortwave radio stations is connected to a central network of closed loop Erebus Network Lines that cannot be tapped into and are totally hack proof and magically shielded. But they also have satellite comm lines too as a back up. These secure lines are used to send the messages to be broadcasted out to each station. They are also used to send the random seed values generated by the Cryptographically Secure Pseudo Random Number Generator (CSPRNG) in each terminal in the event of a Cypher Compromise. These lines are encrypted with a special Crypto System called Cyber Saber.

This open source tiny algorithm is able to be forged into your own personal crypto algorithm. Darken Rahl forged the Cyber Saber that is used in the Erebus Lines. He wrote a special One-Time Pad based Stream Cipher that uses special One-Time Key Files consisting of random binary data generated with a processor that has dual Quantum Random Number Generators (QRNGs) built into the die itself. QRNGs use the unpredictability of photons to generate truly random sequences of numbers. These are not Pseudo-Random in anyway.

These Key Files are used encrypt and decrypt the messages sent across the lines. After a message or seed value is sent to a station, the Key Files are securely erased and changed automatically by the system. The Key Files themselves are stored in tamper proof secured cryptographic modules and cannot be accessed by the users or any unauthorized hardware and software. There are Anti-Magic Components in these chips which will vaporize them if they come in contact with any form of magical energy. The Key Files will self destruct if the chip is tampered with in anyway.

Each Station uses the One-Time Pad in order to remain perfectly secure. Unlike the QRNGs used to generate the Key Files, the CYPHER Crypto System uses CSPRNGs to generate the Cyphers. However, the random seed vales used to feed the CSPRNGs do use QRNGs to ensure that the seed values are unpredictable. These seed values are then sent via the Erebus Lines to all the other stations to ensure that we don’t have to issue pads unique to each station.

The Original CYPHER Crypto System was cracked on Middle Earth due to a Zero Day Exploit that we had no idea even existed. The Erebus Lines were not compromised themselves.

Each Cypher has a unique identifier called the Key Fingerprint. This identifies exactly what the Cypher File is in use. It is generated by encrypting the Random Seed Value and then sending it across the Erebus Lines as a Ciphered Message Authentication Code (CMAC). It used a special Block Cipher called the Telecomix Encryption Standard (TES) however it was operating in Electronic Code Book (ECB) Mode. This is a very insecure mode and not to mention it used 128 bit keys which is not really secure now a days. Because of this weak encryption scheme it was possible to extract the Random Seed from the Key Fingerprint. Once you have the Seed you can create an exact clone of the Cypher File. Also the CSPRNG was compromised too due to it being a software based RNG.

An example of this is shown below.

Key Fingerprint: 0×1D078D43544145770D2FF055F1D6598A3761D972
CSPRNG Value: 0xF2BE1FC7B6EF1463057C0CB658AF88CC

As a result we updated the CYPHER Crypto System to include two other input values. But first we changed the system to use the terminal’s built in Dual QRNGs to generate the Random Seed Value and use that Seed to create an Initialization Vector (IV) for the new TCMB Polymorphic Mutating Block Cipher which is a fork of the Digital Fortress Polymorphic Mutating Encryption Algorithm. This is a cipher that operates on Cipher Block Chaining (CBC) Mode by default. This one uses a Polymorphic Engine with a QRNG to enhance the Rotating Cleartext Function. Then the operator enters a User Defined Key to further scramble the Random Seed Value and the IV. Finally all of this is used to generate the Key Fingerprint.

An example of the new system is shown below.

Key Fingerprint: 0×371B62A0CBB78CBACE936E0D5674E550C517ED5E
QRNG Value: 0×86937C774E6C11874008DE6C784B9BF0
IV: 0×85D6E58A46C3ED59F2B7F9A39865A618
User Defined Key: 0×7438DA33EBE97E9782299FAC29D6DC22

Each terminal uses the Telecomix Cipher Operating System with the Marutukku Cryptographically Secure and Deniable File System. To ensure that the keys are not compromised, the Marutukku File System has been modified to become a RAM File System. If the station is compromised and the power is cut off or the computers are damaged, the files are wiped from the system because of the fact that RAM is wiped every time the computer is powered off.

To begin a broadcast, first you input a series of randomly assigned numbers that are converted into HEX values to begin the initialization process of the Cypher. This will determine the values for a iteration of the Cypher. There are multiple iterations for each Cypher File. The core of this system lie in a series of blocks. Cypher Blocks and Key Blocks. For each Cypher Block there are 5 Key Blocks. In total there are 8 Cypher Blocks and 40 Key Blocks.

Once the IV values are entered they are XOR’d with the pre determined QRNG values in the Cypher Blocks. The Cypher Blocks are in charge of the distribution of the values for the Key Blocks. Each Cypher block based on the current QRNG seed built in then uses a CSPRNG to distribute the keys to each Key Block. This function is used to obfuscate the distribution of the keys to ensure that no pattern appears.

Once this is done then you have your Cypher mostly completed. Now you can broadcast the numbers and the computer will handle the permutations of the Key Blocks as you broadcast the message. You will have enter the sub key values after each group is sent. The terminal utilizes biometric voice recognition software to prevent unauthorized people from broadcasting false messages.

The Cypher File can be securely downloaded and saved to an external device although is not recommended that you do this as you risk the file being compromised. If you have to save the file to another system then you should save it to a secured cryptographic device that has no network interfaces wired or wireless. One such device would be the ultra secure Iron Key USB flash drive with a built in secured secure cryptographic module and a tamper proof design. You will have to perform the permutations manually if the Cypher File is on an external device but before you can do that, you must load the Cypher File into the station terminal.

The reason you must perform the permutations manually is because of the fact that when the Cypher File is downloaded, the CYPHER Software will automatically alter the Cypher’s Hash Checksum with a flag that indicates the file was downloaded and thus possibly compromised. If this flag is detected by the computer then the distribution of the Key Blocks from the Cypher Blocks will come directly from the QRNG instead of the CSPRNG. So you will have to calculate the permutations manually.

Each person who is a Field Agent will be issued a One-Time Pad to decrypt the messages.

Officially these stations do not exist.

The other part of the Erebus Program are the Numbers Relay Pages (NRPs). These are minimalist pastebin type sites that allow people to post Numbers Messages. These sites are public and everyone with an outernet connection can enter and post a message. Everyone is free to read all the messages but only those with the correct One-Time Pad can decrypt them. IP addresses are not logged and they can be hosted on just about every computer or cloud service that is capable of web hosting. Connections are routed randomly across the outernet to avoid tracking. All you have to do is type in a username in the name field and paste your Numbers Message into the paste field and hit Send Paste. Your Numbers Message will then be sent to the server and ready to be read. Each post will look like this:

Example:

Message posted by WAR10CK on January, 01, 2014 at 5:00:32 EST

307
Number 114
Group 034

04090 03403 29286 20356 38122 33628 55375
52145 01500 99398 83458 04554 59754 96338
86434 49249 93679 64770 62798 19244 44996
19794 49378 27271 80437 14363 98605 24798
56999 85443 72665 99182 64776 49871

NOTE: You can format the Numbers Message in any way you like.

A few of the available NRP Pages recommended by Telecomix Crypto Munitions Bureau are as follows:

NumbersBin >> NumbersBin API, OTR, No IP Logs
AnonNumbers >> ZeroBin PHP Software, OTR, No IP Logs
TheNumbersStation >> DoxBin API, OTR, No IP Logs
TorNumbers >> DoxBin API with .onion domain, OTR, No IP Logs
I2Numbers >> DoxBin API with .i2p eepsite domain, OTR, No IP Logs
PasteNumbers >> ZeroBin PHP Software, OTR, No IP Logs
Telecomix Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR, No IP Logs
Cryptoanarchy Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR. No IP Logs

The best one is NumbersBin because it uses the TCMB PasteBin API maintained and developed by Telecomix Intergalactic and the TCMB. The TCMB PasteBin API is a modified PasteBin API that allows for Off The Record connections and never logs IP Addresses EVER! It also allows for the new TCMB-Numbers-Web-Station that is a Sound Cloud/Web Radio Podcasting Service. This is a new service that just exited beta that allows you to run your own Audio Numbers Station on the web as a podcast. You can transmit anything you want and use Voice, Morse Code, Polytone MFSK, and Digital Transmission sound formats. All audio sent to the service will be encoded in and or converted to the lossless .wav format. The NumbersBin Service is run by the WAR10CK. The URLs are as follows:

numbersbin.nerr
numbersbin.i2p
numbersbin.anon
numbersbins03gjsfdda.onion

Besides these intergalactic URLs, The WAR10CK has released the source code for NumbersBin. His new NumbersBin API is now ready for download at any of the NumbersBin URLs or the Source Forge page numbersbin.sourceforge.nerr

Now anyone can run their own NumbersBin service. The NumbersBin API even supports the TCMB-Numbers-Web-Station! Here are some of the following new NumbersBin services that have been created now:

numbersbin.azeroth.anon
numbersbin.rokugan.ninja
numbersbin.westeros.anon
numbersbin.ME.anon

NOTICE: NRPs are for Numbers Messages ONLY! Only Encrypted Messages and or discussions about relaying encrypted messages are allowed to be posted. This is not your own blog nor is it a pastebin that you leave your random unrelated stuff on. Anything that is not Numbers Related may be deleted!

Same with the TCMB-Numbers-Web-Station. It is not a place for you to run your own talk/squawk radio show or pirate music station. You must include Numbers Messages routinely. All audio on the station is not live and one way only. So for example, running a music station or talk show with Numbers Messages in it is ok. Streaming the Alex Jones Show with absolutely no Numbers Content is not.

A example of what this means is this: One of the regulars is the Voice of Northrend, it consists of the following:
A introduction and announcements segment, some news and entertainment segments, some Numbers Messages, some more misc content, and finally a conclusion segment.

End of line

View
NUMBERS STATIONS
0096 2251 2110 8105


Since World War II Intelligence agencies have used secret stations to send encrypted assignments to agents in the field.

Unlike digital and cellular communications, these shortwave broadcasts of encoded numbers are untraceable.

Governments deny the use of these so called Numbers Stations yet they can still be heard today.

Google the term Numbers Station and search for them on youtube. They do exist and you can actually listen to them on the radio even now.

This is essentially a way for anyone who is interested, to implement Numbers Stations into their campaign. Feel free to use, copy, and modify if needed.

TOP SECRET CRYPTO 5 SCI EYES ONLY
Cipher Cat Operations
Telecomix Crypto Munitions Bureau
Erebus Network

The Telecomix Crypto Munitions Bureau under the order of Cipher Cat has deployed the Erebus Project. The Erebus Project is a series of covert Numbers Stations that are scattered across the land in a complex network of terminals utilizing the highly classified TCMB CYPHER Crypto System.

This network of covert shortwave radio stations is connected to a central network of closed loop Erebus Network Lines that cannot be tapped into and are totally hack proof and magically shielded. But they also have satellite comm lines too as a back up. These secure lines are used to send the messages to be broadcasted out to each station. They are also used to send the random seed values generated by the Cryptographically Secure Pseudo Random Number Generator (CSPRNG) in each terminal in the event of a Cypher Compromise. These lines are encrypted with a special Crypto System called Cyber Saber.

This open source tiny algorithm is able to be forged into your own personal crypto algorithm. Darken Rahl forged the Cyber Saber that is used in the Erebus Lines. He wrote a special One-Time Pad based Stream Cipher that uses special One-Time Key Files consisting of random binary data generated with a processor that has dual Quantum Random Number Generators (QRNGs) built into the die itself. QRNGs use the unpredictability of photons to generate truly random sequences of numbers. These are not Pseudo-Random in anyway.

These Key Files are used encrypt and decrypt the messages sent across the lines. After a message or seed value is sent to a station, the Key Files are securely erased and changed automatically by the system. The Key Files themselves are stored in tamper proof secured cryptographic modules and cannot be accessed by the users or any unauthorized hardware and software. There are Anti-Magic Components in these chips which will vaporize them if they come in contact with any form of magical energy. The Key Files will self destruct if the chip is tampered with in anyway.

Each Station uses the One-Time Pad in order to remain perfectly secure. Unlike the QRNGs used to generate the Key Files, the CYPHER Crypto System uses CSPRNGs to generate the Cyphers. However, the random seed vales used to feed the CSPRNGs do use QRNGs to ensure that the seed values are unpredictable. These seed values are then sent via the Erebus Lines to all the other stations to ensure that we don’t have to issue pads unique to each station.

The Original CYPHER Crypto System was cracked on Middle Earth due to a Zero Day Exploit that we had no idea even existed. The Erebus Lines were not compromised themselves.

Each Cypher has a unique identifier called the Key Fingerprint. This identifies exactly what the Cypher File is in use. It is generated by encrypting the Random Seed Value and then sending it across the Erebus Lines as a Ciphered Message Authentication Code (CMAC). It used a special Block Cipher called the Telecomix Encryption Standard (TES) however it was operating in Electronic Code Book (ECB) Mode. This is a very insecure mode and not to mention it used 128 bit keys which is not really secure now a days. Because of this weak encryption scheme it was possible to extract the Random Seed from the Key Fingerprint. Once you have the Seed you can create an exact clone of the Cypher File. Also the CSPRNG was compromised too due to it being a software based RNG.

An example of this is shown below.

Key Fingerprint: 0×1D078D43544145770D2FF055F1D6598A3761D972
CSPRNG Value: 0xF2BE1FC7B6EF1463057C0CB658AF88CC

As a result we updated the CYPHER Crypto System to include two other input values. But first we changed the system to use the terminal’s built in Dual QRNGs to generate the Random Seed Value and use that Seed to create an Initialization Vector (IV) for the new TCMB Polymorphic Mutating Block Cipher which is a fork of the Digital Fortress Polymorphic Mutating Encryption Algorithm. This is a cipher that operates on Cipher Block Chaining (CBC) Mode by default. This one uses a Polymorphic Engine with a QRNG to enhance the Rotating Cleartext Function. Then the operator enters a User Defined Key to further scramble the Random Seed Value and the IV. Finally all of this is used to generate the Key Fingerprint.

An example of the new system is shown below.

Key Fingerprint: 0×371B62A0CBB78CBACE936E0D5674E550C517ED5E
QRNG Value: 0×86937C774E6C11874008DE6C784B9BF0
IV: 0×85D6E58A46C3ED59F2B7F9A39865A618
User Defined Key: 0×7438DA33EBE97E9782299FAC29D6DC22

Each terminal uses the Telecomix Cipher Operating System with the Marutukku Cryptographically Secure and Deniable File System. To ensure that the keys are not compromised, the Marutukku File System has been modified to become a RAM File System. If the station is compromised and the power is cut off or the computers are damaged, the files are wiped from the system because of the fact that RAM is wiped every time the computer is powered off.

To begin a broadcast, first you input a series of randomly assigned numbers that are converted into HEX values to begin the initialization process of the Cypher. This will determine the values for a iteration of the Cypher. There are multiple iterations for each Cypher File. The core of this system lie in a series of blocks. Cypher Blocks and Key Blocks. For each Cypher Block there are 5 Key Blocks. In total there are 8 Cypher Blocks and 40 Key Blocks.

One the IV values are entered they are XOR’d with the pre determined QRNG values in the Cypher Blocks. The Cypher Blocks are in charge of the distribution of the values for the Key Blocks. Each Cypher block based on the current QRNG seed built in then uses a CSPRNG to distribute the keys to each Key Block. This function is used to obfuscate the distribution of the keys to ensure that no pattern appears.

Once this is done then you have your Cypher mostly completed. Now you can broadcast the numbers and the computer will handle the permutations of the Key Blocks as you broadcast the message. You will have enter the sub key values after each group is sent.

The Cypher File can be securely downloaded and saved to an external device although is not recommended that you do this as you risk the file being compromised. If you have to save the file to another system then you should save it to a secured cryptographic device that has no network interfaces wired or wireless. One such device would be the ultra secure Iron Key USB flash drive with a built in secured secure cryptographic module and a tamper proof design. You will have to perform the permutations manually if the Cypher File is on an external device but before you can do that, you must load the Cypher File into the station terminal.

The reason you must perform the permutations manually is because of the fact that when the Cypher File is downloaded, the CYPHER Software will automatically alter the Cypher’s Hash Checksum with a flag that indicates the file was downloaded and thus possibly compromised. If this flag is detected by the computer then the distribution of the Key Blocks from the Cypher Blocks will come directly from the QRNG instead of the CSPRNG. So you will have to calculate the permutations manually.

They are all set up and will start broadcasting encrypted messages by the end of the month. Each person who is a Field Agent will be issued a One-Time Pad to decrypt the messages.

Officially these stations do not exist.

End of line

View
Middle Earth Infrastructure Status Report 07

Announcing the Middle Earth Encryption Standard

KHAZAD: A 128 bit Legacy Level Block Cipher.

Documentation and reference implementation files are ready to download at h4xx0rz.ME.nerr and SourceForge.ME.nerr

The Khazad Cipher passed our Test Vectors and Analysis Tests! Middle Earth now has its very first encryption standard! May it serve us well. This has been cleared to protect classified information up to the Top Secret SCI Level on Middle Earth Only. Just like the encrypted files on my sword drive are now using the Khazad Algorithm.

So far our enemies have not been able to break this cipher and it has been widely adapted to our systems in all cryptographic applications. We have decided to use it in various modes of operation including ECB and CBC modes.

View
Middle Earth Infrastructure Status Report 06

Today a rather curious event occurred.

Us hackers who are running the deployment of the Middle Earth IT received a 128 bit Symmetric Key Block Encryption Algorithm from an anonymous source. It uses 64 bit blocks and 128 bit keys. The Package of papers included spec documentation and source code. There was no computer disks or portable storage devices included. Just papers and that’s it.

The most interesting thing is that the Substitution or S-Box is identical to the Rjindael S-Box. Like this:

The Khazad S-box
|00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F ---|--|--|--|--|--|--|--|--|--|--|--|--|--|--|--|--| 00 |BA 54 2F 74 53 D3 D2 4D 50 AC 8D BF 70 52 9A 4C 01 |EA D5 97 D1 33 51 5B A6 DE 48 A8 99 DB 32 B7 FC 02 |E3 9E 91 9B E2 BB 41 6E A5 CB 6B 95 A1 F3 B1 02 03 |CC C4 1D 14 C3 63 DA 5D 5F DC 7D CD 7F 5A 6C 5C 04 |F7 26 FF ED E8 9D 6F 8E 19 A0 F0 89 0F 07 AF FB 05 |08 15 0D 04 01 64 DF 76 79 DD 3D 16 3F 37 6D 38 06 |B9 73 E9 35 55 71 7B 8C 72 88 F6 2A 3E 5E 27 46 07 |0C 65 68 61 03 C1 57 D6 D9 58 D8 66 D7 3A C8 3C 08 |FA 96 A7 98 EC B8 C7 AE 69 4B AB A9 67 0A 47 F2 09 |B5 22 E5 EE BE 2B 81 12 83 1B 0E 23 F5 45 21 CE 0A |49 2C F9 E6 B6 28 17 82 1A 8B FE 8A 09 C9 87 4E 0B |E1 2E E4 E0 EB 90 A4 1E 85 60 00 25 F4 F1 94 0B 0C |E7 75 EF 34 31 D4 D0 86 7E AD FD 29 30 3B 9F F8 0D |C6 13 06 05 C5 11 77 7C 7A 78 36 1C 39 59 18 56 0E |B3 B0 24 20 B2 92 A3 C0 44 62 10 B4 84 43 93 C2 0F |4A BD 8F 2D BC 9C 6A 40 CF A2 80 4F 1F CA AA 42
Unlike the Serpent S-Box which is a simply Binary S-Box this one is essentially a look up table. Here is the Serpent S-Box:

S0: 3 8 15 1 10 6 5 11 14 13 4 2 7 0 9 12
S1: 15 12 2 7 9 0 5 10 1 11 14 8 6 13 3 4
S2: 8 6 7 9 3 12 10 15 13 1 14 4 0 11 5 2
S3: 0 15 11 8 12 9 6 3 13 1 2 4 10 7 5 14
S4: 1 15 8 3 12 0 11 6 2 5 4 10 9 14 7 13
S5: 15 5 2 11 4 10 9 12 0 3 14 8 13 6 7 1
S6: 7 2 12 5 8 4 6 11 14 9 1 15 13 3 10 0
S7: 1 13 15 0 14 8 2 11 7 4 12 10 9 3 5 6

See? Big difference.

Not to mention that it is generated in a pseudo random manner and the algorithm is self
inversing unlike Rjindael. Which is very nice because this means we can integrate a CSPRNG or even a HRNG into it if used in a Secure Cryptographic Processor.

Its small size makes it compatible with even 8 bit processors. It runs very fast and uses minimal memory and CPU cycles. This makes it perfect for running them on Smart Cards that only have 8-Bit chips. This also makes it good for micro computer deployment as well.

If the party headed for Fort Knox said they could not find a finer blade, then we could not find a finer cipher.

There was no name given and the only thing that we know is that the name of this cipher is
KHAZAD. The person who delivered it has severe lacerations on his back and was in horrible shape. But there was no bleeding. It was almost as if he was mercilessly lashed with a flaming whip.

We have uploaded the algorithm to our new outernet site SourceForge.ME.nerr and are now running it through our Test Vectors. If this works them we will finally have a Middle Earth Encryption Standard or MEES for short. The most unique thing about this cipher is that it appears to work on even the oldest computers. This is a Legacy Block Cipher. Due to it being a Public Domain Algorithm and Open Source, people can create forks of them and perhaps improve key sizes. Right now we want to how it works in a CMAC mode.

This should be very interesting. As of now we are still unable to figure out who sent it or wrote it. But one of the Dwarves has an idea who our unknown cryptographer is. But he will not be allowed in our safe haven if it is who I think it is. As of now, the earthlings have not been able to crack this code despite the fact that it uses only 128 bit keys.

End of line.

View
Middle Earth Infrastructure Status Report 4
Linux FTW!

Middle Earth Infrastructure Status Report No. 04

All of the Middle Earth infrastructure has been finalized in the Elvish Sector at this stage. We are now installing the Linux OS on all terminals and computers in the facilities and teaching the Elves how to install, boot, deploy, and use Linux. They are really good at this and are catching on with minimal issues.

Credit and thanks goes to the Gnomes for developing the GNU Network Object Model Enviroment or GNOME as a Graphical User Interface.

We are amazed at the fact that they can use the Command Line Interface with ease. Their hands just fly across the keys and they have almost no need to use the GNOME Interface. Unlike other races such as Trolls, Goblins, and Orcs who can’t type commands for crap. So they rely on GNOME almost exclusively.

Our Supercomputer System known as The Wiz is being hooked up right now even as we speak. It will be using Beowolf Clustering method because it is the most well known and most popular method for Supercomputing clusters. Its parallel processing capabilities are the best in the field.

They Elves have chosen to use the Debian Distribution for its many packages. Personally Darken Rahl uses the Backtrack 5 R3 Distribution for its hacking capabilities. We are surprised that they did not decide to use Red Hat as it is the most common one out there.

The Trolls, Goblins, and Orcs all chose the Ubuntu Distribution for its ease to use obviously. This is because they are not that intelligent when it comes to technology and it is very hard for them to learn.

End of line.

View
Middle Earth Infrastructure Status Report 5
Linux FTW

Middle Earth Infrastructure Status Report No. 05

Already the people of Middle Earth are inventing new standards for computers.

The Elves have created a new file format for use in computers. The Executable and Linkable Format or ELF format is a universial executible file format compatable with most operating systems.

The Dwarves have also invented a sophisticated universal debugging data format called Debugging With Attributed Record Formats or DWARF. So far they have made improvements to the format in DWARF-3 but they expect to deploy there next version 4 after they complete the beta testing.

We now know that the wizards use Linux Distros called Sorcerer or Source Mage.

We will report more on this when we have more information.

End of line.

View
Campaign: Space Pirate Science: Extermination
Pray for the people trapped inside. Prey that they never get out.

Inside an underground Orc fortress complex the Space Pirate Science Team found deposits of raw blue Phazon a couple hundred meters under it. Taking the opportunity to use this, a large research facility was constructed adding three more levels to the complex, and the orcs already inside would make ideal test subjects. Additionally safeguards were installed in fortress levels too in order to prevent incidents from occurring.

So while the orcs were conducting their usual cruel business, unknowingly beneath their feet the Science Team is working around the clock running experiments and doing research on all sorts of different lifeforms.

One day during a Phazon infusion experiment with an Orc whip torturer, the subject broke out of its status tank and escaped. The alarms all through the dungeon while the security command center displayed in ruby red text: CONTAINMENT BREACH! BIOHAZARD WARNING!.

A scientist working in the lab where the orc was running loose called security command over the red phone. “THIS IS NOT A DRILL! SEAL THE BUILDING NO ONE IN OR OUT!” the man said over it.

At that moment, large blast resistant containment doors started sliding out of the walls throughout the entire facility, sealing off every sector one by one. The workers and scientists who try to flee become trapped behind the containment doors with no way out.

Meanwhile the orcs and other lifeforms in the other areas escape their containment units as well and feed on the people trapped inside the quarantine lockdown. Containment doors that were installed in the fortress levels begin to close and panic begins to spread throughout. Everyone in the fortress attempts to escape but are either killed in the chaos or trapped. Some are even crushed by the containment doors while struggling to get through them.

Only one person makes it out of the complex as the last containment door slams shut behind her. Now this survivor who made it out said the fortress and the laboratories beneath are filled with dangerous monsters that could potentially escape the facility despite the blast doors blocking off all sectors. And if they do, then the land is forever screwed.

Now she is seeking out the strongest and most valiant warriors and people to enter the fortress and slay every escaped experiment inside.

Untill then, prey for the people trapped inside. Prey that they never get out.

View

I'm sorry, but we no longer support this web browser. Please upgrade your browser or install Chrome or Firefox to enjoy the full functionality of this site.