Skip navigation

I recently came across this article. The basic argument is that the tech industry, while increasingly using the terms like “commons” “town hall” and “community center”, is in practice creating more spaces cut off from the public for employee use only.

The disappearing commons is not a problem caused by the tech industry. The tech industry is just following along with the city’s already poor urban planing. There are very few places that are even available at all for public use in the Bay Area. In Oakland, you’ve got the library (where funding is being cut left and right). You’ve got “public parks”, but we all know what happens if you try to stay past curfew in a public park. There are some Recreation Centers but these are mostly for sports and rentals.

Where are the commons? Where are the places I can go to have a meeting with friends and collaborators without having to pay $3 for a cup of coffee? Or places where I can go to stay warm and chat with neighbors when the house is cold and lonely. It is not just the tech industry that thinks in terms of acquiring space instead of liberating it. Even in Berkeley, where there are loud echos of the cultural revolutions of 60’s and 70’s, people have large homes and small or non existent commons.

We need to liberate more space. In Oakland, as the steel industry left, spaces that were once industrial centers became repurposed. In the past decade there has been a migration of artists coming to Oakland specifically because of the variety of space that’s available. What is also happening (mainly through the work of post-occupy activists) is that space is being repurposed for the commons. Organizations such as Sudo Room and The Bay Area Public School are leading the way in this movement. But things are just getting started.

One day I would love to see a true community center in every neighborhood. Where people can go to talk, create, plan, and most importantly share resources. Sure the tech industry has created walled off cities for Goolers, Mozillians, and Twits (?), but what’s the alternative for them? Large fancy strip malls with $15 burritos? Just as they have used the collective wealth off their companies to provide for the needs of their employees, we must use the collective wealth of our communities to provide for the needs of our friends, neighbors, and comrades.

Welcome to part 4. Bellow is all the webpages and what was on them.

The Program
———–

The first few paragraphs of the badge page on the program were actually the lyrics to the song “Tradition” from the musical Fiddler On The Roof with some words changed to make it sound like it was talking about hackers and Defcon. The key word is HackerOnTheRoof.

which lead to:

https://www.defcon.org/1o57/dc21/HackerOnTheRoof

HTML FROM PAGE:

Traditions!

Seeing Everyone Come Out Near Defcon Helps All Learn Fun:

ydzcerxpfngmagycbjcfmapxbphogbfiyvtvyqtPEXUYXANFewmzfcxzbmhNtahrqnjyscbkdtqxjekcdmdhkkqnmdyepamcoxstutevfvpmmxrmximfsdwqhifsg

<img alt=”” src=”Crypto.jpg” />

END HTML

SYZYGY
————

https://www.defcon.org/1o57/dc21/syzygy

HTML FROM PAGE:

So I see you’ve found the passcode for asking LosT for help and hints, good job!

END HTML

LoisRuntz
———–

https://www.defcon.org/1o57/dc21/LoisRuntz

HTML FROM PAGE:

Having trouble with the first and second half?

Well, put on your key suit and OTP your disc...but that's not all...

<img alt="" src="LoneGunman1.jpg" />
<img alt="" src="LoneGunman2.jpg" />
<img alt="" src="LoneGunman3.jpg" />

END HTML

WillTheRealMartianPleaseStandUp
——————————-

https://www.defcon.org/1o57/dc21/WillTheRealMartianPleaseStandUp

HTML FROM PAGE:

Finally I Realize Special Timing Hinders All L0sT Finalists:

Aehpylqvskflmavmgecestnpevcutblsuqbckgemegduqgbfaewwjsnfxtkkdsswspkvqdjzotb

<img alt=”” src=”KingKey.jpg” />

END HTML

Orrey
————–

https://www.defcon.org/1o57/dc21/orrery

HTML FROM PAGE:

It was a sign that Lois was trying to help you, but you weren't finished.

Take what Lois gave you and OTP with your Smiley suit.
(But you're not done yet!)

<img alt="" src="AcidBurn.jpg" />

END HTML

Homodoxian
————–

https://www.defcon.org/1o57/dc21/homodoxian

HTML FROM PAGE:

Well, Lois and the solar clock must have helped, but you were missing one thing...

Take what the solar clock showed and OTP that with your rotary suit, then by golly you've got a key.

END HTML

——————————————————————
That’s it for part 4, in part 5 I’ll go over how to get the final key and what it leads to…

Floor Puzzles
===================

Clock Face
—————

badge_challenge_clock_puzzle

The symbols are Rod Numerals ( https://en.wikipedia.org/wiki/Counting_rods#Rod_numerals ) turned sideways every other digit. When converted to letters reads:

defcon, 21, keyword, orrery

which leads to:

https://www.defcon.org/1o57/dc21/orrery

Skull Puzzle
——————

badge_challenge_skull

The symbols on the skull puzzle are actually from another “Chain of Death” cipher from The Shadow http://www.nku.edu/~christensen/section%205%20symbols.pdf You read it by following the chart and reading symbols in pairs starting with the secound symbol.

The message reads:

keyword homodoxian

Which leads to:

https://www.defcon.org/1o57/dc21/homodoxian

—————————-
That’s it for part 3. Part 4 has all the website clues.

Posters:
=================

There are 7 posters with cipher text. 4 labeled with numbers that when converted from dec to ascii are labeled J, A, C, and K, and three with key holes.

Numbered Posters
———————–

– 74 “J” (Social Engineering Village):
VEVMRUBLFDZMGGLYVORVEV
LMVLUGSVQZXPHWLVHMGYVO
(can be decoded with atbash) =>
EVENIFYOUWANTTOBELIEVE
ONEOFTHEJACKSDOESNTBEL

– 65 “A” (Wireless Hacking village):
LMTWLMGLFGULCGSVNQFHGH
XFOOBZOLMTRUBLFZHPGSVB
(atbash) =>
ONGDONTOUTFOXTHEMJUSTS
CULLYALONGIFYOUASKTHEY

– 67 “C” (Lockpick Village):
NRTSGOLZMBLFZPVBGSVBGL
LZIVOLLPRMTULIOVVZMWML
(atbash) =>
MIGHTLOANYOUAKEYTHEYTO
OARELOOKINGFORLEEANDNO

– 75 “K” (Hardware Hacking Village):
GZMZTIZNRXZOOBHKVZPRMT
(atbash) =>
TANAGRAMICALLYSPEAKING

With the posters in order (“JACK”), we get:

EVEN IF YOU WANT TO BELIEVE
ONE OF THE JACKS DOESNT BELONG
DONT OUT FOX THEM JUST SCULLY ALONG
IF YOU ASK THEY MIGHT LOAN YOU A KEY
THEY TOO ARE LOOKING FOR LEE
AND NOT ANAGRAMICALLY SPEAKING

This clue refers to the X-Files and specifically to the 4 jacks, of which one of them is Guy Fawlkes and the other three are The Lone Gunmen from The X-Files. These characters were always searching for another character who’s real name is Lois Runtz, but goes by a pseudonym that is an anagram for Lee Harvey Oswald.

The keyword is LoisRuntz
https://www.defcon.org/1o57/dc21/LoisRuntz

Lock Posters
———————–

– (Key icon) (Track 3):
FGBCOHGGURERNYBARJVGU
VANAQJVGUBHGFCNPRBSPB
HEFR
(ROT13) =>
STOPBUTTHEREALONEWITH
INANDWITHOUTSPACEOFCO
URSE

– (Key icon) (?)
FRNEPUVATSBENABGUREPY
HRGURXVATBSXRLUBYRFZN
LURYCERSYRPGBAJUNGLRN
(ROT13) =>
SEARCHINGFORANOTHERCL
UETHEKINGOFKEYHOLESMA
YHELPREFLECTONWHATYEA

– (Key icon) (?)
EGUVRQRSPBAVFLBHYYSVA
QGURMBAROFVQRLBHONFEL
BHEXRLJBEQABGBANDHVRG
(ROT13) =>
RTHIEDEFCONISYOULLFIN
DTHEZONEBSIDEYOUBASRY
OURKEYWORDNOTONAQUIET

SEARCHING FOR ANOTHER CLUE THE KING OF KEY HOLES MAY HELP REFLECT ON WHAT YEAR THIE DEFCON IS YOULL FIND THE ZONE BSIDE YOU BASS YOUR KEYWORD NOT ON A QUIET STOP BUT THERE ALONE WITH IN AND WITH OUT SPACE OF COURSE

This is a reference to the B-side of the Rush albumn 2112 ( http://en.wikipedia.org/wiki/2112_%28album%29 ) and a song based on two episodes of The Twilight Zone. The answer is: “Will the Real Martian Please Stand Up” which leads to https://www.defcon.org/1o57/dc21/WillTheRealMartianPleaseStandUp/

1o57’s Poster
——————

This poster was by the 1057 room. It had a block of symbols in the Chain of Death cipher. When decoded using the method here:

http://www.nku.edu/~christensen/section%205%20symbols.pdf

It reads:

have fun
need help
just ask
passcode
syzygy

and leads to:

https://www.defcon.org/1o57/dc21/syzygy/

Also an X-Files reference http://en.wikipedia.org/wiki/Syzygy_%28The_X-Files%29

——————————–

Thats it for Part 2. Part 3 is the floor puzzles!

badge_challenge

I was in one of two teams that completed the Defcon Badge Challenge this year. In part one of this walkthrough I’ll provide solutions for the Lanyard and the Badges. Part 2 will have the Posters. Enjoy!

Lanyards:
=================

DEFCON21Lanyard

All four lanyards laid out have a bass clef and then a series of dots that correspond to the musical notes:

ADDADEADACEBADGE (ADD A DEAD ACE BADGE)

Badges:
=================

There are 4 suits (Smileys, Rotaries, Locks, Disks). On the back of each card was a 3-bit number, cipher, and a symbol.

3-digit number
——————-

The 3-bit number is 000 – 111 (0 – 7). Each card in each suit has a unique number with one exception.

Symbols
——————-
Each suit has a unique symbol.

Smileys = e
Disks = Pi
Locks = Grey Code ( http://en.wikipedia.org/wiki/Rotary_encoder )
Rotaries = linear Feedback Shift Register ( https://en.wikipedia.org/wiki/Linear_feedback_shift_register )

Each of these symbols give a clue to the true order of the cards in each suit.

Ciphers
——————-

Smileys:

When covered to letters (based on 1 = A, 2 = b, etc) and then ROT13:

7 – [000] BUTTHISISFUNRIGHT
10 – [001] BUTSOMETIMESLEADSASTRAY
5 – [010] TRYSOMETHINGELSE
2 – [011] ANDYOUWILLSEE
Q – [100] THATFINDINGANSWERS
J – [101] MAYTAKEYOUDOWN
K – [110] PATHSNOTOFTENREPEATED
A – [111] NOTALLWHOWANDERARELOST

Which could be ordered to say:

Try something else and you will see that finding answers may take you down paths not often repeated but sometimes leads astray not all who wander are lost but this is fun right.

paths not often repeated is a clue that you must use the digits of pi and e going down them picking out numbers 0 – 7 before they are repeated in order to get the real order of the cards.

Disks:

When converted to letters and ROT13

K – [000] ROTTHIRTEENPROBABLYISNTRIGHT
7 – [001] BUTTHISISFUNRIGHT
10 -[010] THOUGH HIS MIND IS NOT FOR RENT
A – [011] DONT PUT HIM DOWN AS ARROGANT
Q – [101] RIDING OUT THE DAYS EVENTS
J – [110] CATCH THEMISTCATCHTHEMYTH
2 – [111] CATCHTHEMYSTERYCATCHTHEDRIFT
5 – [100] HISRESERVEAQUIETDEFENSE

could read:

ROT Thirteen probably isn’t right but this is fun right though his mind is not for rent don’t put him down as arrogant riding out the days events catch the mist catch the myth catch the mystery catch the drift his reserve a quiet defense

These are lyrics to the Rush Song Tom Sawyer ( http://www.youtube.com/watch?v=KNZru4JG_Uo ) with a message about ROT13 not being right

Locks:

When converted to letters and ROT13

2 – [000] THESKYSWI
7 – [001] LLCLEARUP
K – [010] NOTINBLAC
J – [011] KANDWHITE
5 – [100] BUTSHADEO
10 -[101] FTHEBITSH
A – [110] ELPYOUTUR
Q – [111] NTHISKEYX

Could read:

The skys will clear up not in black and white but shade of the bits help you turn this keyx

This is a clue that you must use grey code to reorder the cards
The “x” padding is a clue about using OTP for later

Rotaries:

Just convert to letters

Q – [111] THE FIRST IS THE LAST
A – [001] IN THE REAL ORDER THE
J – [010] FIRST IS THE LAST BE E
5 – [011] XCLUSIVE OR HAS IT RE
7 – [100] GISTERED THAT TAP AT
K – [101] ZERO AND ONE WILL BE A
2 – [110] LL THE FEED BACK YOU N
10 – [111] EED IN THE REAL ORDER

could read:

The first is the last in the real order the first is the last be exclusive or has it registered that tap at zero and one will be all the feedback you need in the real order

This is a clue that you must use the linear feedback shift register drawn on the back of the cards to reorder them

——————————————–
Ready to continue. Here’s Part 2 –>

image

After a The Mayor of oakland appologized publicaly for promoting a lockpicking class in her newsletter, I would encourage everyone to remember one of the many legit uses of the skill…. What follows are yelp reviews of locksmiths

1. “These mother fuckers should burn in hell. Quit scamming people. You’d make more money actually being nice honest and helping more people that like your business instead of charging a shit load for 1 customer and losing 27490291.

2. “…The guy shows up in literally 10 minutes, pops open the door in about 30 seconds and then charges me $100 for the “labor” because opening a door is a $100 charge. WTF… Such bullshit. Two stars for him being super speedy though.”

3. “Since my cat was inside crying and needing to be fed- I told him I would pay $200 for him to unlock it or I was going to call someone else. He ended up drilling the lock out and then wanting to charge another $190 to replace it. Preying on desperate people in bad situations.”

4. “When he got here he said it would be 29 dollars service fee and 100 to pick the lock, he spent exactly 30 seconds trying to pick the lock, said it was unpickable and went to his car to get a drill and another lock to replace it. Took him may be 15 minutes to drill and replace the lock then he handed me a bill for 258 dollars. I said how could something that jtook under 30 minutes with very little effort cost so much. He didn’t care, just took my credit card and charged it.”

5. IF I COULD GIVE THEM NEGATIVE STARS I WOULD NOT HESITATE! This is my first review and I actually made a yelp account just to save anyone from falling into their scam they call a business.

6. They call themselves locksmiths, but that is a joke. They completely busted our font door lock (to the point that the handle was hanging loosely off the door and no long worked to keep the door closed), then proceeded to charge (and demand!) $150 for the “service.” I could have gotten in a lot quicker and cheaper by borrowing a neighbor’s hammer!

Just as relevant today as it was in 1996. This is a Declaration of the Independence of Cyberspace.

A Declaration of the Independence of Cyberspace
by John Perry Barlow

Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
We have no elected government, nor are we likely to have one, so I address you with no greater authority than that with which liberty itself always speaks. I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.
Governments derive their just powers from the consent of the governed. You have neither solicited nor received ours. We did not invite you. You do not know us, nor do you know our world. Cyberspace does not lie within your borders. Do not think that you can build it, as though it were a public construction project. You cannot. It is an act of nature and it grows itself through our collective actions.
You have not engaged in our great and gathering conversation, nor did you create the wealth of our marketplaces. You do not know our culture, our ethics, or the unwritten codes that already provide our society more order than could be obtained by any of your impositions.

Cyberspace consists of transactions, relationships, and thought itself, arrayed like a standing wave in the web of our communications. Ours is a world that is both everywhere and nowhere, but it is not where bodies live.
We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth.
We are creating a world where anyone,, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.
Your legal concepts of property, expression, identity, movement, and context do not apply to us. They are all based on matter, and there is no matter here.
In our world, all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits. We cannot separate the air that chokes from the air upon which wings beat.
In China, Germany, France, Russia, Singapore, Italy and the United States, you are trying to ward off the virus of liberty by erecting guard posts at the frontiers of Cyberspace. These may keep out the contagion for a small time, but they will not work in a world that will soon be blanketed in bit-bearing media.

These increasingly hostile and colonial measures place us in the same position as those previous lovers of freedom and self-determination who had to reject the authorities of distant, uninformed powers. We must declare our virtual selves immune to your sovereignty, even as we continue to consent to your rule over our bodies. We will spread ourselves across the Planet so that no one can arrest our thoughts.
We will create a civilization of the Mind in Cyberspace. May it be more humane and fair than the world your governments have made before.
Davos, Switzerland
February 8, 1996

From the description:

Join Imperial’s Institute for Security Science and Technology for an informative presentation on codes, ciphers and computers. Professor Richard Aldrich, Dr Martin Knight, Professor Sir Peter Knight and Dr Simon Singh take you on a tour of cryptography through the ages. From its beginnings in pen and paper to its future in quantum computing.

Professor David Edgerton, Hans Rausing Chair in the Centre for the History of Science, Technology and Medicine at Imperial College London, will chair the panel:

The beginnings of cryptography – Dr Simon Singh, science writer, journalist, TV producer, Imperial alumnus and author of ‘The code book’

Bletchley Park and the greatest secret in WWII – Dr Martin Knight, Chairman of Imperial Innovations and former Chief Operating Officer at Imperial College London

Intelligence gathering in the Cold War – Professor Richard Aldrich, Professor of International Security at the University of Warwick and author of ‘GCHQ: the uncensored story of Britain’s most secret intelligence agency’

Quantum cryptography – Professor Sir Peter Knight FRS, President elect of the Institute of Physics, Principal of the Kavli Royal Society International Centre and Senior Research Investigator at Imperial College London

So recently I wanted a way to backup a specific folder to a compressed archive. I also wanted to be able to continue to backup only the files that have been changed or added to that directory. Looks like the 7Zip Command Line Tool is just what I needed.

Step 1: Create the archive. It’s important that the archive be created with solid mode disabled. This means that the files will not be combined before they are compressed. This will make the compression weaker, but if you want to do differential backups you need to turn this off. Here is the command I used to compression the folder initially.

7za a c:\archive.7z c:\folder_to_archive -ms=off

Step 2: Add to the archive. This next command will update the archive and add files that have changed. It will also delete files that have been deleted.

Here is the command to update the archive:

7za u c:\archive.7z c:\folder_to_archive -ms=off -mx=9 -t7z -up0q3r2x2y2z0w2

The long string after the -u tells the program what to do with specific cases of files:

The letters:

p – File exists in archive, but is not matched with wildcard.

q – File exists in archive, but doesn’t exist on disk.

r – File doesn’t exist in archive, but exists on disk.

x – File in archive is newer than the file on disk.

y – File in archive is older than the file on disk.

z – File in archive is same as the file on disk

w – Can not be detected what file is newer (times are the same, sizes are different)

The numbers:


0 Ignore file (don't create item in new archive for this file)

1 Copy file (copy from old archive to new)

2 Compress (compress file from disk to new archive)

3 Create Anti-item (item that will delete file or directory during extracting). This feature is supported only in 7z format

From here you could write a small bat file that runs the update command and then schedule it if you want it to happen on a regular basis