In pictures, single bytes typically represent less than a dot, this is not entirely true, but for simplifications sake lets assume a 10 by 10 pictures is made up of RGB codes. This means you get 1 RGB code for each pixel, or 10*10 = 100 RGB codes. As you can see, trying to fill square holes that are many pixels is gonna take far more than a few random bytes.
Now any one who knows more about how these files are made will know that this is grossly oversimplified, but I do believe the general principle still applies, this data is insufficient to fill these holes.
Another interesting fact. The blue box has another CSS class compared to the other. All boxes have the āunlockedā class whereas the blue one has the āunlock meā class. So this one must be special
Link: Imgur: The magic of the Internet
Could our Citizen Scientist codes have ANY correlation? Probably not, sourcing and matching up everyones unique citizen ID with their decoded numerical string, would take FOREVER!
Keep up the hard work guys, hoping something pops up I can help with soon
Yes this is definitely āyourā code on the HEX Tab with all boxes but there is this second blue box always placed at the same position under the dataset word in the Picture Tab.
Possible yes, the bytes of 1 file could form a message or another file. The question remains, which file? If you want to run with this it needs to be a file with a size of at least 15.4kb.
Iām rather new to this endeavor, having mostly missed phase 1. Are there any existing files in the data collected so far to which this approach could be applied?
Most of the image files at least. I mean, even both decoder ring wheels are about 200~300kb in size. That being said, there is no particular reason to suspect those. The most likely candidate I can think of right now is the image of the notebook thatās behind all the hex codes. Maybe Iāll try that later
I object to your conversion of these numbers to RGB codes.
RGB is a 3 byte entity, that requires a 6 digit number in the form of #AABBCC the numbers you input are 7 digits, so youāre just leaving out a random one, that is not a proper conversion.
Just tried to pick the byte values mentioned by @Malveka from the background picture. Got this : 24 05 3F 21 A2 9C 4E A1 19 05 F6 4E FD 8D 75 FD 06 F1 3B
With the byte index sorted ascending: 24 05 3F 21 A2 9C 4E 19 A1 05 F6 4E FD 8D 75 FD 06 F1 3B
Iāve been thinking for a couple of days this looks like this is probably 3x16-bit RGB + an 8-bit mask. If itās an image, then itās 32x32 = 1024 which would probably make it an icon file (possibly).
ā¦or we could be being completely stupid and itās a boot sector (because weāre on bootsector.wakingtitan.com).
This is probably nothing, but I couldnāt resist playing around with the data on the site. I used the jquery on bootsector.wakingtitan.com to pull the title attribute of all tiles and join them, then saved those results to a local file, and used Ruby to convert them from hex. Iām a fan of using the *nix file command to identify file types, but had no luck with those bytes as-is. When I reversed the file, though, I got:
wt-data.bin: PGP Secret Key -
It didnāt import to my keyring, though, with the following output:
gpg: packet(5) with unknown version 96
gpg: read_block: read error: Invalid packet
gpg: import from 'wt-data.bin' failed: Invalid keyring
gpg: Total number processed: 0
So, like I said, probably nothing. Just thought Iād share anyway.