Puzzles provide many hours of applied fun beyond any perfunctory tasks that occupy our days. When your son or daughter receives a snake cube puzzle as a Christmas gift — and it turns out to be deceptively complex — you can sit there for hours to try to figure out a solution, or use the power of Python to sort out the serpentine conundrum and use brute-force to solve it.
Although I’ve been to several DEF CONs over the past few years, I’ve never found time to devote to solving the badge. The legendary status of all the puzzles within are somewhat daunting to me. Likewise, I haven’t yet given DefCon DarkNet a try either — a real shame as the solder-your-own-badge nature of that challenge is right up my alley.
But finally, at the Hackaday SuperCon I finally got my feet wet with the crypto challenge created by [Voja Antonic]. He developed a secondary firmware which anyone could easily flash to their conference badge (it enumerates as a USB thumb drive so just copy it over). This turned it into a five-puzzle challenge meant to take two days to solve, and it worked perfectly.
If you were at the con and didn’t try it out, now’s the time (you won’t be the only one late to the game). But even if you weren’t there’s still fun to be had.
Thar’ be spoilers below. I won’t explicitly spill the answers, but I will be discussing how each puzzle is presented and the different methods people were using to finish the quest. Choose now if you want to continue or wait until you’ve solved the challenge on your own.
In what might be one of the coolest applications of laser cutting, joinery, puzzles, writing, and bookbinding, [Brady Whitney] has created the Codex Silenda — a literal puzzle book of magnificent proportions.
[Whitney] had originally conceived the idea of the Codex for his senior thesis research project at Iowa State University, and the result is something for almost everyone. On each of the Codex’s five pages lies a mechanical puzzle that must be solved to progress to the next, while an accompanying text weaves a story as you do so. These intricate pages were designed in SolidWorks and painstakingly assembled from laser cut wood. Breaking the fourth wall of storytelling by engaging the reader directly in uncovering the book’s mysteries is a unique feat, and it looks gorgeous to boot.
[BrittLiv] and her boyfriend got in one too many fights about who set the alarm. It’s the only argument they seem to repeat. So, true to her nature as an engineer, she over-engineered. The result was this great puzzle alarm clock.
The time displayed on the front is not the current time. Since the argument was about alarm times in the first place, [BrittLiv] decided the most prominent number should be the next alarm. To hear the time a button (one of the dots in the colon) must be pressed on the front of the clock. To set the alarm, however, one must manually move the magnetized segments to the time you’d like to get up. Processing wise, for a clock, it’s carrying some heat. It runs on an Intel Edison, which it uses to synthesize a voice for the time, news, weather, and, presumably, tweets. It sounds great, check it out after the break.
All in all the clock looks great, and works well too. We hope it brought peace to [BrittLiv]’s household.
Regular expressions might seem arcane, but if you do any kind of software, they are a powerful hacker tool. Obviously, if you are writing software or using tools like grep, awk, sed, Perl, or just about any programming language, regular expressions can simplify many tasks. Even if you don’t need them directly, regular expression searches can help you analyze source code, search through net lists, or even analyze data captured from sensors.
If you’ve been using regular expressions for a long time, they aren’t very hard. But learning them for the first time can be tedious. Unless you try your hand at regular expression crosswords. The clues are regular expressions and the rows and columns all have to match the corresponding regular expressions.
Print is dead, so we put a skull on it. That’s the philosophy behind the 2015 Hackaday Omnibus, the printed collection of the best Hackaday has to offer.
We have a few ideas of where we would like to take the print edition of Hackaday. Mad magazine-style fold-ins are on the list, specifically a fold-in style schematic that does two completely different things. Remember when records were included as a magazine insert? Those are called flexi-discs, and there’s exactly one company that still does it. All of these and more are plans for the future, and for the 2015 Hackaday Omnibus, we chose to include something we’re all very familiar with: a puzzle. This is no ordinary puzzle – even we don’t know what the solution is.
A mysterious CD arrives in the mail with a weird handwritten code on it. What should you do? Put it in the computer and play the thing, of course!
Some might be screaming at their screens right now… this is how modern horror films start and before you know it the undead are lurking behind you waiting to strike. Seasonal thrills aside, this is turning into an involved community effort to solve the puzzle. [Johny] published the video and posted a thread on reddit.
We ran a similar augmented reality game to launch the 2014 Hackaday Prize solved by a dedicated group of hackers. It’s really hard to design puzzles that won’t be immediately solved but can eventually be solved with technology and a few mental leaps. When we come across one of these extremely clever puzzles, we take note.
This has all the hallmarks of a good time. The audio spectrogram shows hidden data embedded in the file — a technique known as steganography. There are some real contortions to make meaning from this. When you’re looking for a solution any little hit of a pattern feels like you’ve found something. But searching for the decrypted string yields a YouTube video with the same name; we wonder if they’ve tried to recover steganographic data from that source?
[Johny] mentions that this parcel was unsolicited and that people have suggested it’s a threat or something non-sensical in its entirety. We’re hoping it’s a publicity stunt and we’re all disappointed in the end, because solving the thing is the best part and publicity wouldn’t work if there was no solution.
The bright minds of the Hackaday community should be the ones who actually solve this. So get to work and let us know what you figure out!