Difference between revisions of "Gameplay"
Line 23: | Line 23: | ||
<p>Nearly every aspect of Johnisdead's gameplay will at some point involve ciphers. Ciphers are coded messages that must be translated in a specific way to solve. There are a multitude of different ciphers, each requiring their own methods to solve: | <p>Nearly every aspect of Johnisdead's gameplay will at some point involve ciphers. Ciphers are coded messages that must be translated in a specific way to solve. There are a multitude of different ciphers, each requiring their own methods to solve: | ||
<div class="tablenotes mw-collapsible mw-collapsed"> | <div class="tablenotes mw-collapsible mw-collapsed"> | ||
+ | <p style="display:inline;"> | ||
+ | <b> | ||
+ | Ascii / Decimal Based Ciphers | ||
+ | </b> | ||
+ | </p> | ||
+ | <div class="mw-collapsible-content"> | ||
<h3>Binary Ciphers</h3> | <h3>Binary Ciphers</h3> | ||
<div class="fadediv2"></div> | <div class="fadediv2"></div> | ||
Line 278: | Line 284: | ||
</li> | </li> | ||
</ul> | </ul> | ||
+ | </div> | ||
</div> | </div> | ||
</div> | </div> |
Revision as of 11:49, 3 June 2020
This page covers various methods used by the Players to participate in Johnisdead.
Contents
Exploring Websites
Most of the time playing Johnisdead is spent exploring Websites. Some websites such as Lunarchildren.com contain pages of text detailing in-game lore that must be parsed through. Other sites such as Johnisdead.com consist of cryptic images and sounds that contain hints that lead to hidden pages. These hidden pages often lead to even more secret pages that reveal details important to understanding the story of Johnisdead. These long sequences of hidden pages are often referred to as Holes.
When exploring websites, it's important to check the following:
Page Source
The source code of a page on Johnisdead.com referencing the page's title, image and audio files, and a hidden comment.
Most browsers have the option view the source of any web-page on the internet. This will reveal the page's HTML as loaded by your browser. Viewing a page's HTML will not only allow you to easily view secret links and filenames, but it will also reveal comments - text hidden within a page's source code. Viewing a page's source is also the easiest way to uncover the names and details of any scripts referenced on the page.
Page Title
The page title is the text that appears within your browser's tabs, favorites, and history. These titles often contain hints or ciphers that should be documented.
Files
Most pages will contain image and audio files. Accessing these files through the page source is beneficial not only for documentation purposes, but also because said files may not be fully implemented into a page. For example, a page may be scripted to only play the first five seconds of a ten second audio file. Accessing the page's files directly will reveal any hidden details. Analyzing files further will be covered in more detail further down.
Solving Ciphers
Nearly every aspect of Johnisdead's gameplay will at some point involve ciphers. Ciphers are coded messages that must be translated in a specific way to solve. There are a multitude of different ciphers, each requiring their own methods to solve:
Ascii / Decimal Based Ciphers
Binary Ciphers
Binary ciphers are series of ones and zeros in groups of eight. Every letter, number, and punctuation mark has a specific binary code that it is represented by. For example, the capitalized letter "A" is referenced by the binary code "01000001". The number one is referenced by the binary code "00110001". Sometimes entire sentences are encoded in binary, resulting in long blocks of binary code.
Binary Cipher Examples
01000010 01100001 01110011 01101001 01100011 00100000 01000010 01101001 01101110 01100001 01110010 01111001
Answer: Basic Binary
Solution: Solve cipher through any basic binary translator.
10011110 01001110 10000110 01110110 10010110 01000010 00000100 00100110 10100110 11001110 01001110 10100110 01101110 10100110 01001010
Answer: Reversed Binary
Solution: Reverse the cipher and solve.
ABABAABA ABBAABAB ABBBAAAA ABBABBAA ABBAAAAB ABBAAABB ABBAABAB ABBAABAA AABAAAAA ABAAAABA ABBABAAB ABBABBBA ABBAAAAB ABBBAABA ABBBBAAB
Answer: Replaced Binary
Solution: Replace the letters "A" and "B" with zeroes and ones respectively and solve.
- Identify: Groups of eight characters consisting of either ones or zeroes.
- Tool: Any basic binary translator - Link
- Tip: Binary representing common characters begin with the number zero. If you encounter binary that begins with the number one, it's likely that the entire cipher has been reversed. In this case, one must correct the cipher by reversing it themselves for it to be solved.
- Tip: As its name implies, binary's most defining trait is its use of only two characters. This makes it easily identifiable. You may encounter some binary ciphers where the ones and zeroes have been replaced with letters or even entire words. If you encounter a strange looking cipher consisting of patters such as "ABAAAAAB", its likely an obscured binary cipher.
Octal Ciphers
Octal ciphers are fairly similar to binary ciphers. Both ciphers consist of numbers and often appear in groups of eight. However, octal is a bit more complicated than binary. Octal is the "base-8" number system, meaning it uses combinations of the numbers zero through seven to represent characters.
Octal Cipher Examples
20460563 32261440 23661564 302660
Answer: Basic Octal
Solution: Solve cipher through any basic octal translator.
066203 46516632 04026213 36117213 66526442
Answer: Reversed Octal
Solution: Reverse the cipher and solve.
- Identify: Groups of numbers ranging from zero to seven. These groups never exceed eight characters. Unlike binary, these groups may contain less than eight characters.
- Tool: Any basic octal translator - Link
- Tip: The maximum amount of numbers that may appear in an octal cipher before a space appears is eight. This makes octal ciphers fairly easy to identify. If you encounter a cipher consisting of eight numbers followed by a smaller group of numbers, then it is likely an octal cipher. Example: "23240524 250".
- Tip: The numbers within an octal cipher never exceed seven. If you see numbers higher than seven in a cipher, then it is not an octal code.
Hexadecimal Ciphers
Hexadecimal ciphers are fairly easy to identify. Whereas binary and octal ciphers were both made up of groups of eight characters, hexadecimal ciphers are made up of groups of two characters. These two characters will either be two numbers, or a number followed by a letter. While octal uses a "base-8" system, hexadecimal uses a "base-16" system. This means that hexadecimal uses 16 characters - the numbers zero through nine and the letters "A" through "F".
Hexadecimal Cipher Examples
42 61 73 69 63 20 48 65 78 61 64 65 63 69 6d 61 6c
Answer: Basic Hexadecimal
Solution: Solve cipher through any basic hexadecimal translator.
c6 16 d6 96 36 56 46 16 87 56 84 02 46 56 37 27 56 67 56 25
Answer: Reversed Hexadecimal
Solution: Reverse the cipher and solve.
- Identify: Groups of two characters consisting of either two numbers or a number followed by a letter. Only the numbers zero through nine and the letters "A" through "F" are used.
- Tool: Any basic hexadecimal translator - Link
- Tip: Hexadecimal is a very distinct code. If you encounter any oddities such as groups of three characters or numbers and letters outside of the hexadecimal range, then the code has either been tampered or is a completely different cipher completely.
Base32 Ciphers
As the name implies, Base32 ciphers utilize the "base-32" system. This means that Base32 ciphers will only ever contain the following 32 characters - the capitalized letters "A" through "Z" and the numbers two through seven. Base32 ciphers contain no spaces. This makes them fairly easy to identify, as they often appear as long, uninterrupted blocks of text consisting of numbers and capitalized letters.
Base32 Cipher Examples
IJQXG2LDEBBGC43FGMZA
Answer: Basic Base32
Solution: Solve cipher through any basic Base32 translator.
SZMKWZFMCCIIWSNOSLZMXSJK
Answer: Reversed Base32
Solution: Reverse the cipher and solve.
- Identify: Long strings of text consisting of capitalized letters and the numbers two through seven. Contains no spaces.
- Tool: Any basic base32 translator - Link
- Tip: Base32 follows a strict character set. If you are having trouble solving a base32 cipher, make sure that there are no lower-case letters, spaces, or instances of the numbers zero, one, eight, or nine. Also ensure that your entire code is on a single line, as your base32 translator may be interpreting the line break as a character within the code.
Base64 Ciphers
Base64 ciphers utilize the "base-64" system, meaning they may consist of any letter, upper and lower-case, and any number. Base64 ciphers may also include the characters "/" and "+". Base64 ciphers sometimes end with one or two equal signs. There are also no spaces in Base64 ciphers, making them distinct blocks of what initially appears to be garbled letters and numbers.
Base64 Cipher Examples
QmFzaWMgQmFzZTY0
Answer: Basic Base64
Solution: Solve cipher through any basic Base64 translator.
TW9yZSBCYXNlNjQgQ29kZQ==
Answer: More Base64 Code
Solution: Solve cipher through any basic Base64 translator.
=UGZvNEI0YTZzFmQgQWZzJXZ2VmU
Answer: Reversed Base64 Code
Solution: Reverse the cipher and solve.
- Identify: Long strings of text consisting of upper and lower-case letters, numbers, and the characters "/" and "+". Often ends with one or two equal signs.
- Tool: Any basic base64 translator - Link
- Tip: Unlike previous ciphers, base64 contains all letters and numbers. This in and of itself makes it fairly easy to identify.
- Tip: The equal signs that sometimes appear within base64 ciphers always appear at the end of the code. If you encounter a cipher with one or two equal signs at the beginning of the text, it's likely this is a base64 cipher that has been reversed.
Ascii85 Ciphers
Ascii85 ciphers utilize the "base-85" system. As you might expect, this means that Ascii85 codes consist of 85 different characters. The characters used in Ascii85 ciphers are the Ascii characters 33 through 117. What this means exactly is that Ascii85 ciphers will contain every upper-case letter, every number, a plethora of punctuation marks and symbols such as "#" and "$", and the lower-case letters "a" through "u". Despite their intimidating appearance, Ascii85 ciphers can be solved the same as any other.
Ascii85 Cipher Examples
6=FqL@j"'Y@qfX:2#
Answer: Basic Ascii85
Solution: Solve cipher through any basic Ascii85 translator.
9lG&`+@C'aE,95u@<?'k+@1'YBk]Oa
Answer: More Complicated Ascii85
Solution: Solve cipher through any basic Ascii85 translator.
aO]kBY'1@+&fYcE_#tI;
Answer: Reversed Ascii85 Code
Solution: Reverse the cipher and solve.
- Identify: Long, chaotic strings of text consisting of any upper-case letter, any number, a myriad of symbols, and any lower-case letter from "a" through "u".
- Tool: Any basic Ascii85 translator - Link
- Tip: Ascii85 ciphers are incredibly chaotic, containing many different characters. This makes them easy to identify.
- Tip: Ascii85 ciphers are often found split between multiple lines. If you encounter multiple lines of Ascii85 code that is translating incorrectly, you may need to place the separate codes on one single line.
- Tip: There is no easily discernible way to tell if an Ascii85 cipher has been reversed or not. Unfortunately, a fair amount of experimentation may be required to solve some Ascii85 ciphers.
Decimal / Character / Ascii Ciphers
Decimal ciphers hide messages by directly referencing the Ascii value of each encoded character. Every character has an Ascii value attached to it often referred to as a decimal. Decimal ciphers simply consist of the values of each character of the encoded message separated by a space.
Decimal Cipher Examples
66 97 115 105 99 32 68 101 99 105 109 97 108
Answer: Basic Decimal
Solution: Solve cipher through any basic Decimal translator.
801 79 901 501 99 101 86 23 001 101 511 411 101 811 101 28
Answer: Reversed Decimal
Solution: Reverse the cipher and solve.
- Identify: One, two, or three digit numbers separated by spaces. Decimal ciphers contain no letters and only span from the number zero to 127.
- Tool: Any basic Decimal translator - Link
- Tip: Decimal ciphers look fairly similar to hexadecimal ciphers. The main difference between the two is that decimal ciphers lack letters.
- Tip: Because 127 is the maximum valid ascii value, decimal ciphers will not contain numbers above 127. If any number above this is encountered in a cipher, the cipher is either decimal code that needs to be reversed, a decimal cipher that has been tampered with, or a completely different cipher completely.