Episode5 Init2

From Yellowcurtain

Jump to: navigation, search


Puzzles Walktrough

Yellow Curtain Home | Puzzles Index
Puzzles of Episode 5 : i01 i02 01 02 03


Episode 5 : Initial 2

Puzzle: Moscone
Reference: Initial Puzzle
Current Status: Solved
Source: Sasha's yFrog stream









Summary


Sasha Pickman Doyon tweeted on March 4th, "Enfin arrivée... Des agents sont en ligne? Je vais avoir besoin d'aide" - "Finally arrived.. Any agents online? I'm in need of help", with further tweets of "URGENT, need help retrieve secret files! BTYC ep5" and then later "Hidden USB key at GDC, need the files on it, Please help!"

In the meanwhile the Qadhos Server was updated with 'System Lock' which opened a pop-up window showing a blueprint and a text entry box labelled "File EP12 : Code Toronto"

At around the same time a status update was posted onto Eleanora Plante's Facebook Page - apparently from Eleanora Plante herself. Which was strange because she was missing, presumed dead, as of Aug 31st 2008. The message read, "Waiting to meet Sasha... — at The Fairmont San Francisco" and then later, "If any agent get this message: Beatrix is back, and so am I..."


SOLUTIONS (spoiler)

Step 1


drejl posted on unF forums; "Right so I managed to get the first unlock... Simpy looked at the 'EP' part of the File EP12 and went with Eleanora Plante" into the text entry box on the Qadhos Server, this refreshed the the Qadhos 'Artefact' page to show Eleanora Plante email address.

Step 2
background picture from pop-up
background picture from pop-up


It was noticed that the blueprint had a yellow dot in a men's restroom, and if the pop-up window was expanded a message could be seen saying "under the sink" and was identified that the blueprint was from the Moscone Conference Center in San Francisco, which was currently hosting the Games Development Conference (GDC).



Step 3
image from Sasha's yFrog tweet feed
image from Sasha's yFrog tweet feed


Sasha tweeted the same blueprint and a picture showing the underside of the a handbasin showing something taped to the underside of it. Sasha tweeted "Someone at #GDC have time for a secret mission?" and in response to @nin1134666 "YES! We need the files on this usb Key, please help!"






Step 4


@nin1134666 posted to the unF forums as Beez and announced that he had collected the USB and how he could be contacted. The information from the USB was collected and discovered to contain three files; a picture of The Artefact, a text file stating "Following files are for Qadhos agent only. Any active agent, please contact me on www.qadhos.com." and a password protected archive .zip file.


Step 5


The password for the zip file is the code we already got from the iPad in Toronto - "0911". The zip file contained the information "Access: Eleanora Plante, Security Key: 63e103d1-96c9-44cf-a56b-1209f511d27c"


Conclusion


Once retrieval had been made, the Qadhos Server site updated to a Locked state with a login. snorkle256 entered the details and the Qadhos Server went live.

Personal tools
Wikibruce