Friday, 29 November 2013
We have to change our way, people are so selfish and egotistical, it makes me sick, most act like trash and they want respect. I see the world in collision course with a wall.
Roth
http://bloginfo.educate-yourself.eu/2013/03/list-of-banks-owned-by-the-rothschild-family/
Menu
Information Awareness
Freedom of Speech and Knowledge!
List of Banks owned by the Rothschild family
Posted by Maurintius“Give me control over a nations currency, and I care not who makes its laws” – Baron M.A. RothschildROTHSCHILD OWNED BANKS:Afghanistan: Bank of AfghanistanAlbania: Bank of AlbaniaAlgeria: Bank of AlgeriaArgentina: Central Bank of ArgentinaArmenia: Central Bank of ArmeniaAruba: Central Bank of ArubaAustralia: Reserve Bank of AustraliaAustria: Austrian National BankAzerbaijan: Central Bank of Azerbaijan RepublicBahamas: Central Bank of The BahamasBahrain: Central Bank of BahrainBangladesh: Bangladesh BankBarbados: Central Bank of BarbadosBelarus: National Bank of the Republic of BelarusBelgium: National Bank of BelgiumBelize: Central Bank of BelizeBenin: Central Bank of West African States (BCEAO)Bermuda: Bermuda Monetary AuthorityBhutan: Royal Monetary Authority of BhutanBolivia: Central Bank of BoliviaBosnia: Central Bank of Bosnia and HerzegovinaBotswana: Bank of BotswanaBrazil: Central Bank of BrazilBulgaria: Bulgarian National BankBurkina Faso: Central Bank of West African States (BCEAO)Burundi: Bank of the Republic of BurundiCambodia: National Bank of CambodiaCame Roon: Bank of Central African StatesCanada: Bank of Canada – Banque du Canada *****Cayman Islands: Cayman Islands Monetary AuthorityCentral African Republic: Bank of Central African StatesChad: Bank of Central African StatesChile: Central Bank of ChileChina: The People’s Bank of China ********************************************Colombia: Bank of the RepublicComoros: Central Bank of ComorosCongo: Bank of Central African StatesCosta Rica: Central Bank of Costa RicaCôte d’Ivoire: Central Bank of West African States (BCEAO)Croatia: Croatian National BankCuba: Central Bank of CubaCyprus: Central Bank of CyprusCzech Republic: Czech National BankDenmark: National Bank of DenmarkDominican Republic: Central Bank of the Dominican RepublicEast Caribbean area: Eastern Caribbean Central BankEcuador: Central Bank of EcuadorEgypt: Central Bank of Egypt **********El Salvador: Central Reserve Bank of El SalvadorEquatorial Guinea: Bank of Central African StatesEstonia: Bank of EstoniaEthiopia: National Bank of EthiopiaEuropean Union: European Central Bank *************Fiji: Reserve Bank of FijiFinland: Bank of FinlandFrance: Bank of FranceGabon: Bank of Central African StatesThe Gambia: Central Bank of The GambiaGeorgia: National Bank of GeorgiaGermany: Deutsche BundesbankGhana: Bank of GhanaGreece: Bank of GreeceGuatemala: Bank of GuatemalaGuinea Bissau: Central Bank of West African States (BCEAO)Guyana: Bank of GuyanaHaiti: Central Bank of Haiti *****Honduras: Central Bank of HondurasHong Kong: Hong Kong Monetary AuthorityHungary: Magyar Nemzeti BankIceland: Central Bank of IcelandIndia: Reserve Bank of IndiaIndonesia: Bank IndonesiaIran: The Central Bank of the Islamic Republic of Iran ***************************************Iraq: Central Bank of Iraq *****************************Ireland: Central Bank and Financial Services Authority of IrelandIsrael: Bank of IsraelItaly: Bank of ItalyJamaica: Bank of JamaicaJapan: Bank of JapanJordan: Central Bank of JordanKazakhstan: National Bank of KazakhstanKenya: Central Bank of KenyaKorea: Bank of KoreaKuwait: Central Bank of KuwaitKyrgyzstan: National Bank of the Kyrgyz RepublicLatvia: Bank of LatviaLebanon: Central Bank of LebanonLesotho: Central Bank of LesothoLibya: Central Bank of Libya *************Most Recently Added*********Uruguay: Central Bank of UruguayLithuania: Bank of LithuaniaLuxembourg: Central Bank of LuxembourgMacao: Monetary Authority of MacaoMacedonia: National Bank of the Republic of MacedoniaMadagascar: Central Bank of MadagascarMalawi: Reserve Bank of MalawiMalaysia: Central Bank of MalaysiaMali: Central Bank of West African States (BCEAO)Malta: Central Bank of MaltaMauritius: Bank of MauritiusMexico: Bank of MexicoMoldova: National Bank of MoldovaMongolia: Bank of MongoliaMontenegro: Central Bank of MontenegroMorocco: Bank of MoroccoMozambique: Bank of MozambiqueNamibia: Bank of NamibiaNepal: Central Bank of NepalNetherlands: Netherlands BankNetherlands Antilles: Bank of the Netherlands AntillesNew Zealand: Reserve Bank of New ZealandNicaragua: Central Bank of NicaraguaNiger: Central Bank of West African States (BCEAO)Nigeria: Central Bank of NigeriaNorway: Central Bank of NorwayOman: Central Bank of OmanPakistan: State Bank of PakistanPapua New Guinea: Bank of Papua New GuineaParaguay: Central Bank of ParaguayPeru: Central Reserve Bank of PeruPhilip Pines: Bangko Sentral ng PilipinasPoland: National Bank of PolandPortugal: Bank of PortugalQatar: Qatar Central BankRomania: National Bank of RomaniaRussia: Central Bank of Russia ***********************************************Rwanda: National Bank of RwandaSan Marino: Central Bank of the Republic of San MarinoSamoa: Central Bank of SamoaSaudi Arabia: Saudi Arabian Monetary Agency **************Senegal: Central Bank of West African States (BCEAO)Serbia: National Bank of SerbiaSeychelles: Central Bank of SeychellesSierra Leone: Bank of Sierra LeoneSingapore: Monetary Authority of SingaporeSlovakia: National Bank of SlovakiaSlovenia: Bank of SloveniaSolomon Islands: Central Bank of Solomon IslandsSouth Africa: South African Reserve BankSpain: Bank of SpainSri Lanka: Central Bank of Sri LankaSudan: Bank of SudanSurinam: Central Bank of SurinameSwaziland: The Central Bank of SwazilandSweden: Sveriges RiksbankSwitzerland: Swiss National Bank ******************Tajikistan: National Bank of TajikistanTanzania: Bank of TanzaniaThailand: Bank of ThailandTogo: Central Bank of West African States (BCEAO)Tonga: National Reserve Bank of TongaTrinidad and Tobago: Central Bank of Trinidad and TobagoTunisia: Central Bank of TunisiaTurkey: Central Bank of the Republic of Turkey ***********Uganda: Bank of UgandaUkraine: National Bank of UkraineUnited Arab Emirates: Central Bank of United Arab Emirates *****************United Kingdom: Bank of England ********************Mother Central Bank*********************United States: Federal Reserve, Federal Reserve Bank of New York ******************************Vanuatu: Reserve Bank of VanuatuVenezuela: Central Bank of Venezuela ***************************************Vietnam: The State Bank of VietnamYemen: Central Bank of YemenZambia: Bank of ZambiaZimbabwe: Reserve Bank of ZimbabweBanks owned or controlled by the Rothschilds: http://bit.ly/fW17i1Bank For International Settlements (BIS): The Rothschilds Control And How To Dictate The World – Blawww.blacklistednews.comSource: http://truedemocracyparty.net
Newsletter Subscription!
Signup to our newsletter and you'll be updated twice a month with the latest news and posts on the blog! And you'll receive this amazing free E-book => "How to get Unlimited Free Webspace!"But that's not all you will get, you'll receive a second free ebook called"Handbook of Medicinal Herbs"absolutely free.We hate spam! So our strict privacy policy keeps your email address 100% safe & secure.
YOUR OWN FUCKING FAULT addict with syringe, the homeless
via +YOU COULDN`T MAKE IT UP
Every 5 Dane: People in need are lazy
Every five Danes believe, according to a new study that people at the bottom of society are lazy and without willpower. Experts suggest that the political debate affect public support for vulnerable people. Joachim B. Olsen (LA) believe there is too much money to people who are not needy.
Halmtorvet
Photo: Magnus Holm / Polfoto
YOUR OWN FUCKING FAULT addict with syringe, the homeless who sleep in front of a store or the mentally ill man who goes greasy around the street and talking into the air, are to blame for their situation.
The mean one-fifth, according to a survey of attitudes which Epinion made to the Council for Socially Marginalised among 1,011 representatively selected Danes.
Overall, the match 71 percent of Danes that social vulnerability is a problem in Denmark, and a majority think that the area is not given sufficient priority when public money is allocated.
But the question of why people are in need in Denmark, corresponding 20 percent, it is because they are 'laziness and lack of willpower'.
Ivan Christensen, Manager of men in Copenhagen - a day center for vulnerable citizens - believe that Danes are unaware of why some people end up on the street.
"I do not feel these people as lazy at all. They may have difficulty functioning from the conditions that society in general is put together for. But not lazy or indolent, "he says:
"A large part of the people we work with have been able to choose between getting beaten with belts or brace. Where we have had to choose between having blue or red tennis shoes, this group of people often had different options, "says Ivan Christensen.
The President of the Council for Socially Marginalised, Sjursen, indicate that especially the debates on the poor-Carina and Lazy Robert has affected people's views on vulnerable people. At worst, the attitude weaken support for the welfare state, he fears:
"It can lead to a lack of support for socially vulnerable, so they do not get the help they need," assesses Sjursen.
Vulnerability has had only a few choices
Ninna Hoegh, secretariat director of Project Outside in Copenhagen, working with people living on the street, also believe that Danes are unaware of the reasons why some people end up sleeping on benches and in basements.
Her experience is that homeless and vulnerable people really do not have many options. Often they are forced to choose between one or two options - which can even be full or so-so, she says.
"If you are homeless and abuse of alcohol, so one is left with perhaps a choice to either be on the street or in a natvarmestue," she says and continues:
"If you then the same has a mental illness, it can be difficult to choose the sensible people to go inside and get some heat. So take perhaps the bad choice because you can not manage to be indoors, because you do not want to be in an abusive environment, or because you can not manage to be in a place where there are many people. "
The story of Mette
Ninna Hoegh talks about Mette, a former street prostitute, she has encountered in his work in Project Outside:
Mette's mother was a prostitute and drug addict. Mette also had an older sister. One day they were in the woods, but Mette's sister drowned in the forest lake. The mother was subsequently depressed and died later. So Mette ended up on the street because she had seen her mother solve her problems with drugs and prostitution.
"So from a young girl who can not do this, take Mette some choices where I'll say, 'Wow!' But she has after all managed to survive. And actually it's rather odd that it has not gone worse, "says Ninna Hoegh:
"These are a great many stories about these people that I think that there are so many life circumstances, we do not get along when we think, 'This is fucking their own fault'," says Ninna Hoegh.
Young people and men are most
The study by the Council for Socially Marginalised also draw a picture of who who think that the risk is lazy and spineless.
31 percent of young people between 18 and 34 years old consider particularly this. Among middle-aged and older is 16 and 15 percent.
26 percent of Danish men believe that the risk is lazy. It's only 10 percent of women.
25 percent of voters who vote for parties in blue block, believes it is laziness that send people on the street. It believes only 10 percent of red bloc voters.
Jørgen Elm Larsen from the University of Copenhagen has for years researched the poor and vulnerable groups. According to him, it is natural that young judge postponed harder than middle-aged and older people.
"The young are raised in home and school to think that if only they get their act together and do what you have, so everyone has a fair chance to become something in life. And when someone did not do so well, it must be because they do not get their act together, laziness and lack of willpower, "he says.
"When you get older, you know very well that those you know who gets into problems, neither lazy or lack willpower," says Jørgen Elm Larsen.
Many causes
The President of the Council for Socially Marginalised, Sjursen, points out that there are many reasons why people end up on the street.
"It may be the economy, one can have an abuse that cost the box. It can also be mental illness and in fact a combination of many things, "says Sjursen. He believes that vulnerable people are being judged more harshly today than in the past.
"It is my feeling that the debate is getting tougher and tougher. And I think that it affects people's attitudes - especially the part of the debate that MPs stand for, "says Sjursen.
'It is Joachim's sake'
The Chairman of the Parliamentary Committee on Social Affairs, Anne Baastrup (SF), believes that the attitude towards vulnerable citizens is characterized by an extreme polarized debate in which some parties - including the Liberal Alliance - argue that there is economic poverty in Denmark.
In addition, ten years of Liberal government left its mark on the Danes, she says.
"We have up through the 00s had a general narrative that is his own fortune, and that you should just pull themselves together. It affects mainly young, and therefore I think the young people especially believe that one has to get its act together, "says Anne Baastrup.
She is worried about the prospect, if more and more considered homeless as someone who can just get their act together.
"We have an even more polarized society and the welfare state can be eroded because there is no knowledge of what's important. One can even risk countries. If you get sick, what happens to you? "Asks Anne Baastrup rhetorically.
Associate Professor Morten Ejrnæs, which for years has been dealing with poverty and vulnerable human factors point out also, that every time a Dane believes that vulnerable people are lazy, it finds four Danes who do not believe this.
"The Danes by generally well that when things go wrong for people, it's not just because they are lazy and do not bother taking a job - the economic crisis, but coincidences can lead to poverty and distress," says Morten Ejrnæs.
'Many are not needy'
Liberal Alliance Joachim B. Olsen is known for having a tough line against people on benefits.
He stresses that attitudes to socially vulnerable are hard to identify in a survey. But basically, he believes that most people at some point even recognize that a destructive behavior has negative consequences for them, while others never reach the realization.
"Therefore, there may be people who think, 'So are you that you have not prepared." And how could I understand, "said Joachim B. Olsen. He also stresses that the welfare state is under pressure in these years.
The Danes would in fact like to pay for a welfare state that helps 'needy', but we see many who are not needy, says Joachim B. Olsen:
"If more and more thinking about some people who get money from the public, 'No, it is damn not working', then destroys the desire to help to finance the welfare state. The support will disappear if too many get a share of the awards, "says Joachim B. Olsen.
Drug addicts are most repulsive
The study shows that Danes are taking more distance from drug users than from drunks, prostitutes and homeless people - at least when we meet them in public places.
26 percent of Danes feel disgusted when they see a drug addict on the street.
Among young people aged between 18 and 34 years, the 42 percent who are repelled by drug addicts. Only 31 percent of the group feel that way about alcoholics.
"Drug users have mostly been at the bottom of the hierarchy of socially disadvantaged. It has something with the way they behave: they are assumed to steal, and their needles are very many places, "explains Professor Jørgen Elm Larsen.
For both Ninna Hoegh, Project Outside, and the director of Men's Home, Ivan Christensen, the difference in the perception of socially vulnerable absurd.
"I think we think too much worthy or unworthy needy, and that worries me. People will not always either drug addicts, homeless or otherwise. Sometimes they are the whole effort at once. '
Ivan Christensen, Men's Home, agrees:
"There may be a view that people who are addicted to substances are more to blame for their own accident than people living homeless or prostitutes. And the more unworthy needy one perceived as the more repulsive experienced you probably like, "he said.
Associate Professor Morten Ejrnæs is partly agree, but also have another explanation.
"Drug addiction is, after all, far distant for most of us than alcohol abuse. Substance abuse provokes so stronger feelings than alcohol abuse, but also stronger feelings than homelessness, he says:
"Homelessness can awaken compassion, and there are actually more than you'd think, with experience of homelessness."
Thursday, 28 November 2013
3301
http://www.clevcode.org/cicada-3301/
ClevCode
VULNERABILITY RESEARCH, EXPLOIT DEVELOPMENT, REVERSE-ENGINEERING
SEARCH
HomeAboutContactABOUTTEAM3301GCHQPCTFCONTACTSUBSCRIBE TO RSS//3301On January 5th 2012, an image was uploaded to various image boards, possibly originating at the infamous /b/ board at 4chan. When I came across it, I didn’t think much of it at first, but still decided to look into it just in case it turned out to be interesting. I have always had a hard time resisting a challenge. This is the image that was posted:My first thought was that it used steganography to hide a message, and since it was a JPEG image I tried using stegdetect by Niels Provos in case one of the detectable schemes was used. Since stegdetect have not been updated in almost 7 years, I didn’t really get my hopes up that high though, but it is always worth a try. ;) The result can be seen below:je@isis:~/3301/stage_1$ stegdetect 3301.jpg 3301.jpg : appended(61)<[nonrandom][ASCII text][TIBERIVS CLAVDIV]> It did not detect any of the common steganographic schemes, but notified me of 61 appended bytes of ASCII text. Since my next move would have been to use “strings”, I would have discovered this anyway, but stegdetect was kind enough to tell me directly instead. :) So, let’s see what we have:je@isis:~/3301/stage_1$ tail -61c 3301.jpg TIBERIVS CLAVDIVS CAESAR says "lxxt>33m2mqkyv2gsq3q=w]O2ntk" This is quite obviously a shift cipher of some sort (also known as a Caesar cipher), with “lxxt>33″ being the ciphered version of “http://”. A shift cipher replaces each letter in the plaintext with a letter (or in this case, arbitrary ASCII character) with a letter a certain number of positions down the alphabet. So, let’s compare the ASCII values for the cipher text with the ASCII value of the supposed plaintext to see what the shift value is:je@isis:~/3301/stage_1$ perl -e 'print ord("h")-ord("l"),chr(10)' -4 In this particular case, this might have been a bit overkill, since we could just as well have manually counted the distance between h and l in the alphabet. ;) It is probably not a coincidence that Claudius happens to be the 4th Emperor of the Roman Empire, and the shift value happens to be 4, either. To decipher this, a perl oneliner is enough:je@isis:~/3301/stage_1$ echo "lxxt>33m2mqkyv2gsq3q=w]O2ntk" | perl -pne 'chomp;s{(.)}{chr(ord($1)-4)}sgex;$_.=chr(10)' http://i.imgur.com/m9sYK.jpg The image at the URL above can be seen below:It seems like the challenge is a bit harder than a caesar cipher after all. Note that the message contains the words “out” and “guess” though, which could be a hint that we are actually supposed to use the old OutGuess tool to extract the hidden message. Incidentally, OutGuess is also developed by Niels Provos and is available for download from the same site as stegdetect (http://www.outguess.org/). Unfortunately, it seems like stegdetect is only able to detect when the older OutGuess 0.13b has been used and not OutGuess 0.2 (from 2001!). :DUsing outguess 0.2 with the -r option immediately reveals the hidden message in the original image:je@isis:~/3301/stage_1$ outguess -r 3301.jpg 3301.txt Reading 3301.jpg.... Extracting usable bits: 29049 bits Steg retrieve: seed: 228, len: 535The hidden message can be found here.Now things are actually getting interesting. Although the challenge have not been required any particularly advanced skills yet, someone has obviously been putting some work into it. The hidden message says that we should go to the following URL: http://www.reddit.com/r/a2e7j6ic78h0j/The hidden message also includes a so called book code, consisting of a number of lines with two digits separated by a colon on each. The book and more information should be found at the URL above. Book ciphers are ciphers that use a book or a text of some sort as the key to encode a secret message. Traditionally, they worked by replacing words in the plaintext with the locations of words from a book, but in this case it seems more likely that the two digits separated by a colon in the code refers to a line and column number.When visiting the Reddit page, we can make a number of observations. Most notably, there are a number of posts by the pseudonym CageThrottleUs that seem to consist of encoded text, which we can assume to be the book. It looks like an ordinary Caesar cipher may have been used, but on a closer look no shift value results in readable text. It seems most likely that a key of some sort is required to decode the text.Looking closer on the page, we can see that the title is “a2e7j6ic78h0j7eiejd0120″. The URL itself is a truncated version of this. To the right, below the “subscribe” button, the title text is repeated and “Verify: 7A35090F” is written underneath. We can also see pictures of some mayan numbers on the top of the page. Mayan numbers are quite logical, at least from 0-19. A dot equals one, and a vertical line equals five. Two lines thus equals ten, one line with two dots equals seven (5 + 2) and so on. There is also a symbol resembling a rugby ball that equals zero. :)The number sequence that is written using mayan numbers is as follows:10 2 14 7 19 6 18 12 7 8 17 0 19Comparing this with the a2e7j6ic78h0j7eiejd0120 in the title, we can see that numbers below 10 in the sequence above is also found in this string, at the same positions. Also note that instead of 10 we have “a”, instead of 14 we have “e”, and so on up to “j” being 19. Since the title of the page contains 23 characters and there were only 13 mayan numbers is is quite likely that we are supposed to continue converting characters from the title to numbers. This gives us:10 2 14 7 19 6 18 12 7 8 17 0 19 7 14 18 14 19 13 0 1 2 0This could very well be the key required to decode the text. Regarding the “Verify: 7A35090F”, it may refer to any number of things. A PGP key ID is, however, a good assumption since it consists of a 32 bit value normally encoded as eight hex characters and since PGP keys can be used to verify the signature, and thus the authenticity, of messages signed with a PGP key. This could be quite handy, in case the challenge goes on and in case people decide to drop false leads to the people working on it. So, let’s try to import the public key with the ID in question from one of the common PGP key servers:je@isis:~$ gpg --recv-keys 7A35090F gpg: requesting key 7A35090F from hkp server keys.gnupg.net gpg: key 7A35090F: public key "Cicada 3301 (845145127)" imported gpg: Total number processed: 1 gpg: imported: 1 (RSA: 1)The comment for the key mentions 3301, which was used as the signature in the original image. It also includes the word “cicada” and the number 845145127, which may turn out to be significant at a later stage. Note, for instance, that cicadas emerge from their hideouts under earth every 13 or 17 years depending on which kind. By emerging every N:th year, where N happens to be a prime number, cicadas actually minimize the possibility of synchronizing with the life cycles of birds and other animals that prey on them. Also note that 3301 is a prime, and that 845145127 has 3301, 509 and 503 as its prime factors.je@isis:~$ factor 3301 3301: 3301 je@isis:~$ factor 845145127 845145127: 503 509 3301When taking a closer look at the lines of encoded text posted to the reddit page, we also find two images. One named Welcome and the other one Problems?. By using OutGuess again, we find another couple of hidden messages:je@isis:~/3301/stage_2$ outguess -r welcome.jpg welcome.txt Reading welcome.jpg.... Extracting usable bits: 326276 bits Steg retrieve: seed: 58, len: 1089 je@isis:~/3301/stage_2$ cat welcome.txt -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - From here on out, we will cryptographically sign all messages with this key. It is available on the mit keyservers. Key ID 7A35090F, as posted in a2e7j6ic78h0j. Patience is a virtue. Good luck. 3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPBRz7AAoJEBgfAeV6NQkP1UIQALFcO8DyZkecTK5pAIcGez7k ewjGBoCfjfO2NlRROuQm5CteXiH3Te5G+5ebsdRmGWVcah8QzN4UjxpKcTQRPB9e /ehVI5BiBJq8GlOnaSRZpzsYobwKH6Jy6haAr3kPFK1lOXXyHSiNnQbydGw9BFRI fSr//DY86BUILE8sGJR6FA8Vzjiifcv6mmXkk3ICrT8z0qY7m/wFOYjgiSohvYpg x5biG6TBwxfmXQOaITdO5rO8+4mtLnP//qN7E9zjTYj4Z4gBhdf6hPSuOqjh1s+6 /C6IehRChpx8gwpdhIlNf1coz/ZiggPiqdj75Tyqg88lEr66fVVB2d7PGObSyYSp HJl8llrt8Gnk1UaZUS6/eCjnBniV/BLfZPVD2VFKH2Vvvty8sL+S8hCxsuLCjydh skpshcjMVV9xPIEYzwSEaqBq0ZMdNFEPxJzC0XISlWSfxROm85r3NYvbrx9lwVbP mUpLKFn8ZcMbf7UX18frgOtujmqqUvDQ2dQhmCUywPdtsKHFLc1xIqdrnRWUS3CD eejUzGYDB5lSflujTjLPgGvtlCBW5ap00cfIHUZPOzmJWoEzgFgdNc9iIkcUUlke e2WbYwCCuwSlLsdQRMA//PJN+a1h2ZMSzzMbZsr/YXQDUWvEaYI8MckmXEkZmDoA RL0xkbHEFVGBmoMPVzeC =fRcg -----END PGP SIGNATURE----- je@isis:~/3301/stage_2$ gpg --verify welcome.txt gpg: Signature made Thu 05 Jan 2012 04:46:03 AM CET using RSA key ID 7A35090F gpg: Good signature from "Cicada 3301 (845145127)" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 6D85 4CD7 9333 22A6 01C3 286D 181F 01E5 7A35 090F je@isis:~/3301/stage_2$ outguess -r problems.jpg problems.txt Reading problems.jpg.... Extracting usable bits: 256999 bits Steg retrieve: seed: 194, len: 1041 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The key has always been right in front of your eyes. This isn't the quest for the Holy Grail. Stop making it more difficult than it is. Good luck. 3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPCBl3AAoJEBgfAeV6NQkPo6EQAKghp7ZKYxmsYM96iNQu5GZV fbjUHsEL164ZLctGkgZx2H1HyYFEc6FGvcfzqs43vV/IzN4mK0SMy2qFPfjuG2JJ tv3x2QfHMM3M2+dwX30bUD12UorMZNrLo8HjTpanYD9hL8WglbSIBJhnLE5CPlUS BZRSx0yh1U+wbnlTQBxQI0xLkPIz+xCMBwSKl5BaCb006z43/HJt7NwynqWXJmVV KScmkpFC3ISEBcYKhHHWv1IPQnFqMdW4dExXdRqWuwCshXpGXwDoOXfKVp5NW7Ix 9kCyfC7XC4iWXymGgd+/h4ccFFVm+WWOczOq/zeME+0vJhJqvj+fN2MZtvckpZbc CMfLjn1z4w4d7mkbEpVjgVIU8/+KClNFPSf4asqjBKdrcCEMAl80vZorElG6OVIH aLV4XwqiSu0LEF1ESCqbxkEmqp7U7CHl2VW6qv0h0Gxy+/UT0W1NoLJTzLBFiOzy QIqqpgVg0dAFs74SlIf3oUTxt6IUpQX5+uo8kszMHTJQRP7K22/A3cc/VS/2Ydg4 o6OfN54Wcq+8IMZxEx+vxtmRJCUROVpHTTQ5unmyG9zQATxn8byD9Us070FAg6/v jGjo1VVUxn6HX9HKxdx4wYGMP5grmD8k4jQdF1Z7GtbcqzDsxP65XCaOYmray1Jy FG5OlgFyOflmjBXHsNad =SqLP -----END PGP SIGNATURE----- je@isis:~/3301/stage_2$ gpg --verify problems.txt gpg: Signature made Sat 07 Jan 2012 11:07:51 AM CET using RSA key ID 7A35090F gpg: Good signature from "Cicada 3301 (845145127)" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 6D85 4CD7 9333 22A6 01C3 286D 181F 01E5 7A35 090FThe messages verifies both our assumptions, since they are indeed signed using the key ID 7A35090F and since the second one specifically says that the key “has always been right in front of your eyes”. In other words, it is likely to consist of the numbers we discovered being encoded as characters in the title of the page. The first message also specifically states that all messages from now on will be signed using the PGP key with ID 7A35090F.All that remains now is to figure out which encoding scheme has been used so that we can apply the key to the text. Since a shift cipher was used in the original image (although it was used as a decoy), perhaps the numbers are different shift values. In other words, for each line of text, shift/rotate the first letter ten steps in the alphabet, rotate the second letter two steps, the third letter 14 steps, and so on, to get the plaintext. Implementing this in C results in the following:je@isis:~/3301/stage_2$ cat decipher.c #include <stdio.h> #include <ctype.h> int main(void) { unsigned char key[] = { 10, 2, 14, 7, 19, 6, 18, 12, 7, 8, 17, 0, 19, 7, 14, 18, 14, 19, 13, 0, 1, 2, 0 }; int c, i = 0; while ((c = getchar()) != EOF) { if (isalpha(c)) { int base, off; if (isupper(c)) base = 'A'; else base = 'a'; off = c - base - key[i++ % sizeof(key)]; if (off < 0) off += 26; c = base + off; } else if (c == '\n') i = 0; putchar(c); } return 0; } je@isis:~/3301/stage_2$ gcc -o decipher decipher.c -O -Wall -ansi -pedantic je@isis:~/3301/stage_2$ head -3 reddit.txt Ukbn Txltbz nal hh Uoxelmgox wdvg Akw; hvu ogl rsm ar sbv ix jwz mjotukj; mul nimo vaa prrf Qwkkb aak kau ww Ukpsf, ogq Kzpox vvl luf yh Qsrjfa, hvu Ktp hzs lbn ph Kipsy; ttv Sdmehpfjsf tad igr je@isis:~/3301/stage_2$ ./decipher < reddit.txt | head -3 King Arthur was at Caerlleon upon Usk; and one day he sat in his chamber; and with him were Owain the son of Urien, and Kynon the son of Clydno, and Kai the son of Kyner; and Gwenhwyvar and her The file "reddit.txt" consists of the lines posted to the reddit page so far, in the order that they have been posted. Note that this is not in the exact order that they are shown on the reddit page. As you can see, our assumption was correct and we can now decipher every line of text that has been posted, and try to apply the book code that we got in the message hidden in the original image.Using a small bash script, we can apply the book code to the text from reddit to retreive yet another hidden message:je@isis:~/3301/stage_2$ ./decipher < reddit.txt > reddit-deciphered.txt je@isis:~/3301/stage_2$ cat reddit-decode.sh #!/bin/bash while read line; do row=`echo $line | cut -d: -f1` col=`echo $line | cut -d: -f2` head -n$row reddit-deciphered.txt | tail -n1 | head -${col}c | tail -1c done < bookcode.txt echo je@isis:~/3301/stage_2$ ./reddit-decode.sh Call us at us tele phone oumBer two one four thsee nine oi nine si oh ihhtAlthough we can easily see which phone number is being refered to, it's obvious that the output is a bit garbled. For the sake of completeness, let's look into what the cause might be. The first letter that is garbled is the "n" in number that has been turned into an "o", then the "r" in three which have been turned into an "s" and so on. The upper case "B" may have been intended though, although it seems a bit off. There is actually a lower case "b" on the same line that is used for encoding the upper case "B", but the upper case one comes first.When looking at the line corresponding to the "n" turning into an "o" (line 26, column 65), we can see that there is actually an "n" right before the "o" at column 65 (from the name "Kynon"). Looking further down, at the line corresponding to the "r" turning into an "s" (line 48, column 43), we can see that the expected "r" is right before "s" on this line as well (from the word "daggers").Another thing in common for these particular lines of text is that they include a period somewhere before the character that has been decoded incorrectly. If we assume that periods, which end sentences, should count as two characters instead of one when applying the book code we get this, which looks a bit neater:je@isis:~/3301/stage_2$ perl -i -pne 's/\./. /g' reddit-deciphered.txt je@isis:~/3301/stage_2$ ./reddit-decode.sh Call us at us tele phone numBer two one four three nine oh nine six oh eightSo, to continue the challenge we need to call the (214) 390-9608, a Texas based phone number. Whoever is behind this challenge, they have obviously put some effort into it. :)When calling the number, one is (or rather, was, the number has now been deactivated) greeted by the following message:"Very good. You have done well. There are three prime numbers associated with the original final.jpg image. 3301 is one of them. You will have to find the other two. Multiply all three of these numbers together and add a .com to find the next step. Good luck. Goodbye."When examining the PGP key, we already noted that it included the number 845145127 in the description, and that this is the product of 3301, 503 and 509. When looking at the metadata for the original image, we also note this:je@isis:~/3301/stage_1$ exiftool 3301.jpg | grep 50[39] Image Width : 509 Image Height : 503 Image Size : 509x503Seems like we've solved this stage as well, now let's head to http://845145127.com/ to find the next part of the challenge. :) When I first arrived at the http://845145127.com/ site, it just displayed an image of a cicada and a countdown. Using OutGuess again, the following signed message could be extracted from the cicada image:-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 You have done well to come this far. Patience is a virtue. Check back at 17:00 on Monday, 9 January 2012 UTC. 3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPCKDUAAoJEBgfAeV6NQkPf9kP/19tbTFEy+ol/vaSJ97A549+ E713DyFAuxJMh2AY2y5ksiqDRJdACBdvVNJqlaKHKTfihiYW75VHb+RuAbMhM2nN C78eh+xd6c4UCwpQ9vSU4i1Jzn6+T74pMKkhyssaHhQWfPs8K7eKQxOJzSjpDFCS FG7oHx6doPEk/xgLaJRCt/IJjNCZ9l2kYinmOm7c0QdRqJ+VbV7Px41tP1dITQIH /+JnETExUzWbE9fMf/eJl/zACF+gYii7d9ZdU8RHGi14jA2pRjc7SQArwqJOIyKQ IFrW7zuicCYYT/GDmVSyILM03VXkNyAMBhG90edm17sxliyS0pA06MeOCjhDGUIw QzBwsSZQJUsMJcXEUOpHPWrduP/zN5qHp/uUNNGj3vxLrnB+wcjhF8ZOiDF6zk7+ ZVkdjk8dAYQr62EsEpfxMT2dv5bJ0YBaQGZHyjTEYnkiukZiDfExQZM2/uqhYOj3 yK0J+kJNt7QvZQM2enMV7jbaLTfU3VZGqJ6TSPqsfeiuGyxtlGLgJvd6kmiZkBB8 Jj0Rgx/h9Tc4m9xnVQanaPqbGQN4vZF3kOp/jAN5YjsRfCDb7iGvuEcFh4oRgpaB 3D2/+Qo9i3+CdAq1LMeM4WgCcYj2K5mtL0QhpNoeJ/s0KzwnXA+mxBKoZ0S8dUX/ ZXCkbOLoMWCUfqBn8QkQ =zn1y -----END PGP SIGNATURE-----Just like before, the message is signed using the Cicada 3301 key. The challenge so far have been a quite fun, and rather different, experience and I'm looking forward to see what comes next.When the countdown was finished, at 17:00 UTC January 9 2012, it was replaced by strings of digits resembling GPS coordinates. Also, the image of the cicada now contained another signed text containing the same GPS coordinates as on the web page, except for two that were only on the webpage (37.577070, 126.813122 and 36.0665472222222, -94.1726416666667):-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 52.216802, 21.018334 48.85057059876962, 2.406892329454422 48.85030144151387,2.407538741827011 47.664196, -122.313301 47.637520, -122.346277 47.622993, -122.312576 37.5196666666667, 126.995 33.966808, -117.650488 29.909098706850486 -89.99312818050384 25.684702, -80.441289 21.584069, -158.104211 - -33.90281, 151.18421 3301 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPChn7AAoJEBgfAeV6NQkPZxMP/05D9TkSpwRaBXPqYthuyqxx uo+ZDyr/yVIlAdurTBiWb3aGxKJjtWg/vlcHcatK0TGL2qaHwB/FFZQAaqOyU7Zf DXdpWr8PWoWhpWNYUK8IrOaYu1SmWlJnkTdUSzGrX0lbwjwMmJJoPNS7CJuO6MaA 2GIwpv2G7lYqnH3xeX3kzGlPMsVb/wucKRjobsbdbreh1SNuQuRnhfe4s+oHTTqs XjtGL/VhBI0DUAdfLqW7z4C+Gvbx6okC8x5Sj2N2UTJOiyMYXz5+QyHoA6fo9g5V 6zodNpx/RvxuZP2Ssc9TqERgTo5FjRBpON1vjDalHgg0H2Fus2LK3gh+NZfj1i5b Oqa4Cqd9epI2pe+glXn86j9crS+2BEAr1cguqAFepvI9sdFEornDja4VXwDtUdM8 9hMVkU5NiTUYfvxZbL6W7rHIF7wxjGUwpe1ViuixG+cKNfv0enrt60PrtDByBOWI 9LLIUE0cB5HDT1xrczZ/55CtuM3Zf07/l0nLFdmgR0oa8KUA9gWcPs6S1EpBa185 VcyOTqbpIPiT8neiJEkXarbJeFk15m1P73Fr8XZxdj7EHK0aOwGYcc8e4PmW/dSh gcrSNXiePCbcRVRD2n9L47C0LkNyRpoBkmjvtpcRyp5ISe+0xcx/QI+gc1lkSijC 89qV+ymCHae1RiSDxVbd =ZJ37 -----END PGP SIGNATURE-----Using Google Maps (maps.google.com) I could search for each of these locations, and in most cases even get a street view. The locations were spread out around the world without any obvious connection (USA, Poland, France, South Korea and Australia), except for perhaps each of them being home to some talented hackers. At this point I thought it would be the end of the game for me, since I am far away from all of these locations.I was still very curious on how the challenge would continue though, and found that there are groups of people working on this from all over the world. One of these groups had set up an IRC channel at n0v4.com, and managed to get people to check out the locations at the specified GPS coordinates. What they found was notes attached to lightpoles, with the cicada image and a QR code. When scanning the QR code, they got image URLs with a black and white image of a cicada and the text "everywhere" and "3301". Each image also contained a hidden signed message. Even though there were 14 locations, only two different messages were used though.One of them had with the following text at the top of the message (full message here):In twenty-nine volumes, knowledge was once contained. How many lines of the code remained when the Mabinogion paused? Go that far in from the beginning and find my first name.The other one had this text (full message here here):A poem of fading death, named for a king Meant to be read only once and vanish Alas, it could not remain unseen.They both also included a 22 line book code. Both of them included the text "the product of the first two primes" at line 3 and 15, and one of them also included the text "the first prime" at line 8. This probably means that the characters on these positions should be replaced with the numbers described. Note that the definition of a prime number is a natural number greater than 1, with no positive divisors other than 1 and itself. This means that the first two prime numbers are two and three.The three lines of text in each message seemed likely to be a hint to which book/text to use as the key for the included book code. By googling for some keywords in the second message (poem fading death read only once vanish), the Wikipedia entry for a 300-line poem by William Gibson is among the first hits. The poem is called Agrippa (a book of the dead) and according to Wikipedia "Its principal notoriety arose from the fact that the poem, stored on a 3.5" floppy disk, was programmed to erase itself after a single use; similarly, the pages of the artist's book were treated with photosensitive chemicals, effecting the gradual fading of the words and images from the book's first exposure to light.". This fits the description perfectly.When googling for william gibson agrippa, the first hit ishttp://www.williamgibsonbooks.com/source/agrippa.asp. Taking this text, including line breaks, as the key for the book code results in the following:je@isis:~/3301/stage_3$ cat agrippa-decode.sh #!/bin/bash while read line; do if [ "$line" = "the product of the first two primes" ]; then echo -n 6 else row=`echo $line | cut -d: -f1` col=`echo $line | cut -d: -f2` head -n$row agrippa.txt | tail -n1 | head -${col}c | tail -1c fi done < agrippa-code.txt echo je@isis:~/3301/stage_3$ ./agrippa-decode.sh sq6wmgv2zcsrix6t.onionJudging by the ".onion" at the end of the string, this is actually an anonymous hidden service in the Tor network. Unfortunately, by the time I arrived at this stage the Tor service was not available anymore. 3301 had concluded the last couple of messages with "You've shared too much to this point. We want the best, not the followers. Thus, the first few there will receive the prize.", so it was probably first come first served. The ones who were lucky enough to arrive in time (most of which did not solve much or any of this challenge themselves, since people were sharing their solutions) got to enter their e-mail addresses and were informed that they would be contacted in few days.By this time, someone noticed that the DNS entry for 845145127.com had been removed. By using the IP (75.119.203.244) it was found that the page that recently had GPS coordinates had changed yet again, to a seemingly empty page. On a closer look it turned out to consist entirely of spaces, tabs and linebreaks. Since every line contained a multiple of eight spaces/tabs, it seemed likely to be a plain binary code. This was confirmed by:je@isis:~/3301$ wget -q -O- http://75.119.203.244/ > 3301.html je@isis:~/3301$ perl -pne 's/[^\s]//g;s/\t/0/g;s/ /1/g;s{([01]{8})}{chr(oct("0b$1)"))}sgex' < 3301.html -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 162667212858 414974253863 598852142735 876873892385 935691396441 316744223127 427566844663 644169769482 889296759263 963846244281 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPDRkvAAoJEBgfAeV6NQkPVuMP/3ZyAgwsko/B2T9Ew1yqAKVy K9//wIWCRvMyZ4k79ApqvOJAlezgHTsAM8XG/I71bAG+2wMOXNJfTj/SFONEEbS5 BOp9UP7LHn1j3NKoESrDzsKd+u3oHoNnhs628aLrc8uDqbn/6DNUnObu5Tn3unu0 zZ3NjSs/A5QQX8O56RsK81eSJ2fifbr4NYfHBeUTeVe17nsr48WQI7qc9UVWlPsM 91FWsvhX+WohX8DyFWJmtz0lLvmh3jN+oE8WFPTVbcVCM+eiDt0TqkUNlmq/fxbd X2Sbs8zMxDXNQWrw58TcSC6oLfXSXZnjh8uTMwrQ0tNdRXHDndgPiurXz62XjVjf 4AhSXBoXF9CHTOyGGEqvfNvFMKyz968iMZDXDNBrM8pkxx1xBHhAnoEznVpeMhII +IfBTnV8x9lSNgFhmham5eEZlWvqRidqes8EAriqGA6uZokCq7X1IeMHo52ACWmP 2bJsCV5wZDc52c3JnwKe+cAcbsA4OWCNEH29lAsgFw5079BP8lkpY3AH2+8kqs0X QvqsaMuUq5ZHEaZMgdD0VKYlRrKdhOiDjtJVxoXk1b7YBOV8dZZBXJbEIbTvaof4 yhgUObovx/VFGmsenp+j3nBCxgEO22SgNW3B3pN0yuIMCqccWEZ1nME/QOwLa85n HOmElIXvK13Q9m545RtP =Q1Fy -----END PGP SIGNATURE-----The message simply contains ten different 12 digit numbers. As it turns out, each of these correspond to image URLs such as: http://75.119.203.244/NUMBER.jpgEach of these images contains a hidden message that can be extracted with outguess, and it turns out that it's the same messages that could be extracted from the images found through QR codes on notes at the GPS-coordinates mentioned earlier. Turns out we didn't have to be at one of those locations after all. :)Regarding the remaining code, it is very likely to refer to the same .onion site as before. Just to be sure, and not to leave out any piece of the puzzle, it would be nice to solve that one too though.My thoughts so far are these:"In twenty-nine volumes, knowledge was once contained" may refer to the 11th edition of Encyclopedia Britannica, which consisted of exactly 29 volumes and that is now in the public domain and available for download since it was released back in 1910-1911.Regarding "How many lines of the code remained when the Mabinogion paused?", note that the text posted to the reddit page is from "The Lady of the Fountain", which is the first out of eleven stories from medieval Welsh manuscripts in the collection called the Mabinogion. Also note that there was a pause for about 24 hours after the 65:th encoded line of text was posted to the reddit page. After that, new encoded lines have been posted about every 6th or 7th hour.Assuming the code will continue until "The Lady of the Fountain" is finished, we will need to figure out the total number of lines in that story. To do that, we need to find the text that 3301 uses as their source, so that line breaks are placed on the same positions. After a bit of searching around it turns out that the source that 3301 uses is from Project Gutenberg (here). Blank lines are discarded, and lines with only one word on them are being appended to the preceding line. Applying those rules to the entire text of "The Lady of the Fountain" results in a total of 833 lines. Thus, the number of lines of code that remained when the Mabinogion paused is 833 - 65 = 768 (which also happens to be 512+256, but I guess that may be a mere coincidence after all).Finally we have "Go that far in from the beginning and find my first name", which could mean a number of things. My guess is that we should go 768 words, sentences, word definitions, characters or pages into the 11th edition of Encyclopedia Britannica. Question is where we are supposed to go from there, since it ends with "and find my first name". By this, I assume we should only find a certain name at this particular position, and then from this name find the actual text to use as the key for the book code.I also noticed that the code for this part only use 27 lines, with columns ranging from 1-66 and many columns being above 30-40. This rules out most poems, that usually don't have long lines. It could very well be a text straight from the Encyclopedia Britannica, however. Due to the large number of possibilities I have not looked into it much further than this, and so far I don't think anyone have come up with the solution for this particular puzzle. So, anyone up for it? :)1.39k344
DISCUSSION
40 Responses to “3301”
Contact me :)POSTED BY JEAN | 2012-01-14, 11:11REPLY TO THIS COMMENThiPOSTED BY ISAG MAJE | 2013-11-27, 22:13REPLY TO THIS COMMENTIm working on it….POSTED BY THE DOCTOR | 2012-01-16, 21:15REPLY TO THIS COMMENTI love your work.boss@tormail.netPOSTED BY BOSS | 2012-01-19, 10:15REPLY TO THIS COMMENTI have no clue about anything, but I just came up here and I want to congratulate you on your shocking skills and intelligence. Great work, sir.(do not suspect, this comment is not a hint xD )POSTED BY VANDER | 2012-01-19, 10:38REPLY TO THIS COMMENT8301POSTED BY A | 2013-11-28, 03:55REPLY TO THIS COMMENTif there is anything i can do to help please let me know, it would be a shame not to see this through seeing how much effort you have put iPOSTED BY MARTY | 2012-01-19, 13:42REPLY TO THIS COMMENTIt´s sad that this requires Internet/Coding skills, the search for highly intelligent people should not be limited for those which have this skills, but for everyone.But maybe they search that kind of people, who ever “they” are.My guess is that they are from 4Chan,Reddit or something similar.Irc Channels, Coding and things set up at different places on the earth which is kind of easy if you ask the right people on the internet:Anyway it kind of motivates me, i will try to solve it even without greater knowlege this matter.POSTED BY JANUS | 2012-01-19, 14:13REPLY TO THIS COMMENTJanus, every thing here can be done by hand (aside from the PGP verification and outguess). Je’s use of UNIX utilities to solve this is a convenience, not a necessity. The same can be done with almost any file; manipulating text in a shell is one of the most fun and easy ways to do so.Now I will concede that later in the puzzle, things do get more technical. To the point at which this narrative terminates, however, there is little need of the skills you mention.POSTED BY MARCUS WANNER | 2012-01-25, 00:09REPLY TO THIS COMMENT“Thus, the number of lines of code that remained when the Mabinogion paused is 833 – 65 = 768″Don’t know if it’s important, but the first edition of Encyclopedia Britannica was published in 1768. So maybe we shouldn’t be looking at 11th edition, but first. The question – where to find it? :DI just found out about this today, so I still haven’t worked anything up.POSTED BY PROCYON | 2012-01-24, 04:30REPLY TO THIS COMMENTIn the preface of the first edition, in the place of 768th word is a sign for repetition, since the essay was written by the same author as the previous one. The name of the author is Charles Alston. Don’t know if I’m helping or spamming, tho.POSTED BY PROCYON | 2012-01-24, 04:57REPLY TO THIS COMMENTWill you update this post if you find out more about this? Who do you think are “they”?POSTED BY KALA | 2012-01-25, 00:49REPLY TO THIS COMMENTDo you know anything about what happened from the point the e-mails have been sent on? The few people who got to the Tor site on time and submitted their addresses got an RSA encrypted message to decrypt. After that, I read there was a midi file with a hidden message to report back. What about after that? People suddenly got so secretive about sharing info. It’s like it’s really serious business. What the hell?POSTED BY MARIA | 2012-01-25, 05:08REPLY TO THIS COMMENTIt is likely a government or Anonymous recruiting…. personally i would let go.[WORDPRESS HASHCASH] The poster sent us ’0 which is not a hashcash value.POSTED BY SHIZZNIT | 2012-01-30, 14:29REPLY TO THIS COMMENTYou havnt heard anything more because the people who reported receiving those emails have dropped out of view/do not want to participate.It’s pretty suspicious of you ask me, there was one guy who was posting non stop about his progress, received the said email, and was never heard from again.It’s been speculated that it’s a hiring process for a highly funded hacker program that plans to permanent destroy Facebook…..they must have been paid a lot If they kept their mouths shutPOSTED BY KIERAN | 2012-02-01, 14:30REPLY TO THIS COMMENTAny update on this? What about the midi file?I was able to place my email on the 2nd TOR site after the first one was shut down…i never received an email tho :(POSTED BY FROP | 2012-02-06, 16:18REPLY TO THIS COMMENTTo those who have followed this game as I have from the beginning, I just wanted to take a moment and let you know that the “game” is over. Those who have made it in the end have received their final emails, which are confidential (however, if you search pastebin, you might just find some people who like to break the rules).As one of the players in this game, this has been an exciting experience. Now on to other things…POSTED BY NOONE | 2012-02-07, 22:11REPLY TO THIS COMMENTHello, i must contact you. We have many theories to discuss. Many.POSTED BY HOLLIE | 2013-10-03, 15:35REPLY TO THIS COMMENTIs there anyone who can post a link to proof or speculation of where this originated?POSTED BY ...AM... | 2012-02-22, 03:55REPLY TO THIS COMMENTThe original final.jpg image was posted to several image hosting sites on January 5th. It was _not_ posted on 4chan. Source: 3301. Proof: SO. No, this was not in a PGP-signed message and no, you’re not going to find it anywhere public.As for the resolution, I can confirm that it was recruiting and the results were worth it. We’re now working behind the scenes to save the Internet. Wish us luck!While I’m here, I’d be happy to answer any other questions people have.No, I’m not supposed to be telling you these things.[WORDPRESS HASHCASH] The poster sent us ’0 which is not a hashcash value.POSTED BY BETYOUWISHYOUKNEW |2012-03-27, 04:47REPLY TO THIS COMMENTThe original image may not have been posted on 4chan _first_ but it eventually was. I know, I saw it. As for finding it publicly, just scroll up.Since you claim you’ll answer questions, could you provide an example of how this “organization” is currently working to save the internet?I await your reply.POSTED BY INTRIGUED | 2012-04-18, 01:40REPLY TO THIS COMMENTI don’t want to sound too paranoid but maybe it was an elaborate attempt setup by one or more agency to flush out hackers or potential trouble makers.It was mentioned in the article that the GPS coordinates were in a number of specific countries that all have hackers living in them, it might explain why the email recipients became silent.Whatever it is the original creators of 3301 knew how this would end and tried to cover it up. This stinks to high heaven I hope people haven’t given up.POSTED BY MILES | 2012-05-29, 19:50REPLY TO THIS COMMENTBetyouwishyouknew, ur valid but we’re saving the Internet?!Are u serious?POSTED BY SUPERORGANISMUS | 2012-06-09, 13:53REPLY TO THIS COMMENTgreat stuff matePOSTED BY CURIOUS CHAP | 2012-08-06, 16:43REPLY TO THIS COMMENThttp://www.cicadasecurity.com/ no?POSTED BY KABUUM | 2012-09-07, 16:03REPLY TO THIS COMMENTGreat job, but I think ‘intellect’ was not of the essence here other than the reasoning that you were conditioned to apply with your knowledge regarding image dissection. Good job, but this whole challenge seems like a pre-orchestrated load of bullshit.I have seen many pastas in my day, but this one is the most clever out of all of them. It is a pasta embedded within a pasta that was unwrapped by another copypasta.Good job on entertaining an avid /lit/ lurker. At least I got to read something tonight.POSTED BY SAGE | 2012-11-14, 08:31REPLY TO THIS COMMENTDear.My name is Terra.I just want to hold this message short.Im putting up a team together to unravel this riddle. We are now 3 men strong with the following specialists:Ancient HistoryAnagramcontact holder (has many friends who can do sort of things)Cursormania@live.nlThis is my email. we want you in the team, all of you! we need to unravel this riddle.contact me so we can set up a meeting via skype, Teamspeak or anything else.Cursormania@live.nlPOSTED BY TERRA | 2012-11-14, 11:10REPLY TO THIS COMMENT“When taking a closer look at the lines of encoded text posted to the reddit page, we also find two images. One named Welcome and the other one Problems?. By using OutGuess again, we find another couple of hidden messages”You jumped past the hidden image in the problems image, there’s a 3D image in it, and from the encoded text taken from it “The key has always been right in front of your eyes.This isn’t the quest for the Holy Grail. Stop makingit more difficult than it is.Good luck.3301″It’s referring to that image, of a cup, or of something that can hold a volume.POSTED BY AARON | 2013-01-04, 09:39REPLY TO THIS COMMENTsomeone mentioned above the name Charles Alston.http://en.wikipedia.org/wiki/Charles_Alstonsearching at google for “charles alston cicada” i found this http://en.wikipedia.org/wiki/Legacy_of_Benjamin_BannekerSeventeen-year cicadaIn 2004, during a year in which Brood X of the seventeen-year periodical cicada (Magicicada septendecim) emerged from the ground in large numbers, columnist Courtland Milloy wrote in The Washington Post an article entitled “Time to Create Some Buzz for Banneker”.[40] Milloy claimed that Banneker “is believed to have been the first person to document this noisy recurrence” of the insect. Milloy noted that Banneker had recorded in a journal published around 1800 that the “locusts” had appeared in 1749, 1766 and 1783. Milloy further noted that Banneker had predicted that the insects would return in 1800.POSTED BY ME | 2013-01-13, 23:17REPLY TO THIS COMMENTYou are very smart kid keep it upPOSTED BY DAISY | 2013-03-10, 14:20REPLY TO THIS COMMENTYou are brilliant I want to congratulate you on you intelligence I now it’s over now but I would have never figure that out at the endPOSTED BY DANIELLE | 2013-03-10, 14:24REPLY TO THIS COMMENTAll I can say is wowPOSTED BY ME | 2013-03-10, 14:27REPLY TO THIS COMMENTWow looking back at this year later and still no answer? Did you guys give up already?POSTED BY GABRIEL | 2013-10-18, 02:16REPLY TO THIS COMMENTGabriel: To continue, one would have had to be one of the first visitors to the Tor hidden service so one could enter an e-mail address to receive further pieces of the puzzle. Unfortunately, my sleep-wake cycle resulted in me missing that window of opportunity. :)Regarding the remaining book code, i.e, one of the two possible hidden messages that could be retrieved by visiting one of the 14 locations pointed out by the GPS coordinates, I am quite certain that it decodes to the same .onion address as the other book code.The reasoning behind this is that it would be incongruent with the rest of this puzzle, which have had multiple clues leading in the same direction in each step, if one would have to retrieve messages from several locations to go to the next step.Looking at the book codes, one can also see that they are of the same length, and that they have the same digits at the same locations in the string (..6….2……6…….).Since there was no chance of continuing the puzzle, I have not looked at it since.However, it has recently come to my attention that there was actually a new image posted one year after the first one, with a continuation of the puzzle. Assuming Cicada 3301 are still “recruiting” I think the chances are good that they will post yet another image on 4th of January 2014. :)POSTED BY JOEL ERIKSSON | 2013-10-29, 13:38REPLY TO THIS COMMENTThe “key” is my middle initial F, the image is shaped like an F. Doesn’t anyone remember Jumping Jack Flash. It’s in the key of F!POSTED BY TODD F RODRIGUE | 2013-11-25, 19:54REPLY TO THIS COMMENTif you want to know Cicada, chase after bitcoin ;)POSTED BY 5THOFNOV | 2013-11-26, 17:39REPLY TO THIS COMMENTDid it ever occur to anyone else that the ‘recruiting’ is in symbiosis and or somewhat following the actual brooding period of cicadas?Whereas there will be no further ‘ARG’/'recruiting’ until 2016(Brood V).http://www.cicadas.info/new_body_2013.jpgPOSTED BY AISOPOS | 2013-11-28, 01:22REPLY TO THIS COMMENT
Trackbacks/Pingbacks
PINGBACK: LINKS, LINKS, LINKS! - REDEFINING THE NARRATIVE | REDEFINING THE NARRATIVE - 2013-01-19PINGBACK: MESSAGGIO CON ENIGMA - PAGINA 2 - 2013-10-29PINGBACK: CICADA 3301. MYTHOS, KAMPAGNE, ODER RÄTSEL? | THE LASTBLOG - 2013-11-28
LEAVE A COMMENT
Your email address will not be published. Required fields are marked *NAME * EMAIL * WEBSITE 1 × six = COMMENT You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>
RECENT POSTS
Available for projectsOldies but goldies #2Oldies but goldiesARM payload developmentTeam ClevCode
ARCHIVES
October 2013 (1)April 2013 (2)March 2013 (2)February 2012 (1)December 2011 (3)May 2011 (5)April 2011 (7)
CATEGORIES
Codegate (1)Exploit Development(2)GCHQ (3)Plaid CTF (12)Research (1)Team (1)Uncategorized (1)
PEOPLE
Dion BlazakisHalvar FlakeIlfak GuilfanovJoshua J. DrakeRolf RollesSean Heelan
TOOLS
GDBIDA ProOllyDbgVimCopyright © 2011-2013 Joel Eriksson. All rights reserved.
Wednesday, 27 November 2013
Evilbible
http://www.evilbible.com/Biblical%20Contradictions.htm
Biblical Contradictions Here is a short and incomplete list of Biblical contradictions which were obtained from postings in internet newsgroups. Unfortunately I did not record who posted them or if they have a web site with a longer and more complete list. If you like this page you might also like Contradictions of the Gospel and thisList of Biblical Contradictions atwww.infidels.org If the Bible was divinely inspired, then why would it have so many really obvious contradictions? Theological doctrines: 1. God is satisfied with his works Gen 1:31 God is dissatisfied with his works. Gen 6:6 2. God dwells in chosen temples 2 Chron 7:12,16 God dwells not in temples Acts 7:48 3. God dwells in light Tim 6:16 God dwells in darkness 1 Kings 8:12/ Ps 18:11/ Ps 97:2 4. God is seen and heard Ex 33:23/ Ex 33:11/ Gen 3:9,10/ Gen 32:30/ Is 6:1/ Ex 24:9-11 God is invisible and cannot be heard John 1:18/ John 5:37/ Ex 33:20/ 1 Tim 6:16 5. God is tired and rests Ex 31:17 God is never tired and never rests Is 40:28 6. God is everywhere present, sees and knows all things Prov 15:3/ Ps 139:7-10/ Job 34:22,21 God is not everywhere present, neither sees nor knows all things Gen 11:5/ Gen 18:20,21/ Gen 3:8 7. God knows the hearts of men Acts 1:24/ Ps 139:2,3 God tries men to find out what is in their heart Deut 13:3/ Deut 8:2/ Gen 22:12 8. God is all powerful Jer 32:27/ Matt 19:26 God is not all powerful Judg 1:19 9. God is unchangeable James 1:17/ Mal 3:6/ Ezek 24:14/ Num 23:19 God is changeable Gen 6:6/ Jonah 3:10/ 1 Sam 2:30,31/ 2 Kings 20:1,4,5,6/ Ex 33:1,3,17,14 10. God is just and impartial Ps 92:15/ Gen 18:25/ Deut 32:4/ Rom 2:11/ Ezek 18:25 God is unjust and partial Gen 9:25/ Ex 20:5/ Rom 9:11-13/ Matt 13:12 11. God is the author of evil Lam 3:38/ Jer 18:11/ Is 45:7/ Amos 3:6/ Ezek 20:25 God is not the author of evil 1 Cor 14:33/ Deut 32:4/ James 1:13 12. God gives freely to those who ask James 1:5/ Luke 11:10 God withholds his blessings and prevents men from receiving them John 12:40/ Josh 11:20/ Is 63:17 13. God is to be found by those who seek him Matt 7:8/ Prov 8:17 God is not to be found by those who seek him Prov 1:28 14. God is warlike Ex 15:3/ Is 51:15 God is peaceful Rom 15:33/ 1 Cor 14:33 15. God is cruel, unmerciful, destructive, and ferocious Jer 13:14/ Deut 7:16/ 1 Sam 15:2,3/ 1 Sam 6:19 God is kind, merciful, and good James 5:11/ Lam 3:33/ 1 Chron 16:34/ Ezek 18:32/ Ps 145:9/ 1 Tim 2:4/ 1 John 4:16/ Ps 25:8 16. God's anger is fierce and endures long Num 32:13/ Num 25:4/ Jer 17:4 God's anger is slow and endures but for a minute Ps 103:8/ Ps 30:5 17. God commands, approves of, and delights in burnt offerings, sacrifices ,and holy days Ex 29:36/ Lev 23:27/ Ex 29:18/ Lev 1:9 God disapproves of and has no pleasure in burnt offerings, sacrifices, and holy days. Jer 7:22/ Jer 6:20/ Ps 50:13,4/ Is 1:13,11,12 18. God accepts human sacrifices 2 Sam 21:8,9,14/ Gen 22:2/ Judg 11:30-32,34,38,39 God forbids human sacrifice Deut 12:30,31 19. God tempts men Gen 22:1/ 2 Sam 24:1/ Jer 20:7/ Matt 6:13 God tempts no man James 1:13 20. God cannot lie Heb 6:18 God lies by proxy; he sends forth lying spirits t deceive 2 Thes 2:11/ 1 Kings 22:23/ Ezek 14:9 21. Because of man's wickedness God destroys him Gen 6:5,7 Because of man's wickedness God will not destroy him Gen 8:21 22. God's attributes are revealed in his works. Rom 1:20 God's attributes cannot be discovered Job 11:7/ Is 40:28 23. There is but one God Deut 6:4 There is a plurality of gods Gen 1:26/ Gen 3:22/ Gen 18:1-3/ 1 John 5:7 Moral Precepts 24. Robbery commanded Ex 3:21,22/ Ex 12:35,36 Robbery forbidden Lev 19:13/ Ex 20:15 25. Lying approved and sanctioned Josh 2:4-6/ James 2:25/ Ex 1:18-20/ 1 Kings 22:21,22 Lying forbidden Ex 20:16/ Prov 12:22/ Rev 21:8 26. Hatred to the Edomite sanctioned 2 Kings 14:7,3 Hatred to the Edomite forbidden Deut 23:7 27. Killing commanded Ex 32:27 Killing forbidden Ex 20:13 28. The blood-shedder must die Gen 9:5,6 The blood-shedder must not die Gen 4:15 29. The making of images forbidden Ex 20:4 The making of images commanded Ex 25:18,20 30. Slavery and oppression ordained Gen 9:25/ Lev 25:45,46/ Joel 3:8 Slavery and oppression forbidden Is 58:6/ Ex 22:21/ Ex 21:16/ Matt 23:10 31. Improvidence enjoyed Matt 6:28,31,34/ Luke 6:30,35/ Luke 12:3 Improvidence condemned 1 Tim 5:8/ Prov 13:22 32. Anger approved Eph 4:26 Anger disapproved Eccl 7:9/ Prov 22:24/ James 1:20 33. Good works to be seen of men Matt 5:16 Good works not to be seen of men Matt 6:1 34. Judging of others forbidden Matt 7:1,2 Judging of others approved 1 Cor 6:2-4/ 1 Cor 5:12 35. Christ taught non-resistance Matt 5:39/ Matt 26:52 Christ taught and practiced physical resistance Luke 22:36/ John 2:15 36. Christ warned his followers not to fear being killed Luke 12:4 Christ himself avoided the Jews for fear of being killed John 7:1 37. Public prayer sanctioned 1 Kings 8:22,54, 9:3 Public prayer disapproved Matt 6:5,6 38. Importunity in prayer commended Luke 18:5,7 Importunity in prayer condemned Matt 6:7,8 39. The wearing of long hair by men sanctioned Judg 13:5/ Num 6:5 The wearing of long hair by men condemned 1 Cor 11:14 40. Circumcision instituted Gen 17:10 Circumcision condemned Gal 5:2 41. The Sabbath instituted Ex 20:8 The Sabbath repudiated Is 1:13/ Rom 14:5/ Col 2:16 42. The Sabbath instituted because God rested on the seventh day Ex 20:11 The Sabbath instituted because God brought the Israelites out of Egypt Deut 5:15 43. No work to be done on the Sabbath under penalty of death Ex 31:15/ Num 15:32,36 Jesus Christ broke the Sabbath and justified his disciples in the same John 5:16/ Matt 12:1-3,5 44. Baptism commanded Matt 28:19 Baptism not commanded 1 Cor 1:17,14 45. Every kind of animal allowed for food. Gen 9:3/ 1 Cor 10:25/ Rom 14:14 Certain kinds of animals prohibited for food. Deut 14:7,8 46. Taking of oaths sanctioned Num 30:2/ Gen 21:23-24,31/ Gen 31:53/ Heb 6:13 Taking of oaths forbidden Matt 5:34 47. Marriage approved Gen 2:18/ Gen 1:28/ Matt 19:5/ Heb 13:4 Marriage disapproved 1 Cor 7:1/ 1 Cor 7:7,8 48. Freedom of divorce permitted Deut 24:1/ Deut 21:10,11,14 Divorce restricted Matt 5:32 49. Adultery forbidden Ex 20:14/ Heb 13:4 Adultery allowed Num 31:18/ Hos 1:2; 2:1-3 50. Marriage or cohabitation with a sister denounced Deut 27:22/ Lev 20:17 Abraham married his sister and God blessed the union Gen 20:11,12/ Gen 17:16 51. A man may marry his brother's widow Deut 25:5 A man may not marry his brother's widow Lev 20:21 52. Hatred to kindred enjoined Luke 14:26 Hatred to kindred condemned Eph 6:2/ Eph 5:25,29 53. Intoxicating beverages recommended Prov 31:6,7/ 1 Tim 5:23/ Ps 104:15 Intoxicating beverages discountenanced Prov 20:1/ Prov 23:31,32 54. It is our duty to obey our rulers, who are God's ministers and punish evil doers only Rom 13:1-3,6 It is not our duty to obey rulers, who sometimes punish the good and receive unto themselves damnation therefor Ex 1:17,20/ Dan 3:16,18/ Dan 6:9,7,10/ Acts 4:26,27/ Mark 12:38,39,40/ Luke 23:11,24,33,35 55. Women's rights denied Gen 3:16/ 1 Tim 2:12/ 1 Cor 14:34/ 1 Pet 3:6 Women's rights affirmed Judg 4:4,14,15/ Judg 5:7/ Acts 2:18/ Acts 21:9 56. Obedience to masters enjoined Col 3:22,23/ 1 Pet 2:18 Obedience due to God only Matt 4:10/ 1 Cor 7:23/ Matt 23:10 57. There is an unpardonable sin Mark 3:29 There is not unpardonable sin Acts 13:39 Historical Facts 58. Man was created after the other animals Gen 1:25,26,27 Man was created before the other animals Gen 2:18,19 59. Seed time and harvest were never to cease Gen 8:22 Seed time and harvest did cease for seven years Gen 41:54,56/ Gen 45:6 60. God hardened Pharaoh's heart Ex 4:21/ Ed 9:12 Pharaoh hardened his own heart Ex 8:15 61. All the cattle and horses in Egypt died Ex 9:3,6/ 14:9 All the horses of Egypt did not die Ex 14:9 62. Moses feared Pharaoh Ex 2:14,15,23; 4:19 Moses did not fear Pharaoh Heb 11:27 63. There died of the plague twenty-four thousand Num 25:9 There died of the plague but twenty-three thousand 1 Cor 10:8 64. John the Baptist was Elias Matt 11:14 John the Baptist was not Elias John 1:21 65. The father of Joseph, Mary's husband was Jacob Matt 1:16 The father of Mary's husband was Heli Luke 3:23 66. The father of Salah was Arphaxad Gen 11:12 The father of Salah was Cainan Luke 3:35,36 67. There were fourteen generations from Abraham to David Matt 1:17 There were but thirteen generations from Abraham to David Matt 1:2-6 68. There were fourteen generations from the Babylonian captivity to Christ. Matt 1:17 There were but thirteen generations from the Babylonian captivity to Christ Matt 1:12-16 69. The infant Christ was taken into Egypt Matt 2:14,15,19,21,23 The infant Christ was not taken into Egypt Luke 2:22, 39 70. Christ was tempted in the wilderness Mark 1:12,13 Christ was not tempted in the wilderness John 2:1,2 71. Christ preached his first sermon on the mount Matt 5:1,2 Christ preached his first sermon on the plain Luke 6:17,20 72. John was in prison when Jesus went into Galilee Mark 1:14 John was not in prison when Jesus went into Galilee John 1:43/ John 3:22-24 73. Christ's disciples were commanded to go forth with a staff and sandals Mark 6:8,9 Christ's disciples were commanded to go forth with neither staffs nor sandals. Matt 10:9,10 74. A woman of Canaan besought Jesus Matt 15:22 It was a Greek woman who besought Him Mark 7:26 75. Two blind men besought Jesus Matt 20:30 Only one blind man besought Him Luke 18:35,38 76. Christ was crucified at the third hour Mark 15:25 Christ was not crucified until the sixth hour John 19:14,15 77. The two thieves reviled Christ. Matt 27:44/ Mark 15:32 Only one of the thieves reviled Christ Luke 23:39,40 78. Satan entered into Judas while at supper John 13:27 Satan entered into him before the supper Luke 22:3,4,7 79. Judas committed suicide by hanging Matt 27:5 Judas did not hang himself, but died another way Acts 1:18 80. The potter's field was purchased by Judas Acts 1:18 The potter's field was purchased by the Chief Priests Matt 27:6,7 81. There was but one woman who came to the sepulchre John 20:1 There were two women who came to the sepulchre Matt 28:1 82. There were three women who came to the sepulchre Mark 16:1 There were more than three women who came to the sepulchre Luke 24:10 83. It was at sunrise when they came to the sepulchre Mark 16:2 It was some time before sunrise when they came. John 20:1 84. There were two angels seen by the women at the sepulchre, and they were standing up. Luke 24:4 There was but one angel seen, and he was sitting down. Matt 28:2,5 85. There were two angels seen within the sepulchre. John 20:11,12 There was but one angel seen within the sepulchre Mark 16:5 86. Christ was to be three days and three nights in the grave Matt 12:40 Christ was but two days and two nights in the grave Mark 15:25,42,44,45,46; 16:9> 87. Holy ghost bestowed at pentecost Acts 1:8,5 Holy ghost bestowed before pentecost John 20:22 88. The disciples were commanded immediately after the resurrection to go into Galilee Matt 28:10 The disciples were commanded immediately after the resurrection to go tarry at Jerusalem Luke 24:49 89. Jesus first appeared to the eleven disciples in a room at Jerusalem Luke 24:33,36,37/ John 20:19 Jesus first appeared to the eleven on a mountain in Galilee Matt 28:16,17 90. Christ ascended from Mount Olivet Acts 1:9,12 Christ ascended from Bethany Luke 24:50,51 91. Paul's attendants heard the miraculous voice, and stood speechless Acts 9:7 Paul's attendants heard not the voice and were prostrate Acts 26:14 92. Abraham departed to go into Canaan Gen 12:5 Abraham went not knowing where Heb 11:8 93. Abraham had two sons Gal 4:22 Abraham had but one son Heb 11:17 94. Keturah was Abraham's wife Gen 25:1 Keturah was Abraham's concubine 1 Chron 1:32 95. Abraham begat a son when he was a hundred years old, by the interposition of Providence Gen 21:2/ Rom 4:19/ Heb 11:12 Abraham begat six children more after he was a hundred years old without any interposition of providence Gen 25:1,2 96. Jacob bought a sepulchre from Hamor Josh 24:32 Abraham bought it of Hamor Acts 7:16 97. God promised the land of Canaan to Abraham and his seed forever Gen 13:14,15,17; 17:8 Abraham and his seed never received the promised land Acts 7:5/ Heb 11:9,13 98. Goliath was slain by Elhanan 2 Sam 21:19 *note, was changed in translation to be correct. Original manuscript was incorrect> The brother of Goliath was slain by Elhanan 1 Chron 20:5 99. Ahaziah began to reign in the twelfth year of Joram 2 Kings 8:25 Ahaziah began to reign in the eleventh year of Joram 2 Kings 9:29 100. Michal had no child 2 Sam 6:23 Michal had five children 2 Sam 21:8 101. David was tempted by the Lord to number Israel 2 Sam 24:1 David was tempted by Satan to number the people 1 Chron 21:1 102. The number of fighting men of Israel was 800,000; and of Judah 500,000 2 Sam 24:9 The number of fighting men of Israel was 1,100,000; and of Judah 470,000 1 Chron 21:5 103. David sinned in numbering the people 2 Sam 24:10 David never sinned, except in the matter of Uriah 1 Kings 15:5 104. One of the penalties of David's sin was seven years of famine. 2 Sam 24:13 It was not seven years, but three years of famine 1 Chron 21:11,12 105. David took seven hundred horsemen 2 Sam 8:4 David took seven thousand horsemen 1 Chron 18:4 106. David bought a threshing floor for fifty shekels of silver 2 Sam 24:24 David bought the threshing floor for six hundred shekels of gold 1 Chron 21:25 107. David's throne was to endure forever. Ps 89:35-37 David's throne was cast down Ps 89:44 Speculative Doctrines 108. Christ is equal with God John 10:30/ Phil 2:5 Christ is not equal with God John 14:28/ Matt 24:36 109. Jesus was all-powerful Matt 28:18/ John 3:35 Jesus was not all-powerful Mark 6:5 110. The law was superseded by the Christian dispensation Luke 16:16/ Eph 2:15/ Rom 7:6 The law was not superseded by the Christian dispensation Matt 5:17-19 111. Christ's mission was peace Luke 2:13,14 Christ's mission was not peace Matt 10:34 112. Christ received not testimony from man John 5:33,34 Christ did receive testimony from man John 15:27 113. Christ's witness of himself is true. John 8:18,14 Christ's witness of himself is not true. John 5:31 114. Christ laid down his life for his friends John 15:13/ John 10:11 Christ laid down his life for his enemies Rom 5:10 115. It was lawful for the Jews to put Christ to death John 19:7 It was not lawful for the Jews to put Christ to death John 18:31 116. Children are punished for the sins of the parents Ex 20:5 Children are not punished for the sins of the parents Ezek 18:20 117. Man is justified by faith alone Rom 3:20/ Gal 2:16/ Gal 3:11,12/ Rom 4:2 Man is not justified by faith alone James 2:21,24/ Rom 2:13 118. It is impossible to fall from grace John 10:28/ Rom 8:38,39 It is possible to fall from grace Ezek 18:24/ Heb 6:4-6, 2 Pet 2:20,21 119. No man is without sin 1 Kings 8:46/ Prov 20:9/ Eccl 7:20/ Rom 3:10 Christians are sinless 1 John 3: 9,6,8 120. There is to be a resurrection of the dead 1 Cor 15:52/ Rev 20:12,13/ Luke 20:37/ 1 Cor 15:16 There is to be no resurrection of the dead Job 7:9/ Eccl 9:5/ Is 26:14 121. Reward and punishment to be bestowed in this world Prov 11:31 Reward and punishment to be bestowed in the next world Rev 20:12/ Matt 16:27/ 2 Cor 5:10 122. Annihilation the portion of all mankind Job 3: 11,13-17,19-22/ Eccl 9:5,10/ Eccl 3:19,20 Endless misery the portion of all mankind Matt 25:46/ Rev 20:10,15/ Rev 14:11/ Dan 12:2 123. The Earth is to be destroyed 2 Pet 3:10/ Heb 1:11/ Rev 20:11 The Earth is never to be destroyed Ps 104:5/ Eccl 1:4 124. No evil shall happen to the godly Prov 12:21/ 1 Pet 3:13 Evil does happen to the godly Heb 12:6/ Job 2:3,7 125. Worldly good and prosperity are the lot of the godly Prov 12:21/ Ps 37:28,32,33,37/ Ps 1:1,3/ Gen 39:2/ Job 42:12 Worldly misery and destitution the lot of the godly Heb 11:37,38/ Rev 7:14/ 2 Tim 3:12/ Luke 21:17 126. Worldly prosperity a reward of righteousness and a blessing Mark 10:29,30/ Ps 37:25/ Ps 112:1,3/ Job 22:23,24/ Prov 15:6 Worldly prosperity a curse and a bar to future reward Luke 6:20,24/ Matt 6:19,21/ Luke 16:22/ Matt 19:24/ Luke 6:24 127. The Christian yoke is easy Matt 11:28,29,30 The Christian yoke is not easy John 16:33/ 2 Tim 3:12/ Heb 12:6,8 128. The fruit of God's spirit is love and gentleness Gal 5:22 The fruit of God's spirit is vengeance and fury Judg 15:14/ 1 Sam 18:10,11 129. Longevity enjoyed by the wicked Job 21:7,8/ Ps 17:14/ Eccl 8:12/ Is 65:20 Longevity denied to the wicked Eccl 8:13/ Ps 55:23/ Prov 10:27/ Job 36:14/ Eccl 7:17 130. Poverty a blessing Luke 6:20,24/ Jams 2:5 Riches a blessing Prov 10:15/ Job 22:23,24/ Job 42:12 Neither poverty nor riches a blessing Prov 30:8,9 131. Wisdom a source of enjoyment Prov 3:13,17 Wisdom a source of vexation, grief and sorrow Eccl 1:17,18 132. A good name is a blessing Eccl 7:1/ Prov 22:1 A good name is a curse Luke 6:26 133. Laughter commended Eccl 3:1,4/ Eccl 8:15 Laughter condemned Luke 6:25/ Eccl 7:3,4 134. The rod of correction a remedy for foolishness Prov 22:15 There is no remedy for foolishness Prov 27:22 135. A fool should be answered according to his folly Prov 26:5 A fool should not be answered according to his folly Prov 26:4 136. Temptation to be desired James 1:2 Temptation not to be desired Matt 6:13 137. Prophecy is sure 2 Pet 1:19 Prophecy is not sure Jer 18:7-10 138. Man's life was to be one hundred and twenty years Gen 6:3/ Ps 90:10 Man's life is but seventy years Ps 90:10 139. The fear of man was to be upon every beast Gen 9:2 The fear of man is not upon the lion Prov 30:30 140. Miracles a proof of divine mission Matt 11:2-5/ John 3:2/ Ex 14:31 Miracles not a proof of divine mission Ex 7:10-12/ Deut 13:1-3/ Luke 11:19 141. Moses was a very meek man Num 12:3 Moses was a very cruel man Num 31:15,17 142. Elijah went up to heaven 2 Kings 2:11 None but Christ ever ascended into heaven John 3:13 143. All scripture is inspired 2 Tim 3:16 Some scripture is not inspired 1 Cor 7:6/ 1 Cor 7:12/ 2 Cor 11:17 Think not that I come to send peace on earth: I came not to send peace, but a sword. - Matthew 10:34 ... all they that take the sword shall perish with the sword. - Matthew 26:52 For wrath killeth the foolish man... - Job 5:2 ... let not the sun go down on your wrath. - Ephesians 4:26 And no man hath ascended up to heaven, even the Son of man which is in heaven. - John 3:13 ... and Elijah went up by a whirlwind into heaven. - 2 Kings 2:11 If I bear witness of myself, my witness is not true. - John 5:31 I am one that bear witness of myself... - John 8:18 [Jesus was the speaker in both of these quotes] A good man leaveth an inheritance to his children's children... - Proverbs 13:22 Sell that ye have and give alms... - Luke 12:33 Blessed is the man that feareth the Lord... Wealth and riches shall be in his house... - Psalms 112:1-3 It is easier for a camel to go through the eye of a needle, than for a rich man to enter the kingdom of God. - Matthew 19:24 I and my father are one. - John 10:30 ... I go unto the Father: for my Father is greater than I. - John 14:28 [Jesus was the speaker in both of these quotes] Thou shalt not kill - Exodus 20:13 Thus saith the Lord God of Israel, Put every man his sword by his side... and slay every man his brother... - Exodus 32:27 Remember the sabbath day to keep it holy. - Exodus 20:8 The new moons and sabbaths, the calling of assemblies, I cannot away with: it is iniquity. - Isaiah 3:22 Thou shalt not make unto thee any graven image, or any likeness of anything that is in heaven... earth... [or] water. - Leviticus 26:11 And thou shalt make two cherubims of gold, of beaten work shalt thou make them. - Exodus 25:18 For by grace are ye saved through faith... not of works. - Ephesians 2:8-9 Ye see then how that by works a man is justified, and not by faith only. - James 2:24 God is not a man, that he should lie: neither the son of man, that he should repent. - Numbers 23:19 And the Lord repented of the evil which he thought to do unto his people. - Exodus 32:14 ... the hour is coming, in which all that are in the graves shall hear his voice, and come forth... - John 5:28-29 As the cloud is consumed and vanisheth away: so he that goeth down to the grave shall come up no more. - Job 7:9 ... thou shalt give life for life, eye for eye, tooth for tooth, hand for hand, foot for foot, burning for burning, wound for wound, stripe for stripe. - Exodus 21:23-25 ... resist not evil; but whosoever shall smite thee on thy right cheek, turn to him the other also. - Matthew 5:39 Honor thy father and mother. - Exodus 20:12 If any man come to me, and hate not his father and mother, and wife, and children, and brethren, and sisters, yea, and his own life also, he cannot be my disciple. - Luke 14:26 Lay not up for yourself treasures upon the earth... - Matthew 6:19 In the house of the righteous is much treasure... - Proverbs 15:6 I have seen God face to face, and my life is preserved. - Genesis 32:30 No man hath seen God at any time. - John 1:18 The son shall not bear the iniquity of the father. - Ezekiel 18:20 ... I the lord thy God am a jealous God, visiting the iniquity of the fathers upon the children unto the third and fourth generation. - Exodus 20:5 Happy is the man that findeth wisdom, and the man that getteth understanding. - Proverbs 3:13 For in much wisdom is much grief; and he that increaseth knowledge increaseth sorrow. - Ecclesiastes 1:18 The Lord is good to all. - Psalm 145:6 I make peace and create evil. I the Lord do all these things. - Isaiah 45:7 Whosoever shall say Thou fool, shall be in danger of hellfire. - Matthew 5:22 [Jesus said] Ye fools and blind. - Matthew 23:17 For all have sinned. - Romans 3:23 There was a man... whose name was Job; and that man was perfect and upright. - Job 1:1 Two and twenty years old was Ahaziah when he began to reign. - 2 Kings 8:26 Forty and two years old was Ahaziah when he began to reign. - 2 Chronicles 22:2 If a man vow a vow unto the Lord or swear an oath... he shall do according to all that proceedeth out of his mouth. - Numbers 30:2 But I say unto you, swear not at all; neither by heaven... nor by earth. - Matthew 5:34-35 ... the earth abideth forever. - Ecclesiastes 1:4 ... the elements shall melt with fervent heat, the earth also and the works that are therein shall be burned up. - 2 Peter 3:10 ... for I am merciful, saith the Lord, and I will not keep anger forever. - Jeremiah 3:12 Ye have kindled a fire in mine anger, which shall burn forever. - Jeremiah 17:4 ... God cannot be tempted with evil, neither tempteth he any man. - James 1:13 And it came to pass after these things, that God did tempt Abraham. - Genesis 22:1 And God saw everything that he made, and behold it was very good. - Genesis 1:31 And it repented the Lord that he had made man on earth, and it grieved him at his heart - Genesis 6:6 For now have I chosen and sanctified this house that my name be there forever; and mine eyes and my heart shall be there perpetually. - II Chronicles 7:16 Howbeit the most high dwelleth not in temples made with hands. - Acts 7:48 [God dwells] in the light which no man can approach unto. - I Timothy 6:16 The Lord said that he would dwell in the thick darkness. - I Kings 8:12 And the Lord called unto Adam, and said unto him, Where art thou? And he said, I heard thy voice in the garden, and I was afraid. - Genesis 3:9,10 Ye hath neither heard his voice, at any time, nor seen his shape. - John 5:37 Then went up Moses and Aaron, Nadab and Abihu, and seventy of the elders of Israel. And they saw the God of Israel... They saw God, and did eat and drink. - Exodus 24: 9-11 Whom no man hath seen nor can see. - I Timothy 6:16 With God all things are possible. - Matthew 29:26 And the Lord was with Judah, and he drove out the inhabitants of the mountain; but could not drive out the inhabitants of the valley, because they had chariots of iron. - Judges 1:19 God is not the author of confusion. - I Corinthians 24:33 Out of the mouth of the most high proceedeth not evil and good? - Lamentations 3:38 Those that seek me early shall find me. - Proverbs 8:17 Then shall they call upon me but I will not answer; they shall seek me early, but shall not find me. - Proverbs 1:28 On the tenth day of this seventh month there shall be a day of atonement; it shall be a holy convocation unto you; and ye shall afflict your souls and offer an offering made by fire unto the Lord. - Leviticus 23:27 For I spake not unto your fathers, nor commanded them in the day that I brought them out of the land of Egypt, concerning burnt offering or sacrifices. - Jeremiah 7:22 And the priest shall burn all on the altar to be a burnt sacrifice, an offering made by fire, of a sweet savor unto the Lord. - Leviticus 1:9 Your burnt offering are not acceptable, nor your sacrifices sweet unto me. - Jeremiah 7:20 God is not a man, that he should lie - Numbers 23:19 And if the prophet be deceived when he hath spoken a thing, I the Lord have deceived that prophet. - Ezekiel 24:9 There is none other God but one. - I Corinthians 8:4 And God said, Let us make man in our image. - Genesis 1:26 When ye go, ye shall not go empty; but every woman shall borrow of her neighbor, and of her that sojourneth in her house, jewels of silver and jewels of gold, and raiment; and ye shall put them on your sons and upon your daughters; and ye shall spoil the Egyptians. - Exodus 3:21,22 Thou shalt not defraud thy neighbor, nether rob him. - Leviticus 19:13 At the hand of every man's brother will I require the life of man. Whoso sheddeth man's blood, by man shall his blood be shed. - Genesis 4:5,6 And the Lord set a mark upon Cain, lest any finding him should kill him. - Genesis 4:15 Consider the lilies of the field, how they grow; they toil not, neither do they spin... if God so clothe the grass of the field... shall he not much more clothe you? Therefore, take no thought, saying what shall we eat? or what shall we drink? or wherewithal shall we be clothed?... Take, therefore, no thought for the morrow. - Matthew 6:28, 30-34 But if any provideth not for his own, especially for those of his own house, he hath denied the faith, and is worse than an infidel. - I Timothy 5:8 Be ye angry and sin not. - Ephesians 4:26 Be not hasty in they spirit to be angry; for anger resideth in the bosom of fools. - Ecclesiastes 7:9 Let your light so shine before men, that they may see your good works. - Matthew 5:16 Take heed that ye do not your alms before men, to be seen of them. - Matthew 6:1 And Solomon stood before the alter of the Lord, in the presence of all the congregation of Israel, and spread forth his hands toward heaven... - I Kings 7:22 When thou prayest, thou shalt not be as the hypocrites are; for they love to pray standing in the synagogues, and in the corners of the streets, that they may be seen of men... - Matthew 6:5 And no razor shall come on his head; for the child shall be a Nazarite unto God from the womb. - Judges 8:5 Doth not even nature itself teach you, that if a man hath long hair, it is a shame unto him? - I Corinthians 6:14 Remember the Sabbath day to keep it holy. - Exodus 20:8 One man esteemeth one day above another; another esteemeth every day alike. Let every man be fully persuaded in his own mind. - Romans 14:5 For in the six days the Lord made heaven and earth, the sea, and all that in them is, and rested the seventh day; wherefore the Lord blessed the Sabbath day and hallowed it. - Exodus 20:11 And remember that thou wast a servant in the land of Egypt, and that the Lord thy God brought the out thence through a mighty hand and by a stretched-out arm; therefore the Lord thy God commanded the to keep the Sabbath day. - Deuteronomy 5:15 There is nothing unclean of itself. - Romans 14:14 Nevertheless, these shall ye not eat, of them that chew the cud or of them that divide the cloven hoof; as the camel and the hare, and the coney; for they chew the cud, but divide not the hoof, therefore they are unclean unto you. And the swine, because it divideth the hoof, yet cheweth not the cud, it is unclean unto you; ye shall not eat of their flesh, nor touch their dead carcass. - Deuteronomy 14:7,8 Cursed is he that lieth with his sister, the daughter of his father, or the daughter of his mother. - Deuteronomy 27:22 And Abraham said... She is my sister; she is the daughter of my father, but not the daughter of my mother; and she became my wife. - Genesis 20:11,12 If brethren dwell together, and one of them die and have no child, the wife of the dead shall not marry without unto a stranger; her husband's brother shall go in unto her, and take her to him to wife. - Deuteronomy 25:5 If a man shall take his brother's wife, it is an unclean thing... they shall be childless. - Leviticus 20:21