Full Transcript
https://www.youtube.com/watch?v=3ZfKfkuYwyM
[00:00] This episode of the Wi Files is brought to you by Aura.
[00:03] Early in the morning of January 4th, 2012, a strange message appeared on the internet.
[00:09] Just a few lines of text on a black background, posted anonymously.
[00:14] Hello, we are looking for highly intelligent individuals.
[00:16] To find them, we have devised a test.
[00:21] There is a message hidden in this image, a test.
[00:23] Find it, and it will lead you on the road to finding us.
[00:25] Hello, we look forward to meeting the few that will make it all the way through.
[00:31] Good luck.
[00:33] 3301, many speculated that it was a recruiting tool for the NSA, the CIA, MI6, or even the Masons.
[00:39] But who was really behind this, and what was its purpose?
[00:41] And did it even have a purpose?
[00:43] Whether it did or not, it didn't matter because when you post a puzzle on the internet looking for highly intelligent people, that's a challenge that's simply impossible to resist.
[00:53] So the hunt for Cicada 3301 was on.
[01:04] Yeah, he's got about six months left on his contract and I wanted to see if there's a way that I can get him out sooner.
[01:13] Yeah, I'm getting a lot of complaints about him.
[01:15] Let me call you back.
[01:18] Presto Human, I have made you appear on my screen.
[01:21] I thought you were coming in this week.
[01:23] Oh, no, no, no, I'm at there.
[01:26] Hang on.
[01:26] Hello, you have reached the Great Goldini.
[01:29] Good afternoon, Mr. Mor.
[01:30] This is Susan with Best Bowl Solar.
[01:33] I'd like to offer you a free quote for solar panels for your bowl.
[01:34] You can save dozens of dollars per year.
[01:36] Nope, I don't know.
[01:39] And I rent, take me off your list.
[01:41] Where was I?
[01:41] Okay, uh, Gertie and I are at Magic Camp.
[01:44] Magic Camp?
[01:44] Oh yeah, I need to practice my.
[01:47] Hang on.
[01:50] Hello, you have reached the Great Goldini.
[01:50] This is the IRS.
[01:52] You owe back taxes.
[01:52] We need you to send us three Best Buy gift cards or we'll have to arrest you.
[01:57] Can't be me.
[01:57] I don't pay taxes.
[01:59] Taxes are theft.
[02:03] Don't pay taxes. Taxes are theft. Where was I? Oh yeah, so I'm working on my uh Presto dictation.
[02:06] Was I? Oh yeah, so I'm working on my uh Presto dictation, Presto digitation he.
[02:08] Presto dictation, Presto digitation he. What did I say? So I can't come in this week.
[02:11] What did I say? So I can't come in this week. I need a few more days at Magic Camp to perfect my slight of Fin and I'm trying to get Gertie to hold still for the sorty assistant half trick.
[02:15] Camp to perfect my slight of Fin and I'm trying to get Gertie to hold still for the sorty assistant half trick.
[02:17] Trying to get Gertie to hold still for the sorty assistant half trick.
[02:20] I got to find a way to hide that hump. Yeah, I don't know if there's a way that you you know if they make spanks for camels.
[02:21] Find a way to hide that hump. Yeah, I don't know if there's a way that you you know if they make spanks for camels.
[02:23] Don't know if there's a way that you you know if they make spanks for camels.
[02:25] I don't think so but hang on. Hello, you have reached the great gold.
[02:28] Don't think so but hang on. Hello, you have reached the great gold.
[02:30] Have reached the great gold. Hi Mr. Mor arti, this is Brandon from Save the Whales. Uh oh, would you be interested in making a small donation today?
[02:33] Hi Mr. Mor arti, this is Brandon from Save the Whales. Uh oh, would you be interested in making a small donation today?
[02:35] The whales. Uh oh, would you be interested in making a small donation today?
[02:37] In making a small donation today? Absolutely not. My uncle Horus spent 10 days trapped in the belly of a whale and now wherever he swims he has to keep the lights on.
[02:40] Absolutely not. My uncle Horus spent 10 days trapped in the belly of a whale and now wherever he swims he has to keep the lights on.
[02:42] Days trapped in the belly of a whale and now wherever he swims he has to keep the lights on.
[02:44] Now wherever he swims he has to keep the lights on. So you take your whales and stick them right up. Whoa, whoa, whoa, whoa, whoa, whoa, whoa.
[02:46] Stick them right up. Whoa, whoa, whoa, whoa, whoa, whoa, whoa. Sorry, sorry. No, no thank you.
[02:47] Whoa, whoa, whoa, whoa, whoa, whoa, whoa. Sorry, sorry. No, no thank you.
[02:50] Sorry, sorry. No, no thank you. Take me off your stupid list now. Immediately, write this second.
[02:52] Take me off your stupid list now. Immediately, write this second. You sick.
[02:54] Immediately, write this second. You sick. Whoa, this is ridiculous. You need to get Aura, they can stop all these spam calls.
[02:57] Whoa, this is ridiculous. You need to get Aura, they can stop all these spam calls.
[02:59] Aura, they can stop all these spam calls. AA, are they sponsoring us again? Yep, Aura.
[03:03] AA are they sponsoring us again yep Aura can identify data Brokers that are selling your info and submit opt out requests on your behalf.
[03:07] H so I can stop answering all these stupid phone calls.
[03:12] You can and AA does a lot more than protect you from Robo calls.
[03:14] You can set up antivirus, VPN, password management, identity theft insurance, all from one easy app with one affordable price.
[03:23] Hey, uh, does it have a parental controls for the Guppies?
[03:25] One of my boys just turned 13 and I I don't want them checking out the L and only things.
[03:31] Yeah, Aura has parental controls, so go to aura.com theey files or click the link in the description to get a free 2eek trial.
[03:38] aura.com theey files I got it I'll do it right after we figure out how to get gery out of this sword assistant in the half box.
[03:45] Uh, we kind of have a hump stuck in a head hole situation.
[03:49] Yeah, you're probably not it's okay baby, it's your daddy who make it all better.
[03:53] All right, I got to go find my camel Lube.
[03:55] What is camel lube and why do you have it?
[03:58] You don't worry about that.
[04:00] Okay, you ready for this? Here we go.
[04:02] Goldini
[04:04] goldini out am I still here you are
[04:08] out am I still here you are goldini
[04:10] goldini out you see me yep
[04:14] out you see me yep goldini out still yes all right I'm
[04:19] goldini out still yes all right I'm going to need a few more days at Magic
[04:20] going to need a few more days at Magic Camp to work on that you're supposed to
[04:22] Camp to work on that you're supposed to be here this week out
[04:26] [Music]
[04:30] on January 4th 2012 the first puzzle was
[04:33] on January 4th 2012 the first puzzle was posted on forchan by a self-identified
[04:35] group called 3301 the post was simply an
[04:38] group called 3301 the post was simply an image with text there is a message
[04:41] image with text there is a message hidden in this image find it and it will
[04:44] hidden in this image find it and it will lead you on the road to finding
[04:46] lead you on the road to finding us the puzzle was open to anyone and
[04:49] us the puzzle was open to anyone and everyone as you solve each clue you move
[04:51] everyone as you solve each clue you move on to the next level the image that was
[04:53] on to the next level the image that was posted on forchan was the first clue
[04:55] posted on forchan was the first clue solvers tried various methods to extract
[04:58] solvers tried various methods to extract The Secret Message some used Photoshop
[05:00] The Secret Message some used Photoshop to view the pixels they applied
[05:02] to view the pixels they applied different filters and techniques to see
[05:04] different filters and techniques to see what could be hidden in the image but
[05:05] what could be hidden in the image but the solution to the puzzle wasn't visual
[05:08] the solution to the puzzle wasn't visual it was plain text
[05:10] when an image is opened in a text editor it looks like
[05:12] opened in a text editor it looks like nonsense strings of characters and
[05:14] nonsense strings of characters and symbols but to a computer these symbols
[05:16] symbols but to a computer these symbols make sense it's a binary format
[05:19] make sense it's a binary format representing pixel placement color
[05:20] representing pixel placement color information metadata and all kinds of
[05:23] information metadata and all kinds of other stuff and when the 3301 image was
[05:25] other stuff and when the 3301 image was opened in a text editor there was a
[05:27] opened in a text editor there was a string of characters at the end of the
[05:29] string of characters at the end of the file
[05:32] because of the repeating characters and
[05:34] because of the repeating characters and the name tiberious Claudius Caesar
[05:36] the name tiberious Claudius Caesar people quickly and correctly guess the
[05:39] people quickly and correctly guess the message was encoded with a Caesar Cipher
[05:41] message was encoded with a Caesar Cipher a Caesar Cipher works by Shifting the
[05:43] a Caesar Cipher works by Shifting the letters of the alphabet a fixed number
[05:45] letters of the alphabet a fixed number of places down or up you choose a shift
[05:48] of places down or up you choose a shift value for example three and for each
[05:50] value for example three and for each letter in the original text replace it
[05:52] letter in the original text replace it with the letter that's located three
[05:54] with the letter that's located three positions down if you reach the end of
[05:56] positions down if you reach the end of the alphabet you wrap around to the
[05:57] the alphabet you wrap around to the beginning for example using a shift
[05:59] beginning for example using a shift value Val of three a becomes D B becomes
[06:02] value Val of three a becomes D B becomes e c becomes F and so on the Caesar
[06:05] e c becomes F and so on the Caesar Cipher is easy to crack with modern
[06:07] Cipher is easy to crack with modern methods and isn't considered secure but methods and isn't considered secure but it's historically significant and often it's historically significant and often used as a basic introduction to used as a basic introduction to cryptography such was the case with the cryptography such was the case with the first puzzle when the message was first puzzle when the message was decoded with a shift of four places the decoded with a shift of four places the result was a URL which turned out to be result was a URL which turned out to be another another image whoops just decoys this way looks image whoops just decoys this way looks like you can't guess how to get the like you can't guess how to get the message out message out the participants hit their first wall the participants hit their first wall opening this image in a text editor opening this image in a text editor showed nothing turned out that the image showed nothing turned out that the image contain two keywords that hint at how to contain two keywords that hint at how to get the real message out the words guess get the real message out the words guess and out those keywords indicated you and out those keywords indicated you needed to run the image through out needed to run the image through out guess a small application used for guess a small application used for steganography throughout this steganography throughout this complicated scavenger hunt out guest complicated scavenger hunt out guest would become a favorite tool of cicada would become a favorite tool of cicada 3301 now steganography is hiding a 3301 now steganography is hiding a message image or file message image or file within another message image or file within another message image or file unlike encryption which scrambles data unlike encryption which scrambles data so that it's unreadable without the so that it's unreadable without the correct key seog graphy conceals the
[07:08] Correct key seography conceals the fact that a secret message exists at all.
[07:11] Fact that a secret message exists at all.
[07:13] Imagine you have a digital photo and you want to hide a text message in it.
[07:15] You could suly change the color values of certain pixels to encode the text.
[07:17] To anyone looking at the image it appears normal.
[07:19] But someone who knows where and how to look could extract the hidden message out.
[07:25] Guest revealed a page on Reddit and a different clue.
[07:27] A book cipher.
[07:30] Book ciphers are almost impossible to crack without the book.
[07:32] But 3301 knew how to give us just enough information to keep us hooked.
[07:37] And people were hooked.
[07:39] So when solvers finally made it to Reddit they realized that cicada 3301 was just warming up.
[07:44] When the image of the duck was processed without guess it revealed a URL and a book Cipher.
[07:51] A book Cipher is a type of encryption where the key to deciphering the code is a specific text.
[07:56] Such as a book or article.
[07:59] Each word or letter in the secret message is replaced by a coordinate that points to its.
[08:10] by a coordinate that points to its location in the chosen text for example.
[08:12] location in the chosen text for example if the word apple is found on page 42.
[08:15] if the word apple is found on page 42 line 5 word three of the book you'd.
[08:17] line 5 word three of the book you'd replace Apple in your message with the.
[08:19] replace Apple in your message with the coordinates.
[08:21] coordinates 4253 the be ciphers are set of three.
[08:24] 4253 the be ciphers are set of three Cipher texts that supposedly reveal the.
[08:26] Cipher texts that supposedly reveal the location of $43 million of hidden.
[08:29] location of $43 million of hidden treasure somewhere in Bedford County.
[08:31] treasure somewhere in Bedford County Virginia they were first published in.
[08:33] Virginia they were first published in 1885 and the second text was actually.
[08:35] 1885 and the second text was actually decoded using the Declaration of.
[08:37] decoded using the Declaration of Independence the other two texts are.
[08:39] Independence the other two texts are still a mystery but over a 100 years.
[08:41] still a mystery but over a 100 years later people are still looking yeah 43.
[08:44] later people are still looking yeah 43 mil keeps you motivated it does so to.
[08:47] mil keeps you motivated it does so to decode 3301 book Cipher will need the.
[08:50] decode 3301 book Cipher will need the book which could be found on Reddit but.
[08:52] book which could be found on Reddit but when you got to the page on Reddit it.
[08:54] when you got to the page on Reddit it was full of posts with encrypted titles.
[08:56] was full of posts with encrypted titles there was also an odd image in the.
[08:58] there was also an odd image in the header even the the page had a title.
[09:00] header even the the page had a title that looked like random characters but.
[09:02] that looked like random characters but by now everyone knew there was nothing.
[09:04] by now everyone knew there was nothing random about it there were also several.
[09:06] random about it there were also several lines of texts and two additional images.
[09:09] lines of texts and two additional images using out guess on the welcome that.
[09:10] using out guess on the welcome that image gives us this from here on out we
[09:14] image gives us this from here on out we will cryptographically sign all messages
[09:16] will cryptographically sign all messages with this key it is available on the MIT
[09:19] with this key it is available on the MIT key servers patience is a virtue good
[09:22] key servers patience is a virtue good luck 3301 good luck this information was
[09:26] luck 3301 good luck this information was extremely important to the people
[09:27] extremely important to the people following the clues the there were a lot
[09:29] following the clues the there were a lot of imposters popping up pretending to be
[09:31] of imposters popping up pretending to be cicada 3301 but because 3301 implemented
[09:35] cicada 3301 but because 3301 implemented pgp encryption new messages could be
[09:38] pgp encryption new messages could be authenticated pgp stands for pretty good
[09:41] authenticated pgp stands for pretty good privacy and this is an encryption system
[09:43] privacy and this is an encryption system used for sending emails and sensitive
[09:44] used for sending emails and sensitive files how it works is you create two
[09:47] files how it works is you create two keys one is public which you share with
[09:49] keys one is public which you share with everyone the other is private which only
[09:51] everyone the other is private which only you have so if someone wants to send you
[09:53] you have so if someone wants to send you a secure message they encrypt it with
[09:55] a secure message they encrypt it with the public key that you shared and then
[09:57] the public key that you shared and then you use your private key to decode the
[09:59] you use your private key to decode the message 3301 would encrypt all their
[10:02] message 3301 would encrypt all their Clues going forward like the clue hidden
[10:04] Clues going forward like the clue hidden in the second image which was a
[10:05] in the second image which was a stereogram which is an optical illusion
[10:08] stereogram which is an optical illusion that creates a 3D image when viewed in a
[10:10] that creates a 3D image when viewed in a specific way this stereogram kind of
[10:12] specific way this stereogram kind of looked like the Holy Grail cute and this
[10:15] looked like the Holy Grail cute and this image also contained a secret
[10:17] image also contained a secret message the key has always been right in
[10:20] message the key has always been right in front of your eyes this isn't the quest
[10:22] front of your eyes this isn't the quest for the Holy Grail stop making it more
[10:25] for the Holy Grail stop making it more difficult than it is good luck 3301
[10:29] difficult than it is good luck 3301 Grail the subreddit also contained many
[10:31] Grail the subreddit also contained many lines of what appeared to be encrypted
[10:33] lines of what appeared to be encrypted text the question that everyone faced
[10:35] text the question that everyone faced was which Cipher method had to be used
[10:38] was which Cipher method had to be used and how do you find the key the hidden
[10:40] and how do you find the key the hidden message provided a hint the key was
[10:42] message provided a hint the key was literally in front of your eyes it was
[10:45] literally in front of your eyes it was the image in the
[10:46] the image in the header those symbols are actually Maya
[10:49] header those symbols are actually Maya numbers the title translates to cus
[10:53] numbers the title translates to cus mirror thot nka what are you talking
[10:56] mirror thot nka what are you talking about the clue I'm going to solve this
[10:58] about the clue I'm going to solve this one okay what is it kiss smat nka yeah
[11:02] one okay what is it kiss smat nka yeah that's a that's a Mayan word for
[11:04] that's a that's a Mayan word for something right a Mayan word for goat
[11:06] something right a Mayan word for goat kiss no the letters make up a the Mayan
[11:09] kiss no the letters make up a the Mayan word for letters no they make up the
[11:11] word for letters no they make up the Mayan word for makeup no it's a key the
[11:13] Mayan word for makeup no it's a key the Mayan word for key it's not a Mayan word.
[11:16] Mayan word for key it's not a Mayan word it's an encryption key okay okay don't get your panties in a wad.
[11:18] uh key to what remember the subreddit was full of post with encrypted titles it was determined that they were encoded with a visionaire cipher which is another letter Shi encryption technique.
[11:28] visionaire cipher which is another letter Shi encryption technique visionaire encoded text needs a key the string of letters made from the Maya numbers was that key.
[11:34] without the key decoding a visionaire encrypted message is almost impossible even with the key.
[11:39] it would take a long time and if you miss just one letter you end up with meaningless texts.
[11:45] so your translation has to be perfect but there's no reason to do it manually it takes a lot of processing power.
[11:51] but computers can eventually guess most visionaire keys but if you already have the key computers can easily decode the message.
[11:59] there even websites to help you do this the decoded text was from Thomas bullfinch's mythology.
[12:03] this was a classic work based on the tales of King Arthur the knights the round table and their hunt for the Holy Grail.
[12:09] so now the solvers knew the book that was needed to decode the book Cipher but this time it
[12:14] decode the book Cipher but this time it wasn't a message or a web page or an image.
[12:16] it wasn't a message or a web page or an image it was a phone number.
[12:23] at first people thought cicada 3301 was just an online troll pumping out puzzles to waste everyone's time.
[12:28] but there was just too much work put into it.
[12:31] whoever was behind the puzzles was someone with computer skills and advanced knowledge in cryptography.
[12:36] so the duck image led to a book code and a page on Reddit.
[12:40] and the page on Reddit led to two more images Maya numbers and the book Cipher.
[12:44] and the book was about King Arthur's quest for the Holy Grail.
[12:48] get on with it now we can use the book code mentioned in the out guest message from the initial image.
[12:57] a book code en codes each letter with two numbers the line number and the character index in the line.
[13:03] by applying the book code to the text we get the following text string.
[13:08] call us telephone number 21439 0968.
[13:14] call us when the book Cipher revealed a phone number in Austin Texas.
[13:17] revealed a phone number in Austin Texas Cod Breakers thought they'd finally learn who was behind cicada 3301.
[13:27] very good you have done well there are three prime numbers associated with the original final. jpeg image 330 one.
[13:38] is one of them you will have to find the other two multiply all three of these numbers together and at.com on the end to find the next step good luck.
[13:50] goodbye no answers just another clue cicada 3301 was a series of intricately woven puzzles.
[13:57] each puzzle got progressively more complex but future puzzles often referred back to earlier ones indicating this entire process was thought out well in advance.
[14:06] the length of the scavenger hunt also weeded out casual participants only those with patience would continue.
[14:12] it was natural selection solvers went back to the
[14:18] selection solvers went back to the original image looking for anything that would indicate a prime number out guest.
[14:22] revealed nothing scanning the image with Photoshop and other forensic tools also provided no help.
[14:27] people counted the characters and the spaces in the text.
[14:31] they converted the characters to aski.
[14:33] they ran the text through every cryptography algorithm you can think of and still nothing.
[14:36] but like many of the cicada puzzles the answer was hidden in plain sight.
[14:41] the original image looks like a square but Keen observers noticed it wasn't a perfect square.
[14:46] the image was actually 509 pixels wide by 503 pixels tall.
[14:53] 509 and 503 are prime numbers.
[14:57] multiply 509 by by 503 by 3301 and you get 84514.
[15:02] 5127 adda.com just like the voicemail said.
[15:06] and that's where we see the infamous cicada image for the first time.
[15:11] under the image was a timer and it was counting down.
[15:13] when the countdown reached zero the timer was replaced with a list of coordinates.
[15:15] 14 locations in five.
[15:21] of coordinates 14 locations in five countries all over the world with an invitation to find the location nearest you up until now the puzzles existed exclusively on the internet but now cicada 3301 was going out into the real world.
[15:38] the list of 14 locations around the world indicated that cicada 3301 was a global organization or a handful of people with the time and money to create complex puzzles and travel the globe but by taking the next round of puzzles into the real world cicada created another filter in order to move forward.
[15:55] not only did you have to be excellent cryptography you had to have the means to travel to one of the locations provided and only the most committed could proceed at each of the coordinates was a poster containing the cicada image and a QR code scanning the QR code resulted in a link to another JPEG file like before running the image through out guest revealed secret text a poem of fading death named for a
[16:21] text a poem of fading death named for a king meant to be read only once and.
[16:23] king meant to be read only once and vanish alas it could not remain unseen.
[16:27] vanish alas it could not remain unseen the image also included a warning you've.
[16:30] the image also included a warning you've shared too much to this point we want.
[16:32] shared too much to this point we want the best not the followers thus the.
[16:36] the best not the followers thus the first few there will receive the prize.
[16:38] first few there will receive the prize good luck luck.
[16:41] good luck luck 3301 considering the difficulty of the.
[16:43] 3301 considering the difficulty of the puzzles and the Mystery surrounding them.
[16:45] puzzles and the Mystery surrounding them it was only natural that people were.
[16:47] it was only natural that people were talking and sharing information and.
[16:49] talking and sharing information and collaborating if you didn't live near.
[16:50] collaborating if you didn't live near one of the cicada locations you almost.
[16:52] one of the cicada locations you almost had no choice but to ask for help but.
[16:55] had no choice but to ask for help but cicada 3301 was clearly watching and if.
[16:57] cicada 3301 was clearly watching and if you got caught teaming up you'd be out.
[17:00] you got caught teaming up you'd be out and it didn't take long to identify the.
[17:01] and it didn't take long to identify the text referred to by the last clue it was.
[17:04] text referred to by the last clue it was the poem Agrippa by cyberpunk novelist.
[17:06] the poem Agrippa by cyberpunk novelist William Gibson Agrippa is a very cicada.
[17:09] William Gibson Agrippa is a very cicada type of poem it was originally.
[17:11] type of poem it was originally distributed on floppy disc and after you.
[17:14] distributed on floppy disc and after you read the poem it encrypted itself meant.
[17:16] read the poem it encrypted itself meant to be read only once in F solving the.
[17:19] to be read only once in F solving the book code resulted in another URL but
[17:22] book code resulted in another URL but this one was different a DOT onion.
[17:24] this one was different a DOT onion extension onion routing makes the data's source and destination untraceable by encrypting the data multiple times like the layers of an onion.
[17:33] onion Pages aren't accessible with a regular web browser you need a specialized browser designed specifically to access Pages hosted on the onion router Network or tour Network in other words the dark web.
[17:44] tour Network in other words the dark [Music] web.
[17:48] when most people think of the dark web they imagine a Place full of illegal activities a place where people can buy and sell drugs weapons and worse and it's true those things exist on the dark web but that's only a small fraction of what's there.
[18:02] the dark web is actually a part of the Deep Web which is all the unindexed parts of the internet including private databases email accounts and subscription services.
[18:12] in fact most of the data on the internet exists on the Deep Web the dark web is specifically the section of the Deep Web accessible only through specialized tools like the tour browser which makes.
[18:23] tools like the tour browser which makes web traffic anonymous.
[18:25] Before it was made public, tour was used by the US Navy to secure government communication.
[18:29] Later it became a beacon for privacy advocates and anyone looking to shield their online activity from prying eyes.
[18:36] Not just criminals though, journalists use the dark web to communicate with activists in oppressive countries.
[18:42] Whistleblowers have used the dark web to remain anonymous.
[18:46] If you want to remain anonymous and untraceable, you go to the dark web.
[18:50] It's only natural that a group like Cicada 3301 would end up there.
[18:53] So Cicada solvers who made it this far typed the onion link into their tour browser and were greeted with the following message:
[19:01] Congratulations! Please create a new email address with a public, free, web-based service you've never used before and enter it below.
[19:10] We recommend you do this while still using Tor for anonymity.
[19:14] We will email you a number within the next few days in the order in which you arrived at this page.
[19:19] Once you've received it, come back to this page and append a slash and then the number you received to this URL.
[19:26] the number you receive to this URL 3301 congratulations this would be the
[19:28] 3301 congratulations this would be the first time time that cicada would
[19:29] first time time that cicada would communicate directly with people very
[19:31] communicate directly with people very few made the cut but those that did
[19:33] few made the cut but those that did received an email a few days later this
[19:36] received an email a few days later this message will only be displayed once here
[19:39] message will only be displayed once here is a message that has been encrypted
[19:41] is a message that has been encrypted with RSA the encrypted message is a
[19:43] with RSA the encrypted message is a number break the decryption key then
[19:46] number break the decryption key then come back to the same URL and enter the
[19:49] come back to the same URL and enter the decrypted message to continue each
[19:51] decrypted message to continue each person who has come this far has
[19:53] person who has come this far has received a unique message encrypted with
[19:55] received a unique message encrypted with a unique key you are not to collaborate
[19:59] a unique key you are not to collaborate sharing your message or key will result
[20:01] sharing your message or key will result in not receiving the next step good luck
[20:04] in not receiving the next step good luck luck 3301 luck since each participant
[20:08] luck 3301 luck since each participant was assigned a unique number cicada 3301
[20:11] was assigned a unique number cicada 3301 was able to track who was sharing
[20:12] was able to track who was sharing information if you got caught you're
[20:15] information if you got caught you're out hello hello you have shared your
[20:18] out hello hello you have shared your information online you are now removed
[20:21] information online you are now removed from this altogether even if you crack
[20:23] from this altogether even if you crack the key you've been given it doesn't
[20:25] the key you've been given it doesn't matter because you have demonstrated
[20:27] matter because you have demonstrated that you can't be trusted to follow
[20:29] that you can't be trusted to follow simple instructions anyway goodbye thank
[20:31] simple instructions anyway goodbye thank you for your participation to this point
[20:33] you for your participation to this point goodbye goodbye
[20:36] goodbye goodbye 3301 but those who were able to solve
[20:38] 3301 but those who were able to solve the puzzle and solve it alone received
[20:40] the puzzle and solve it alone received an email the email contained the
[20:42] an email the email contained the following text along with a piece of
[20:45] following text along with a piece of music this song is your own path another
[20:48] music this song is your own path another stop on the road toward Enlightenment
[20:50] stop on the road toward Enlightenment follow it and share not
[21:02] [Music]
[21:13] [Music] oh that was terrible but still better
[21:15] oh that was terrible but still better than
[21:16] than K-pop CH
[21:20] K-pop CH chce chilling like
[21:22] chce chilling like a the music was encoded as a midi file
[21:26] a the music was encoded as a midi file midi is music expressed as code
[21:29] midi is music expressed as code it was found that there were two tracks
[21:30] it was found that there were two tracks that provided two different messages
[21:32] that provided two different messages each message had fewer than 26
[21:34] each message had fewer than 26 combinations of pitch and tone which
[21:36] combinations of pitch and tone which hinted that each combination could
[21:38] hinted that each combination could represent one letter the music was
[21:40] represent one letter the music was decoded into a cryptogram which could
[21:42] decoded into a cryptogram which could then be
[21:43] then be broken very good very good you have
[21:46] broken very good very good you have proven to be most dedicated to come this
[21:48] proven to be most dedicated to come this far to attain Enlightenment create a gpg
[21:51] far to attain Enlightenment create a gpg key for your email address and upload it
[21:53] key for your email address and upload it to the MIT key servers then encrypt the
[21:56] to the MIT key servers then encrypt the following word list using the a 331
[22:00] following word list using the a 331 public key sign it with your key send
[22:02] public key sign it with your key send the aski armored Cipher text to the
[22:05] the aski armored Cipher text to the Gmail address from which you received
[22:07] Gmail address from which you received your numbers everyone who received this
[22:09] your numbers everyone who received this email was also given a set of 50 unique
[22:11] email was also given a set of 50 unique words those words were to be encrypted
[22:14] words those words were to be encrypted and emailed back what happened after
[22:16] and emailed back what happened after that is unknown but about a month later
[22:18] that is unknown but about a month later the image on the subreddit
[22:21] the image on the subreddit changed hello hello we have now found
[22:24] changed hello hello we have now found the individuals we sought thus our
[22:27] the individuals we sought thus our month-long Journey ends for now thank
[22:31] month-long Journey ends for now thank you for your dedication and effort if
[22:33] you for your dedication and effort if you were unable to complete the test or
[22:35] you were unable to complete the test or did not receive an email do not despair
[22:39] did not receive an email do not despair there will be more opportunities like
[22:41] there will be more opportunities like this one hello thank you all now
[22:43] this one hello thank you all now 3301 and just as cryptically as the
[22:46] 3301 and just as cryptically as the cicada puzzle started it finally ended
[22:49] cicada puzzle started it finally ended it was assumed that the mysterious group
[22:50] it was assumed that the mysterious group whoever they were finally found the
[22:52] whoever they were finally found the highly intelligent individuals it needed
[22:55] highly intelligent individuals it needed cicada 3301 stopped posting messages and
[22:57] cicada 3301 stopped posting messages and was largely forgot en but a year and a
[23:00] was largely forgot en but a year and a day after the first puzzle was posted
[23:02] day after the first puzzle was posted cicada 3301 was
[23:09] back cicada was quiet for a year but on
[23:13] back cicada was quiet for a year but on January 5th a new image was posted to
[23:16] January 5th a new image was posted to forchan hello again our search for
[23:19] forchan hello again our search for intelligent individuals now continues
[23:21] intelligent individuals now continues hello again the first clue is hidden
[23:23] hello again the first clue is hidden within this image find it and it will
[23:26] within this image find it and it will lead you on the road to finding us we
[23:28] lead you on the road to finding us we look forward to meeting the few that
[23:30] look forward to meeting the few that will make it all the way through good
[23:32] will make it all the way through good luck luck
[23:34] luck luck 3301 like before running the image
[23:36] 3301 like before running the image throughout guest led to a book code
[23:38] throughout guest led to a book code which led to a URL which led to a file a
[23:41] which led to a URL which led to a file a large
[23:42] large file this file was its own mini
[23:45] file this file was its own mini operating
[23:49] system when you booted it up it
[23:51] system when you booted it up it displayed the prime numbers up to 3301
[23:54] displayed the prime numbers up to 3301 and then restarted the computer it would
[23:55] and then restarted the computer it would do this indefinitely but there was also
[23:58] do this indefinitely but there was also a message within the numbers the key is
[24:00] a message within the numbers the key is all around you good luck
[24:04] all around you good luck 3301 those numbers led to a Twitter
[24:06] 3301 those numbers led to a Twitter account that was posting tons of
[24:08] account that was posting tons of encrypted text that nobody could
[24:11] encrypted text that nobody could decode but on the mini operating system
[24:13] decode but on the mini operating system someone realized that you could break
[24:15] someone realized that you could break the boot sequence and browse the file
[24:17] the boot sequence and browse the file system in one of the folders there was a
[24:19] system in one of the folders there was a song This Time an MP3 file
[24:29] according to the ID tags the title of
[24:31] according to the ID tags the title of the file was the instar emergence
[24:34] the file was the instar emergence solvers tried all sorts of techniques on
[24:36] solvers tried all sorts of techniques on this file to search for hidden meanings
[24:38] this file to search for hidden meanings they played it backwards they isolated
[24:40] they played it backwards they isolated frequencies they even ran the sound
[24:42] frequencies they even ran the sound through spectral analyzers but they
[24:44] through spectral analyzers but they found nothing there were hidden messages
[24:47] found nothing there were hidden messages and odd mini poems all over the place
[24:49] and odd mini poems all over the place but nothing seemed connected then
[24:51] but nothing seemed connected then someone determined that the messages
[24:53] someone determined that the messages from the Twitter feed were actually
[24:55] from the Twitter feed were actually lines of binary code which could be
[24:57] lines of binary code which could be assembled into a file but it was
[24:59] assembled into a file but it was encrypted and nobody could figure out
[25:01] encrypted and nobody could figure out how to decode it it turned out that the
[25:04] how to decode it it turned out that the messages were encoded with the binary
[25:06] messages were encoded with the binary data from another file as the key that
[25:09] data from another file as the key that file was the
[25:15] [Music]
[25:17] [Music] song So using the song the Twitter data
[25:20] song So using the song the Twitter data was decrypted into an
[25:22] was decrypted into an image a rune table the Run table image
[25:26] image a rune table the Run table image also contained secret text which led to
[25:28] also contained secret text which led to more puzzles which led to the dark web
[25:30] more puzzles which led to the dark web and to more posters around the world
[25:32] and to more posters around the world with different coordinates in order to
[25:34] with different coordinates in order to move forward from here you need to have
[25:36] move forward from here you need to have solved every puzzle so far now on the
[25:38] solved every puzzle so far now on the posters there were phone numbers and
[25:40] posters there were phone numbers and each phone number required an access
[25:42] each phone number required an access code that You' decipher using the room
[25:44] code that You' decipher using the room table once you got past the access code
[25:47] table once you got past the access code a computerized voice then read you a
[25:48] a computerized voice then read you a string of letters and numbers which
[25:50] string of letters and numbers which turned out to be a hex code and then the
[25:53] turned out to be a hex code and then the hex code converted to a page on the dark
[25:55] hex code converted to a page on the dark web which had a test for you to take
[25:59] web which had a test for you to take there were 19 questions in total some
[26:01] there were 19 questions in total some mathematical some logical some
[26:03] mathematical some logical some philosophical very few people made it
[26:05] philosophical very few people made it past this test but those that did
[26:08] past this test but those that did received an email
[26:10] received an email congratulations your testing has finally
[26:12] congratulations your testing has finally come to an end congratulations we hope
[26:14] come to an end congratulations we hope you have enjoyed the vacation over the
[26:16] you have enjoyed the vacation over the last few weeks you will be very busy now
[26:19] last few weeks you will be very busy now should you choose to join us you have
[26:21] should you choose to join us you have all wondered who we are and so we shall
[26:23] all wondered who we are and so we shall now tell you we are an international
[26:25] now tell you we are an international groupal group we have no name have no
[26:27] groupal group we have no name have no name are drawn together by Common
[26:29] name are drawn together by Common beliefs that tyranny and oppression of
[26:32] beliefs that tyranny and oppression of any kind must end that censorship is
[26:35] any kind must end that censorship is wrong and that privacy is an inalienable
[26:38] wrong and that privacy is an inalienable right cicada 3301 was pretty well known
[26:41] right cicada 3301 was pretty well known by now and was being connected to hacker
[26:43] by now and was being connected to hacker groups and this was addressed in that
[26:45] groups and this was addressed in that email we do not engage in illegal
[26:48] email we do not engage in illegal activity nor do our members if you are
[26:51] activity nor do our members if you are engaged in illegal activity we ask that
[26:54] engaged in illegal activity we ask that you cease any and all illegal activities
[26:57] you cease any and all illegal activities or decline membership at this time we
[27:00] or decline membership at this time we will not ask questions if you decline
[27:02] will not ask questions if you decline however if you lie to us we will find
[27:05] however if you lie to us we will find out but the big question was why what
[27:08] out but the big question was why what does cicada 3301 even do we are much
[27:11] does cicada 3301 even do we are much like a think tank in that our primary
[27:14] like a think tank in that our primary focus is on researching and developing
[27:16] focus is on researching and developing techniques to Aid the ideas we Advocate
[27:20] techniques to Aid the ideas we Advocate Liberty privacy
[27:22] Liberty privacy security and if you choose to accept
[27:24] security and if you choose to accept membership we are happy to have you on
[27:26] membership we are happy to have you on board to help with future projects
[27:29] board to help with future projects security so that was it cicada 3301
[27:32] security so that was it cicada 3301 found a few more recruits and went dark
[27:34] found a few more recruits and went dark but the following January people eagerly
[27:36] but the following January people eagerly waited to see if cicada would return and
[27:39] waited to see if cicada would return and they did not
[27:40] they did not [Music]
[27:46] [Music] disappoint after being inactive for a
[27:49] disappoint after being inactive for a year in January 2014 the cic Twitter
[27:52] year in January 2014 the cic Twitter account tweeted a link to a new
[27:54] account tweeted a link to a new [Music]
[27:55] [Music] image hello hello ephany is upon you
[27:59] image hello hello ephany is upon you good luck your pilgrimage has begun good
[28:01] good luck your pilgrimage has begun good luck Enlightenment awaits hello good
[28:03] luck Enlightenment awaits hello good luck
[28:05] luck 3301 during the time cicada was quiet
[28:08] 3301 during the time cicada was quiet there were lots of fake puzzles floating
[28:10] there were lots of fake puzzles floating around claiming to be from cicada 3301
[28:13] around claiming to be from cicada 3301 and they all turned out to be fakes but
[28:15] and they all turned out to be fakes but running this new image throughout guests
[28:17] running this new image throughout guests revealed a new message that proved to be
[28:19] revealed a new message that proved to be authentic cicada 3301 was back and they
[28:22] authentic cicada 3301 was back and they followed their familiar format they
[28:24] followed their familiar format they embedded messages and images that could
[28:25] embedded messages and images that could be extracted without guests these images
[28:28] be extracted without guests these images led to more clues on various web pages
[28:30] led to more clues on various web pages and the dark web and a new piece of
[28:32] and the dark web and a new piece of music was also discovered this one was
[28:34] music was also discovered this one was called
[28:36] called [Music]
[28:50] [Music] interconnectedness using some familiar
[28:52] interconnectedness using some familiar techniques as well as some new ones
[28:54] techniques as well as some new ones cicada solvers concluded that cicada was
[28:57] cicada solvers concluded that cicada was focusing on on a single
[29:00] focusing on on a single document it's called the Liber premise
[29:02] document it's called the Liber premise or first book as more puzzles were
[29:04] or first book as more puzzles were solved more pages of Libra primis were
[29:07] solved more pages of Libra primis were uncovered the book was written using the
[29:09] uncovered the book was written using the runes found in earlier puzzles but the
[29:11] runes found in earlier puzzles but the solution to every puzzle seemed to be a
[29:13] solution to every puzzle seemed to be a clue to yet another puzzle people went
[29:16] clue to yet another puzzle people went back to the music file they found more
[29:18] back to the music file they found more clues from image files they extracted
[29:20] clues from image files they extracted more codes and more puzzles like magic
[29:22] more codes and more puzzles like magic squares and
[29:24] squares and anagrams all of those were decoded to
[29:26] anagrams all of those were decoded to reveal strange poems which were nothing
[29:28] reveal strange poems which were nothing more than more clues Libra primis is 59
[29:31] more than more clues Libra primis is 59 pages and only a handful have been
[29:33] pages and only a handful have been solved and the pages that are solved are
[29:35] solved and the pages that are solved are still mysterious January 2015 came and
[29:38] still mysterious January 2015 came and went with nothing from cicada some
[29:40] went with nothing from cicada some people speculated that cicada had enough
[29:42] people speculated that cicada had enough recruits for whatever it was they were
[29:44] recruits for whatever it was they were doing others thought that cicada would
[29:46] doing others thought that cicada would stay silent until all of Libra primis
[29:49] stay silent until all of Libra primis was solved and they could be right in
[29:51] was solved and they could be right in January 2016 cicada tweeted a link to a
[29:54] January 2016 cicada tweeted a link to a new image running the image throughout
[29:56] new image running the image throughout guest proved it was auth authentic hello
[29:59] guest proved it was auth authentic hello hello the path lies empty Epiphany seeks
[30:02] hello the path lies empty Epiphany seeks the devoted Libra pris is the way it's
[30:06] the devoted Libra pris is the way it's words are the map their meaning is the
[30:07] words are the map their meaning is the road and their numbers are the direction
[30:10] road and their numbers are the direction the devoted seek and you will be found
[30:12] the devoted seek and you will be found you will be found good luck you will be
[30:14] you will be found good luck you will be 3301 beware false paths many speculated
[30:18] 3301 beware false paths many speculated that their numbers are the direction was
[30:20] that their numbers are the direction was the major clue but still no progress was
[30:23] the major clue but still no progress was made in 2017 a user stumbled across a
[30:26] made in 2017 a user stumbled across a message from cicada in Google's C pages
[30:28] message from cicada in Google's C pages that nobody had noticed beware false
[30:31] that nobody had noticed beware false paths always verify pgp signature
[30:36] paths always verify pgp signature 3301 and that was the last anyone heard
[30:38] 3301 and that was the last anyone heard from cicada 3301 it's been a few years
[30:42] from cicada 3301 it's been a few years with no solution to Libra primis and no
[30:44] with no solution to Libra primis and no further contact from cicada this was
[30:46] further contact from cicada this was disappointing to a lot of people after
[30:49] disappointing to a lot of people after all this over several years we were
[30:51] all this over several years we were still no closer to finding out who
[30:53] still no closer to finding out who cicada 3301 was or what they did but
[30:56] cicada 3301 was or what they did but Liber primis was the thir Quest the
[30:59] Liber primis was the thir Quest the first two were solved and the people who
[31:01] first two were solved and the people who solved them they started
[31:03] solved them they started [Music]
[31:07] talking when that first image appeared
[31:09] talking when that first image appeared on 4chan looking for highly intelligent
[31:12] on 4chan looking for highly intelligent individuals the chase was on the
[31:14] individuals the chase was on the mysterious group known as 3301 presented
[31:17] mysterious group known as 3301 presented Clues and challenges that thousands of
[31:19] Clues and challenges that thousands of techies and puzzle solvers found
[31:21] techies and puzzle solvers found impossible to resist each Mystery became
[31:24] impossible to resist each Mystery became more complex the clues that connected
[31:26] more complex the clues that connected Julius Caesar and King Arthur to
[31:28] Julius Caesar and King Arthur to cryptography were genius and easy enough
[31:30] cryptography were genius and easy enough to solve that people became hooked the
[31:32] to solve that people became hooked the solutions that led to phone numbers and
[31:34] solutions that led to phone numbers and Geographic coordinates made the search
[31:36] Geographic coordinates made the search even more real but over time it became
[31:39] even more real but over time it became clear that 3301 was looking for a
[31:41] clear that 3301 was looking for a specific type of person to solve cicada
[31:43] specific type of person to solve cicada you needed knowledge of the concepts and
[31:45] you needed knowledge of the concepts and the tools used in encryption you had to
[31:47] the tools used in encryption you had to have computer skills understand
[31:49] have computer skills understand operating systems and be handy with
[31:51] operating systems and be handy with programming it also didn't hurt if you
[31:53] programming it also didn't hurt if you had expertise in mind numerology and
[31:55] had expertise in mind numerology and pre-christian literature yeah who
[31:56] pre-christian literature yeah who doesn't but who was cicada a popular
[32:00] doesn't but who was cicada a popular theory was that this was a recruiting
[32:02] theory was that this was a recruiting effort for a government intelligence
[32:03] effort for a government intelligence agency like CIA NSA or MI6 there was
[32:07] agency like CIA NSA or MI6 there was plenty of precedent for that during the
[32:09] plenty of precedent for that during the second world war the top secret
[32:11] second world war the top secret government code and Cipher School used
[32:13] government code and Cipher School used crossword puzzles printed in the Daily
[32:15] crossword puzzles printed in the Daily Telegraph to identify good candidates
[32:17] Telegraph to identify good candidates for Bletchley Park those recruits along
[32:19] for Bletchley Park those recruits along with Alan touring went on to solve the
[32:21] with Alan touring went on to solve the Enigma machine which helped the Allies
[32:23] Enigma machine which helped the Allies win the war NSA and CIA ran similar
[32:26] win the war NSA and CIA ran similar contests over the years companies like
[32:28] contests over the years companies like Google and Microsoft have also used
[32:30] Google and Microsoft have also used cryptography and puzzles to recruit but
[32:33] cryptography and puzzles to recruit but one of the early winners said cicada was
[32:35] one of the early winners said cicada was none of these after solving the final
[32:38] none of these after solving the final round of puzzles in 2013 he received an
[32:40] round of puzzles in 2013 he received an email with a username and password along
[32:43] email with a username and password along with a site address on the dark web the
[32:45] with a site address on the dark web the site had two parts a message board and a
[32:48] site had two parts a message board and a chat room The Message Board had various
[32:50] chat room The Message Board had various topics including a welcome section and
[32:52] topics including a welcome section and an area for cicada's goals and current
[32:54] an area for cicada's goals and current projects the chat room had about 20
[32:57] projects the chat room had about 20 members according to a couple of the
[32:59] members according to a couple of the winners cicada wanted to further the use
[33:01] winners cicada wanted to further the use of cryptography so more people would
[33:03] of cryptography so more people would have access to Internet privacy cicada
[33:06] have access to Internet privacy cicada had some big goals but in the short term
[33:08] had some big goals but in the short term they wanted to recruit highly technical
[33:10] they wanted to recruit highly technical people to develop open- Source
[33:12] people to develop open- Source cryptography software oh that to find
[33:14] cryptography software oh that to find people to write free software yep and I
[33:16] people to write free software yep and I think this was cicada's big mistake the
[33:18] think this was cicada's big mistake the recruits didn't want to write software
[33:20] recruits didn't want to write software they wanted to solve puzzles and when
[33:22] they wanted to solve puzzles and when the puzzle stopped the membership
[33:24] the puzzle stopped the membership dwindled there were spikes in membership
[33:26] dwindled there were spikes in membership when new challenges appeared but it was
[33:28] when new challenges appeared but it was the same story the winners weren't
[33:29] the same story the winners weren't interested in writing software they
[33:31] interested in writing software they weren't driven by ideology they didn't
[33:33] weren't driven by ideology they didn't care about politics they just wanted to
[33:35] care about politics they just wanted to solve puzzles the same thing happens
[33:37] solve puzzles the same thing happens when NSA CIA gchq and other intelligence
[33:41] when NSA CIA gchq and other intelligence organizations do recruitment drives many
[33:44] organizations do recruitment drives many of the winners are offered positions in
[33:45] of the winners are offered positions in one of these agencies and many of them
[33:47] one of these agencies and many of them refuse they don't want to work in
[33:49] refuse they don't want to work in government yeah they're too smart to
[33:50] government yeah they're too smart to work in government well that might be
[33:52] work in government well that might be part of it but really they just want to
[33:54] part of it but really they just want to solve puzzles whenever you achieve a
[33:56] solve puzzles whenever you achieve a task your bra rewards you with a hit of
[33:59] task your bra rewards you with a hit of dopamin this could mean finishing a
[34:01] dopamin this could mean finishing a workout completing a school project or
[34:03] workout completing a school project or figuring out an escape room achieve a
[34:05] figuring out an escape room achieve a goal get some dopamin our brains love
[34:08] goal get some dopamin our brains love dopamin it turns out that solving
[34:10] dopamin it turns out that solving problems is one of the biggest if not
[34:12] problems is one of the biggest if not the biggest source of dopamin for the
[34:14] the biggest source of dopamin for the brain solving puzzles like those
[34:16] brain solving puzzles like those presented by cicada reward us with
[34:18] presented by cicada reward us with dopamine while we're working on them and
[34:20] dopamine while we're working on them and when we actually solve one well cicada
[34:22] when we actually solve one well cicada solvers describe that feeling as nothing
[34:24] solvers describe that feeling as nothing less than exhilarating now plenty of
[34:26] less than exhilarating now plenty of people are interested in politics and
[34:28] people are interested in politics and ideology but not too many of them would
[34:30] ideology but not too many of them would describe their interest as exhilarating
[34:33] describe their interest as exhilarating puzzles make us happy when was the last
[34:35] puzzles make us happy when was the last time politics made you happy and
[34:37] time politics made you happy and although two of the goals of this
[34:38] although two of the goals of this channel are to educate and Inspire the
[34:40] channel are to educate and Inspire the primary goal is to entertain in other
[34:43] primary goal is to entertain in other words the why files is here to make you
[34:45] words the why files is here to make you happy so that's why I've included a cic
[34:48] happy so that's why I've included a cic type puzzle in this video think you can
[34:50] type puzzle in this video think you can find
[34:55] it thank you so much for hanging out
[34:57] it thank you so much for hanging out with us today my name is AJ that's echle
[34:59] with us today my name is AJ that's echle fish cus mirosa nka that's the May word
[35:02] fish cus mirosa nka that's the May word for hey how you doing this has been the
[35:04] for hey how you doing this has been the wi files if you had fun or learned
[35:06] wi files if you had fun or learned anything do us a favor like comment
[35:08] anything do us a favor like comment subscribe share that stuff really helps
[35:10] subscribe share that stuff really helps the channel and like most topics we
[35:11] the channel and like most topics we cover here today was recommended by you
[35:14] cover here today was recommended by you so if there's a story you'd like to see
[35:15] so if there's a story you'd like to see or learn more about go to the Wi
[35:17] or learn more about go to the Wi files.com tips and if you need more
[35:19] files.com tips and if you need more yfiles in your life check out the yfiles
[35:21] yfiles in your life check out the yfiles Discord it's free to join and there's
[35:23] Discord it's free to join and there's thousands of people on there and special
[35:25] thousands of people on there and special thanks to our patrons who made this
[35:26] thanks to our patrons who made this episode possible I couldn't do any of
[35:28] episode possible I couldn't do any of this without you so from the bottom of
[35:30] this without you so from the bottom of my heart thank you now if you'd like to
[35:31] my heart thank you now if you'd like to support the channel consider becoming a
[35:33] support the channel consider becoming a member on patreon it's only three bucks
[35:35] member on patreon it's only three bucks a month you get all kinds of perks like
[35:36] a month you get all kinds of perks like early access to the videos with no
[35:38] early access to the videos with no commercials and you get your name in the
[35:40] commercials and you get your name in the credits check those out if you're not
[35:42] credits check those out if you're not much of a joiner maybe buy something
[35:44] much of a joiner maybe buy something from the wi file store yeah grab a
[35:45] from the wi file store yeah grab a Heckle fish t-shirt or coffee mug or one
[35:47] Heckle fish t-shirt or coffee mug or one of these Heckle fish plushy talking doll
[35:50] of these Heckle fish plushy talking doll fish toys that's going to do it until
[35:53] fish toys that's going to do it until next time be safe be kind and know that
[35:55] next time be safe be kind and know that you are appreciated
[35:58] you are appreciated [Music]
[36:04] wow
[36:12] [Music]
[36:56] w
[36:59] w [Music]
[37:23] wowow w
[37:29] w [Music]
[38:16] w
[38:22] [Music]
[38:47] w
[38:48] w [Music]
[38:57] [Music] oh
[39:00] oh [Music]