# Solving Cicada 3301: Decoding the Internet's Greatest Mystery

https://www.youtube.com/watch?v=3ZfKfkuYwyM
Translation: zh-CN

[00:00] This episode of the Wi Files is brought to you by Aura.
  本期《Wi Files》节目由 Aura 呈现。

[00:03] Early in the morning of January 4th, 2012, a strange message appeared on the internet.
  2012年1月4日凌晨，一条奇怪的消息出现在互联网上。

[00:09] Just a few lines of text on a black background, posted anonymously.
  只是几行文字，黑底白字，匿名发布。

[00:14] Hello, we are looking for highly intelligent individuals.
  你好，我们正在寻找高智商的个体。

[00:16] To find them, we have devised a test.
  为了找到他们，我们设计了一个测试。

[00:21] There is a message hidden in this image, a test.
  这张图片里隐藏着一条信息，一个测试。

[00:23] Find it, and it will lead you on the road to finding us.
  找到它，它将引导你找到我们。

[00:25] Hello, we look forward to meeting the few that will make it all the way through.
  你好，我们期待与少数能够坚持到底的人见面。

[00:31] Good luck.
  祝你好运。

[00:33] 3301, many speculated that it was a recruiting tool for the NSA, the CIA, MI6, or even the Masons.
  3301，许多人猜测它是美国国家安全局、中央情报局、军情六处，甚至共济会的招募工具。

[00:39] But who was really behind this, and what was its purpose?
  但究竟是谁在幕后操纵，它的目的是什么？

[00:41] And did it even have a purpose?
  它甚至有目的吗？

[00:43] Whether it did or not, it didn't matter because when you post a puzzle on the internet looking for highly intelligent people, that's a challenge that's simply impossible to resist.
  无论有没有目的，这都不重要，因为当你在互联网上发布一个谜题，寻找高智商的人时，这是一个令人无法抗拒的挑战。

[00:53] So the hunt for Cicada 3301 was on.
  于是，寻找蝉3301的行动开始了。

[01:04] Yeah, he's got about six months left on his contract and I wanted to see if there's a way that I can get him out sooner.
  是的，他的合同还剩下大约六个月，我想看看有没有办法能让他早点出来。

[01:13] Yeah, I'm getting a lot of complaints about him.
  是的，我收到了很多关于他的投诉。

[01:15] Let me call you back.
  我稍后回电。

[01:18] Presto Human, I have made you appear on my screen.
  Presto Human，我让你出现在我的屏幕上了。

[01:21] I thought you were coming in this week.
  我以为你这周会来。

[01:23] Oh, no, no, no, I'm at there.
  哦，不，不，不，我在那里。

[01:26] Hang on.
  请稍等。

[01:26] Hello, you have reached the Great Goldini.
  您好，您已联系到伟大的戈尔迪尼。

[01:29] Good afternoon, Mr. Mor.
  下午好，莫先生。

[01:30] This is Susan with Best Bowl Solar.
  我是苏珊，来自 Best Bowl Solar。

[01:33] I'd like to offer you a free quote for solar panels for your bowl.
  我想为您提供免费的太阳能电池板报价。

[01:34] You can save dozens of dollars per year.
  您每年可以节省几十美元。

[01:36] Nope, I don't know.
  不，我不知道。

[01:39] And I rent, take me off your list.
  而且我租房，把我从你们的名单上除名。

[01:41] Where was I?
  我刚才说到哪了？

[01:41] Okay, uh, Gertie and I are at Magic Camp.
  好的，呃，我和格蒂在魔法营。

[01:44] Magic Camp?
  魔法营？

[01:44] Oh yeah, I need to practice my.
  哦，是的，我需要练习我的。

[01:47] Hang on.
  请稍等。

[01:50] Hello, you have reached the Great Goldini.
  您好，您已联系到伟大的戈尔迪尼。

[01:50] This is the IRS.
  这是国税局。

[01:52] You owe back taxes.
  您欠税款。

[01:52] We need you to send us three Best Buy gift cards or we'll have to arrest you.
  我们需要您寄给我们三张百思买礼品卡，否则我们将逮捕您。

[01:57] Can't be me.
  不可能是我。

[01:57] I don't pay taxes.
  我不交税。

[01:59] Taxes are theft.
  税收是盗窃。

[02:03] Don't pay taxes. Taxes are theft. Where was I? Oh yeah, so I'm working on my uh Presto dictation.
  不要交税。税是偷窃。我刚才说到哪儿了？哦对了，我正在研究我的那个“快速口述”。

[02:06] Was I? Oh yeah, so I'm working on my uh Presto dictation, Presto digitation he.
  我刚才说到哪儿了？哦对了，我正在研究我的那个“快速口述”，“快速数字输入”他。

[02:08] Presto dictation, Presto digitation he. What did I say? So I can't come in this week.
  快速口述，快速数字输入他。我说什么了？这周我来不了。

[02:11] What did I say? So I can't come in this week. I need a few more days at Magic Camp to perfect my slight of Fin and I'm trying to get Gertie to hold still for the sorty assistant half trick.
  我说什么了？这周我来不了。我需要在魔法营多待几天来完善我的“芬的障眼法”，并且我正试图让格蒂保持不动来完成“助手的半个把戏”。

[02:15] Camp to perfect my slight of Fin and I'm trying to get Gertie to hold still for the sorty assistant half trick.
  营来完善我的“芬的障眼法”，并且我正试图让格蒂保持不动来完成“助手的半个把戏”。

[02:17] Trying to get Gertie to hold still for the sorty assistant half trick.
  试图让格蒂保持不动来完成“助手的半个把戏”。

[02:20] I got to find a way to hide that hump. Yeah, I don't know if there's a way that you you know if they make spanks for camels.
  我得想办法藏起那个驼峰。是啊，我不知道有没有办法，你知道他们有没有给骆驼做束腹带的。

[02:21] Find a way to hide that hump. Yeah, I don't know if there's a way that you you know if they make spanks for camels.
  想办法藏起那个驼峰。是啊，我不知道有没有办法，你知道他们有没有给骆驼做束腹带的。

[02:23] Don't know if there's a way that you you know if they make spanks for camels.
  不知道他们有没有给骆驼做束腹带的。

[02:25] I don't think so but hang on. Hello, you have reached the great gold.
  我不这么认为，但等等。你好，你已联系到伟大的黄金。

[02:28] Don't think so but hang on. Hello, you have reached the great gold.
  不这么认为，但等等。你好，你已联系到伟大的黄金。

[02:30] Have reached the great gold. Hi Mr. Mor arti, this is Brandon from Save the Whales. Uh oh, would you be interested in making a small donation today?
  已联系到伟大的黄金。你好莫阿提先生，我是布兰登，来自拯救鲸鱼组织。呃哦，您今天有兴趣做一笔小额捐款吗？

[02:33] Hi Mr. Mor arti, this is Brandon from Save the Whales. Uh oh, would you be interested in making a small donation today?
  你好莫阿提先生，我是布兰登，来自拯救鲸鱼组织。呃哦，您今天有兴趣做一笔小额捐款吗？

[02:35] The whales. Uh oh, would you be interested in making a small donation today?
  鲸鱼。呃哦，您今天有兴趣做一笔小额捐款吗？

[02:37] In making a small donation today? Absolutely not. My uncle Horus spent 10 days trapped in the belly of a whale and now wherever he swims he has to keep the lights on.
  今天做一笔小额捐款？绝对不。我的叔叔霍勒斯曾被困在鲸鱼肚子里10天，现在无论他游到哪里都必须开着灯。

[02:40] Absolutely not. My uncle Horus spent 10 days trapped in the belly of a whale and now wherever he swims he has to keep the lights on.
  绝对不。我的叔叔霍勒斯曾被困在鲸鱼肚子里10天，现在无论他游到哪里都必须开着灯。

[02:42] Days trapped in the belly of a whale and now wherever he swims he has to keep the lights on.
  被困在鲸鱼肚子里10天，现在无论他游到哪里都必须开着灯。

[02:44] Now wherever he swims he has to keep the lights on. So you take your whales and stick them right up. Whoa, whoa, whoa, whoa, whoa, whoa, whoa.
  现在无论他游到哪里都必须开着灯。所以你把你的鲸鱼拿去，然后塞到……哇，哇，哇，哇，哇，哇，哇。

[02:46] Stick them right up. Whoa, whoa, whoa, whoa, whoa, whoa, whoa. Sorry, sorry. No, no thank you.
  塞到……哇，哇，哇，哇，哇，哇，哇。对不起，对不起。不，不，谢谢。

[02:47] Whoa, whoa, whoa, whoa, whoa, whoa, whoa. Sorry, sorry. No, no thank you.
  哇，哇，哇，哇，哇，哇，哇。对不起，对不起。不，不，谢谢。

[02:50] Sorry, sorry. No, no thank you. Take me off your stupid list now. Immediately, write this second.
  对不起，对不起。不，不，谢谢。把我从你们那个愚蠢的名单上划掉。立刻，马上。

[02:52] Take me off your stupid list now. Immediately, write this second. You sick.
  把我从你们那个愚蠢的名单上划掉。立刻，马上。你这个病态的。

[02:54] Immediately, write this second. You sick. Whoa, this is ridiculous. You need to get Aura, they can stop all these spam calls.
  立刻，马上。你这个病态的。哇，这太荒谬了。你需要安装Aura，他们可以阻止所有这些垃圾电话。

[02:57] Whoa, this is ridiculous. You need to get Aura, they can stop all these spam calls.
  哇，这太荒谬了。你需要安装Aura，他们可以阻止所有这些垃圾电话。

[02:59] Aura, they can stop all these spam calls. AA, are they sponsoring us again? Yep, Aura.
  Aura，他们可以阻止所有这些垃圾电话。AA，他们又在赞助我们了吗？是的，Aura。

[03:03] AA are they sponsoring us again yep Aura can identify data Brokers that are selling your info and submit opt out requests on your behalf.
  AA 再次赞助我们吗？是的，Aura 可以识别那些出售你信息的在线数据经纪人，并代表你提交退出请求。

[03:07] H so I can stop answering all these stupid phone calls.
  H，这样我就可以停止接听所有这些愚蠢的电话了。

[03:12] You can and AA does a lot more than protect you from Robo calls.
  你可以，而且AA的功能远不止保护你免受机器人电话的骚扰。

[03:14] You can set up antivirus, VPN, password management, identity theft insurance, all from one easy app with one affordable price.
  你可以设置防病毒软件、VPN、密码管理、身份盗窃保险，所有这些都来自一个易于使用的应用程序，价格实惠。

[03:23] Hey, uh, does it have a parental controls for the Guppies?
  嘿，呃，它有针对小孩子的家长控制功能吗？

[03:25] One of my boys just turned 13 and I I don't want them checking out the L and only things.
  我的一个儿子刚满13岁，我不想让他们查看那些不该看的东西。

[03:31] Yeah, Aura has parental controls, so go to aura.com theey files or click the link in the description to get a free 2eek trial.
  是的，Aura 具有家长控制功能，所以请访问 aura.com theey files 或点击描述中的链接，即可获得免费的两周试用。

[03:38] aura.com theey files I got it I'll do it right after we figure out how to get gery out of this sword assistant in the half box.
  aura.com theey files 我知道了，我们弄清楚如何把格里从那个剑助手那里弄出来后，我就会去做。

[03:45] Uh, we kind of have a hump stuck in a head hole situation.
  呃，我们有点陷入了困境。

[03:49] Yeah, you're probably not it's okay baby, it's your daddy who make it all better.
  是的，你可能不是，没关系宝贝，是你爸爸会把它都变好的。

[03:53] All right, I got to go find my camel Lube.
  好吧，我得去找我的骆驼润滑剂了。

[03:55] What is camel lube and why do you have it?
  什么是骆驼润滑剂？你为什么会有它？

[03:58] You don't worry about that.
  你不用担心那个。

[04:00] Okay, you ready for this? Here we go.
  好的，你准备好了吗？我们开始吧。

[04:02] Goldini
  戈尔迪尼

[04:04] goldini out am I still here you are
  goldini出去了，我还在吗？你还在。

[04:08] out am I still here you are goldini
  出去了，我还在吗？你还在，goldini。

[04:10] goldini out you see me yep
  goldini出去了，你看见我了吗？是的。

[04:14] out you see me yep goldini out still yes all right I'm
  出去了，你看见我了吗？是的，goldini出去了，还在。好的，我

[04:19] goldini out still yes all right I'm going to need a few more days at Magic
  goldini出去了，还在。好的，我还需要几天在Magic

[04:20] going to need a few more days at Magic Camp to work on that you're supposed to
  还需要几天在Magic Camp上工作，你应该

[04:22] Camp to work on that you're supposed to be here this week out
  Camp上工作，你应该这周在这里，出去了。

[04:26] [Music]
  [音乐]

[04:30] on January 4th 2012 the first puzzle was
  2012年1月4日，第一个谜题是

[04:33] on January 4th 2012 the first puzzle was posted on forchan by a self-identified
  2012年1月4日，第一个谜题被发布在forchan上，由一个自称为

[04:35] group called 3301 the post was simply an
  名为3301的团体发布的，帖子仅仅是一个

[04:38] group called 3301 the post was simply an image with text there is a message
  名为3301的团体发布的，帖子仅仅是一张带有文字的图片，有一个信息

[04:41] image with text there is a message hidden in this image find it and it will
  图片，上面有文字，有一个信息隐藏在这张图片里，找到它，它就会

[04:44] hidden in this image find it and it will lead you on the road to finding
  隐藏在这张图片里，找到它，它就会引导你找到

[04:46] lead you on the road to finding us the puzzle was open to anyone and
  找到我们，这个谜题对任何人开放，而且

[04:49] us the puzzle was open to anyone and everyone as you solve each clue you move
  我们，这个谜题对任何人、每个人都开放，当你解开每个线索时，你就进入

[04:51] everyone as you solve each clue you move on to the next level the image that was
  每个人，当你解开每个线索时，你就进入下一关，那张图片

[04:53] on to the next level the image that was posted on forchan was the first clue
  下一关，那张发布在forchan上的图片是第一个线索。

[04:55] posted on forchan was the first clue solvers tried various methods to extract
  发布在forchan上的图片是第一个线索，解谜者尝试了各种方法来提取

[04:58] solvers tried various methods to extract The Secret Message some used Photoshop
  解谜者尝试了各种方法来提取秘密信息，有些人使用了Photoshop

[05:00] The Secret Message some used Photoshop to view the pixels they applied
  秘密信息，有些人使用了Photoshop来查看像素，他们应用了

[05:02] to view the pixels they applied different filters and techniques to see
  来查看像素，他们应用了不同的滤镜和技术来查看

[05:04] different filters and techniques to see what could be hidden in the image but
  不同的滤镜和技术来查看图片中可能隐藏的内容，但是

[05:05] what could be hidden in the image but the solution to the puzzle wasn't visual
  图像中可能隐藏着什么，但谜题的答案并非视觉上的

[05:08] the solution to the puzzle wasn't visual it was plain text
  谜题的答案并非视觉上的，而是纯文本

[05:10] when an image is opened in a text editor it looks like
  当图像在文本编辑器中打开时，它看起来像

[05:12] opened in a text editor it looks like nonsense strings of characters and
  在文本编辑器中打开时，它看起来像无意义的字符和字符串

[05:14] nonsense strings of characters and symbols but to a computer these symbols
  无意义的字符和符号字符串，但对计算机来说，这些符号

[05:16] symbols but to a computer these symbols make sense it's a binary format
  符号对计算机来说是有意义的，它是一种二进制格式

[05:19] make sense it's a binary format representing pixel placement color
  有意义的，它是一种二进制格式，表示像素的放置、颜色

[05:20] representing pixel placement color information metadata and all kinds of
  表示像素的放置、颜色信息、元数据以及各种

[05:23] information metadata and all kinds of other stuff and when the 3301 image was
  信息、元数据以及各种其他东西，当 3301 图像被

[05:25] other stuff and when the 3301 image was opened in a text editor there was a
  其他东西，当 3301 图像在文本编辑器中打开时，有一个

[05:27] opened in a text editor there was a string of characters at the end of the
  在文本编辑器中打开时，在文件末尾有一个字符组成的字符串

[05:29] string of characters at the end of the file
  文件末尾的字符组成的字符串

[05:32] because of the repeating characters and
  由于重复的字符和

[05:34] because of the repeating characters and the name tiberious Claudius Caesar
  由于重复的字符和提比略·克劳狄·凯撒的名字

[05:36] the name tiberious Claudius Caesar people quickly and correctly guess the
  提比略·克劳狄·凯撒的名字，人们很快就正确地猜测出

[05:39] people quickly and correctly guess the message was encoded with a Caesar Cipher
  人们很快就正确地猜测出消息是用凯撒密码编码的

[05:41] message was encoded with a Caesar Cipher a Caesar Cipher works by Shifting the
  消息是用凯撒密码编码的，凯撒密码通过移动字母表中的

[05:43] a Caesar Cipher works by Shifting the letters of the alphabet a fixed number
  凯撒密码通过移动字母表中固定数量的字母来工作

[05:45] letters of the alphabet a fixed number of places down or up you choose a shift
  固定数量的字母，向下或向上移动，你选择一个移位

[05:48] of places down or up you choose a shift value for example three and for each
  向下或向上移动的值，例如三，然后对于每个

[05:50] value for example three and for each letter in the original text replace it
  值，例如三，对于原始文本中的每个字母，用它替换

[05:52] letter in the original text replace it with the letter that's located three
  原始文本中的字母，用位于三个位置的字母替换它

[05:54] with the letter that's located three positions down if you reach the end of
  位于三个位置的字母，如果你到达字母表的末尾

[05:56] positions down if you reach the end of the alphabet you wrap around to the
  向下移动，如果你到达字母表的末尾，你会绕回到

[05:57] the alphabet you wrap around to the beginning for example using a shift
  字母表的开头，例如，使用一个移位

[05:59] beginning for example using a shift value Val of three a becomes D B becomes
  开头，例如，使用移位值 Val 为三，A 变成 D，B 变成

[06:02] value Val of three a becomes D B becomes e c becomes F and so on the Caesar
  值 Val 为三，A 变成 D，B 变成 E，C 变成 F，以此类推，凯撒

[06:05] e c becomes F and so on the Caesar Cipher is easy to crack with modern
  E 变成 F，以此类推，凯撒密码很容易被现代

[06:07] Cipher is easy to crack with modern methods and isn't considered secure but methods and isn't considered secure but it's historically significant and often it's historically significant and often used as a basic introduction to used as a basic introduction to cryptography such was the case with the cryptography such was the case with the first puzzle when the message was first puzzle when the message was decoded with a shift of four places the decoded with a shift of four places the result was a URL which turned out to be result was a URL which turned out to be another another image whoops just decoys this way looks image whoops just decoys this way looks like you can't guess how to get the like you can't guess how to get the message out message out the participants hit their first wall the participants hit their first wall opening this image in a text editor opening this image in a text editor showed nothing turned out that the image showed nothing turned out that the image contain two keywords that hint at how to contain two keywords that hint at how to get the real message out the words guess get the real message out the words guess and out those keywords indicated you and out those keywords indicated you needed to run the image through out needed to run the image through out guess a small application used for guess a small application used for steganography throughout this steganography throughout this complicated scavenger hunt out guest complicated scavenger hunt out guest would become a favorite tool of cicada would become a favorite tool of cicada 3301 now steganography is hiding a 3301 now steganography is hiding a message image or file message image or file within another message image or file within another message image or file unlike encryption which scrambles data unlike encryption which scrambles data so that it's unreadable without the so that it's unreadable without the correct key seog graphy conceals the
  密码很容易被现代方法破解，并不被认为是安全的，但方法并且不被认为是安全的，但它具有历史意义，并且经常它具有历史意义，并且经常被用作密码学的基础介绍，被用作密码学的基础介绍，就像第一个谜题一样，当消息被第一个谜题一样，当消息被用四位移解码时，用四位移解码时，结果是一个URL，结果是一个URL，是另一个是另一个图像，哎呀，只是诱饵，这样看起来，哎呀，只是诱饵，这样看起来，你似乎猜不到如何获取，你似乎猜不到如何获取消息，消息，参与者遇到了他们的第一个障碍，参与者遇到了他们的第一个障碍，在文本编辑器中打开此图像，在文本编辑器中打开此图像，什么也没显示，原来图像，什么也没显示，原来图像包含两个关键词，暗示如何包含两个关键词，暗示如何获取真实消息，获取真实消息，猜测和输出，猜测和输出，这些关键词表明你需要，这些关键词表明你需要通过Out运行图像，你需要通过Out运行图像，Guess，一个用于，Guess，一个用于隐写术的小应用程序，贯穿整个，贯穿整个，这个复杂的寻宝游戏，Out Guess，这个复杂的寻宝游戏，Out Guess将成为Cicada 3301的最爱工具，将成为Cicada 3301的最爱工具，现在隐写术是隐藏一个，现在隐写术是隐藏一个消息、图像或文件，消息、图像或文件，在另一个消息、图像或文件中，在另一个消息、图像或文件中，与加密不同，加密会打乱数据，与加密不同，加密会打乱数据，使其在没有正确密钥的情况下无法读取，使其在没有正确密钥的情况下无法读取，Seog graphy 隐藏了

[07:08] Correct key seography conceals the fact that a secret message exists at all.
  正确的密钥地理学掩盖了这样一个事实：存在秘密消息。

[07:11] Fact that a secret message exists at all.
  秘密消息确实存在的事实。

[07:13] Imagine you have a digital photo and you want to hide a text message in it.
  想象一下你有一张数码照片，你想在里面隐藏一条文本消息。

[07:15] You could suly change the color values of certain pixels to encode the text.
  你可以通过更改某些像素的颜色值来编码文本。

[07:17] To anyone looking at the image it appears normal.
  对于任何查看图像的人来说，它看起来都很正常。

[07:19] But someone who knows where and how to look could extract the hidden message out.
  但是，知道在哪里以及如何查看的人可以提取隐藏的消息。

[07:25] Guest revealed a page on Reddit and a different clue.
  Guest 透露了一个 Reddit 页面和一个不同的线索。

[07:27] A book cipher.
  一本密码书。

[07:30] Book ciphers are almost impossible to crack without the book.
  如果没有这本书，密码书几乎是不可能破解的。

[07:32] But 3301 knew how to give us just enough information to keep us hooked.
  但 3301 知道如何给我们足够的信息来吸引我们。

[07:37] And people were hooked.
  人们被吸引住了。

[07:39] So when solvers finally made it to Reddit they realized that cicada 3301 was just warming up.
  因此，当解谜者最终来到 Reddit 时，他们意识到蝉 3301 只是在热身。

[07:44] When the image of the duck was processed without guess it revealed a URL and a book Cipher.
  当对鸭子图像进行处理时，它会显示一个 URL 和一本密码书。

[07:51] A book Cipher is a type of encryption where the key to deciphering the code is a specific text.
  密码书是一种加密类型，其中解密代码的密钥是特定的文本。

[07:56] Such as a book or article.
  例如一本书或一篇文章。

[07:59] Each word or letter in the secret message is replaced by a coordinate that points to its.
  秘密消息中的每个单词或字母都被一个指向其的坐标替换。

[08:10] by a coordinate that points to its location in the chosen text for example.
  通过一个指向其在所选文本中位置的坐标，例如。

[08:12] location in the chosen text for example if the word apple is found on page 42.
  所选文本中的位置，例如，如果在第 42 页找到单词 apple。

[08:15] if the word apple is found on page 42 line 5 word three of the book you'd.
  如果在第 42 页第 5 行第 3 个单词处找到单词 apple，您将。

[08:17] line 5 word three of the book you'd replace Apple in your message with the.
  第 5 行第 3 个单词，您将用该坐标替换消息中的 Apple。

[08:19] replace Apple in your message with the coordinates.
  用坐标替换消息中的 Apple。

[08:21] coordinates 4253 the be ciphers are set of three.
  坐标 4253，这些密码是三组。

[08:24] 4253 the be ciphers are set of three Cipher texts that supposedly reveal the.
  4253，这些密码是三组密码文本，据称揭示了。

[08:26] Cipher texts that supposedly reveal the location of $43 million of hidden.
  据称揭示了 4300 万美元隐藏的地点。

[08:29] location of $43 million of hidden treasure somewhere in Bedford County.
  隐藏在贝德福德县某处的 4300 万美元宝藏的地点。

[08:31] treasure somewhere in Bedford County Virginia they were first published in.
  宝藏，它们于 1885 年首次出版。

[08:33] Virginia they were first published in 1885 and the second text was actually.
  弗吉尼亚州，它们于 1885 年首次出版，第二个文本实际上是。

[08:35] 1885 and the second text was actually decoded using the Declaration of.
  1885 年，第二个文本实际上是使用《独立宣言》解码的。

[08:37] decoded using the Declaration of Independence the other two texts are.
  使用《独立宣言》解码，另外两个文本是。

[08:39] Independence the other two texts are still a mystery but over a 100 years.
  独立宣言，另外两个文本仍然是个谜，但 100 多年后。

[08:41] still a mystery but over a 100 years later people are still looking yeah 43.
  仍然是个谜，但 100 多年后人们仍在寻找，是的，43。

[08:44] later people are still looking yeah 43 mil keeps you motivated it does so to.
  人们仍在寻找，是的，4300 万美元能激励你，确实如此，所以要。

[08:47] mil keeps you motivated it does so to decode 3301 book Cipher will need the.
  激励你，确实如此，要解码 3301 图书密码，你需要。

[08:50] decode 3301 book Cipher will need the book which could be found on Reddit but.
  解码 3301 图书密码，你需要这本书，这本书可以在 Reddit 上找到，但是。

[08:52] book which could be found on Reddit but when you got to the page on Reddit it.
  这本书可以在 Reddit 上找到，但是当你进入 Reddit 上的页面时，它。

[08:54] when you got to the page on Reddit it was full of posts with encrypted titles.
  当你进入 Reddit 上的页面时，它充满了带有加密标题的帖子。

[08:56] was full of posts with encrypted titles there was also an odd image in the.
  充满了带有加密标题的帖子，页眉中还有一个奇怪的图像。

[08:58] there was also an odd image in the header even the the page had a title.
  页眉中还有一个奇怪的图像，甚至页面上还有一个标题。

[09:00] header even the the page had a title that looked like random characters but.
  标题看起来像随机字符，但。

[09:02] that looked like random characters but by now everyone knew there was nothing.
  看起来像随机字符，但到那时，每个人都知道没有什么。

[09:04] by now everyone knew there was nothing random about it there were also several.
  没有什么随机之处，还有几行文本和两个额外的图像。

[09:06] random about it there were also several lines of texts and two additional images.
  随机之处，还有几行文本和两个额外的图像。

[09:09] lines of texts and two additional images using out guess on the welcome that.
  使用我们对欢迎语的猜测。

[09:10] using out guess on the welcome that image gives us this from here on out we
  利用我们对欢迎的猜测，这张图片给了我们，从现在开始我们

[09:14] image gives us this from here on out we will cryptographically sign all messages
  图片给了我们，从现在开始我们将对所有消息进行加密签名

[09:16] will cryptographically sign all messages with this key it is available on the MIT
  将用此密钥对所有消息进行加密签名，它可以在MIT上找到

[09:19] with this key it is available on the MIT key servers patience is a virtue good
  用此密钥，它可以在MIT密钥服务器上找到，耐心是一种美德，祝你好运

[09:22] key servers patience is a virtue good luck 3301 good luck this information was
  密钥服务器，耐心是一种美德，祝你好运3301，祝你好运，这些信息对人们来说

[09:26] luck 3301 good luck this information was extremely important to the people
  好运3301，祝你好运，这些信息对人们来说极其重要

[09:27] extremely important to the people following the clues the there were a lot
  极其重要，追随线索的人们，有很多

[09:29] following the clues the there were a lot of imposters popping up pretending to be
  追随线索的人们，有很多冒名顶替者冒出来，假装是

[09:31] of imposters popping up pretending to be cicada 3301 but because 3301 implemented
  冒名顶替者冒出来，假装是蝉3301，但因为3301实现了

[09:35] cicada 3301 but because 3301 implemented pgp encryption new messages could be
  蝉3301，但因为3301实现了PGP加密，新消息可以被

[09:38] pgp encryption new messages could be authenticated pgp stands for pretty good
  PGP加密，新消息可以被验证，PGP代表“相当好”

[09:41] authenticated pgp stands for pretty good privacy and this is an encryption system
  验证，PGP代表“相当好的隐私”，这是一个加密系统

[09:43] privacy and this is an encryption system used for sending emails and sensitive
  隐私，这是一个加密系统，用于发送电子邮件和敏感

[09:44] used for sending emails and sensitive files how it works is you create two
  用于发送电子邮件和敏感文件，它的工作原理是创建两个

[09:47] files how it works is you create two keys one is public which you share with
  文件，它的工作原理是创建两个密钥，一个是公开的，你与他人分享

[09:49] keys one is public which you share with everyone the other is private which only
  密钥，一个是公开的，你与大家分享，另一个是私有的，只有

[09:51] everyone the other is private which only you have so if someone wants to send you
  大家拥有，另一个是私有的，只有你拥有，所以如果有人想给你发送

[09:53] you have so if someone wants to send you a secure message they encrypt it with
  你拥有，所以如果有人想给你发送一个安全的消息，他们会用它加密

[09:55] a secure message they encrypt it with the public key that you shared and then
  一个安全的消息，他们会用你分享的公钥加密，然后

[09:57] the public key that you shared and then you use your private key to decode the
  你分享的公钥，然后你用你的私钥来解码

[09:59] you use your private key to decode the message 3301 would encrypt all their
  你用你的私钥来解码消息，3301会加密他们所有的

[10:02] message 3301 would encrypt all their Clues going forward like the clue hidden
  消息，3301会加密他们所有的线索，就像隐藏在

[10:04] Clues going forward like the clue hidden in the second image which was a
  线索一样，隐藏在第二张图片中，那是一个

[10:05] in the second image which was a stereogram which is an optical illusion
  在第二张图片中，那是一个立体图，它是一种视觉错觉

[10:08] stereogram which is an optical illusion that creates a 3D image when viewed in a
  立体图，它是一种视觉错觉，在以特定方式观看时会产生3D图像

[10:10] that creates a 3D image when viewed in a specific way this stereogram kind of
  在以特定方式观看时会产生3D图像，这种立体图有点像

[10:12] specific way this stereogram kind of looked like the Holy Grail cute and this
  这种立体图的特定方式看起来像圣杯，可爱，而这个

[10:15] looked like the Holy Grail cute and this image also contained a secret
  看起来像圣杯，可爱，而这张图片还包含了一个秘密

[10:17] image also contained a secret message the key has always been right in
  图片还包含了一个秘密信息，关键一直就在

[10:20] message the key has always been right in front of your eyes this isn't the quest
  信息，关键一直就在你眼前，这不是寻找圣杯的旅程

[10:22] front of your eyes this isn't the quest for the Holy Grail stop making it more
  在你眼前，这不是寻找圣杯的旅程，别让它变得更

[10:25] for the Holy Grail stop making it more difficult than it is good luck 3301
  寻找圣杯，别让它变得比实际更困难，祝你好运 3301

[10:29] difficult than it is good luck 3301 Grail the subreddit also contained many
  比实际更困难，祝你好运 3301 圣杯，该子版块还包含了很多

[10:31] Grail the subreddit also contained many lines of what appeared to be encrypted
  圣杯，该子版块还包含了很多似乎是加密的

[10:33] lines of what appeared to be encrypted text the question that everyone faced
  似乎是加密文本的行，每个人都面临的问题是

[10:35] text the question that everyone faced was which Cipher method had to be used
  文本，每个人都面临的问题是必须使用哪种密码方法

[10:38] was which Cipher method had to be used and how do you find the key the hidden
  必须使用哪种密码方法，以及如何找到密钥，隐藏的

[10:40] and how do you find the key the hidden message provided a hint the key was
  以及如何找到密钥，隐藏的信息提供了一个线索，密钥是

[10:42] message provided a hint the key was literally in front of your eyes it was
  信息提供了一个线索，密钥就在你眼前，它就是

[10:45] literally in front of your eyes it was the image in the
  就在你眼前，就是标题栏中的图像

[10:46] the image in the header those symbols are actually Maya
  标题栏中的图像，那些符号实际上是玛雅

[10:49] header those symbols are actually Maya numbers the title translates to cus
  标题栏中的图像，那些符号实际上是玛雅数字，标题翻译为 cus

[10:53] numbers the title translates to cus mirror thot nka what are you talking
  数字，标题翻译为 cus mirror thot nka 你在说什么

[10:56] mirror thot nka what are you talking about the clue I'm going to solve this
  mirror thot nka 你在说什么，这个线索我要解决了

[10:58] about the clue I'm going to solve this one okay what is it kiss smat nka yeah
  关于这个线索，我要解决这个了，好的，是什么？kiss smat nka 是的

[11:02] one okay what is it kiss smat nka yeah that's a that's a Mayan word for
  一个，好的，是什么？kiss smat nka 是的，那是一个玛雅语单词，意思是

[11:04] that's a that's a Mayan word for something right a Mayan word for goat
  那是一个玛雅语单词，意思是某物，对吧？玛雅语单词，意思是山羊

[11:06] something right a Mayan word for goat kiss no the letters make up a the Mayan
  某物，对吧？玛雅语单词，意思是山羊，kiss 不，这些字母组成了一个玛雅

[11:09] kiss no the letters make up a the Mayan word for letters no they make up the
  kiss 不，这些字母组成了一个玛雅语单词，意思是字母，不，它们组成了一个

[11:11] word for letters no they make up the Mayan word for makeup no it's a key the
  玛雅语单词，意思是化妆，不，它是一个密钥，

[11:13] Mayan word for makeup no it's a key the Mayan word for key it's not a Mayan word.
  玛雅语中“化妆品”的词不是，它是“钥匙”，玛雅语中“钥匙”的词不是玛雅语。

[11:16] Mayan word for key it's not a Mayan word it's an encryption key okay okay don't get your panties in a wad.
  玛雅语中“钥匙”的词不是玛雅语，它是加密密钥，好的，好的，别激动。

[11:18] uh key to what remember the subreddit was full of post with encrypted titles it was determined that they were encoded with a visionaire cipher which is another letter Shi encryption technique.
  呃，钥匙是什么？还记得那个子版块里充满了加密标题的帖子吗？它被确定是用维吉尼亚密码编码的，这是一种字母移位加密技术。

[11:28] visionaire cipher which is another letter Shi encryption technique visionaire encoded text needs a key the string of letters made from the Maya numbers was that key.
  维吉尼亚密码，这是一种字母移位加密技术。维吉尼亚加密文本需要一个密钥，由玛雅数字组成的字母串就是那个密钥。

[11:34] without the key decoding a visionaire encrypted message is almost impossible even with the key.
  没有密钥，解码维吉尼亚加密消息几乎是不可能的，即使有了密钥。

[11:39] it would take a long time and if you miss just one letter you end up with meaningless texts.
  这需要很长时间，如果你漏掉一个字母，你就会得到无意义的文本。

[11:45] so your translation has to be perfect but there's no reason to do it manually it takes a lot of processing power.
  所以你的翻译必须是完美的，但没有理由手动进行，这需要大量的处理能力。

[11:51] but computers can eventually guess most visionaire keys but if you already have the key computers can easily decode the message.
  但计算机最终可以猜出大多数维吉尼亚密钥，但如果你已经有了密钥，计算机就可以轻松解码消息。

[11:59] there even websites to help you do this the decoded text was from Thomas bullfinch's mythology.
  甚至还有网站可以帮助你做到这一点，解码后的文本来自托马斯·布尔芬奇的《神话学》。

[12:03] this was a classic work based on the tales of King Arthur the knights the round table and their hunt for the Holy Grail.
  这是一部经典著作，基于亚瑟王、圆桌骑士及其寻找圣杯的传说。

[12:09] so now the solvers knew the book that was needed to decode the book Cipher but this time it
  所以现在解谜者知道了需要解码书籍密码的书，但这次是

[12:14] decode the book Cipher but this time it wasn't a message or a web page or an image.
  解码这本书的密码，但这次它不是一条消息、一个网页或一张图片。

[12:16] it wasn't a message or a web page or an image it was a phone number.
  它不是一条消息、一个网页或一张图片，而是一个电话号码。

[12:23] at first people thought cicada 3301 was just an online troll pumping out puzzles to waste everyone's time.
  起初，人们认为 Cicada 3301 只是一个在线巨魔，发布谜题来浪费大家的时间。

[12:28] but there was just too much work put into it.
  但其中付出的努力实在太多了。

[12:31] whoever was behind the puzzles was someone with computer skills and advanced knowledge in cryptography.
  无论谁在这些谜题背后，都拥有计算机技能和先进的密码学知识。

[12:36] so the duck image led to a book code and a page on Reddit.
  因此，这张鸭子图片导向了一个图书密码和一个 Reddit 页面。

[12:40] and the page on Reddit led to two more images Maya numbers and the book Cipher.
  而 Reddit 页面又导向了另外两张图片：玛雅数字和图书密码。

[12:44] and the book was about King Arthur's quest for the Holy Grail.
  这本书是关于亚瑟王寻找圣杯的传说。

[12:48] get on with it now we can use the book code mentioned in the out guest message from the initial image.
  继续说吧，现在我们可以使用初始图片中提到的访客消息中提到的图书密码了。

[12:57] a book code en codes each letter with two numbers the line number and the character index in the line.
  图书密码用两个数字对每个字母进行编码：行号和该行中的字符索引。

[13:03] by applying the book code to the text we get the following text string.
  通过将图书密码应用于文本，我们得到以下文本字符串。

[13:08] call us telephone number 21439 0968.
  请致电我们，电话号码是 21439 0968。

[13:14] call us when the book Cipher revealed a phone number in Austin Texas.
  当图书密码揭示了德克萨斯州奥斯汀的一个电话号码时，请联系我们。

[13:17] revealed a phone number in Austin Texas Cod Breakers thought they'd finally learn who was behind cicada 3301.
  揭露了德克萨斯州奥斯汀的一个电话号码，破译者认为他们终于知道了 cicada 3301 背后的身份。

[13:27] very good you have done well there are three prime numbers associated with the original final. jpeg image 330 one.
  非常好，你做得很好，原始的最终 jpeg 图像 3301 与三个素数相关。

[13:38] is one of them you will have to find the other two multiply all three of these numbers together and at.com on the end to find the next step good luck.
  其中一个是，你必须找到另外两个，将这三个数字相乘，并在末尾加上 .com，以找到下一步，祝你好运。

[13:50] goodbye no answers just another clue cicada 3301 was a series of intricately woven puzzles.
  再见，没有答案，只有一个线索，cicada 3301 是一系列错综复杂的谜题。

[13:57] each puzzle got progressively more complex but future puzzles often referred back to earlier ones indicating this entire process was thought out well in advance.
  每个谜题都越来越复杂，但未来的谜题经常会回顾早期的谜题，这表明整个过程是经过深思熟虑的。

[14:06] the length of the scavenger hunt also weeded out casual participants only those with patience would continue.
  寻宝游戏的长度也淘汰了偶尔参与者，只有有耐心的人才会继续。

[14:12] it was natural selection solvers went back to the
  这是自然选择，解谜者回到了

[14:18] selection solvers went back to the original image looking for anything that would indicate a prime number out guest.
  选择求解器回到了原始图像，寻找任何能表明是质数的线索。

[14:22] revealed nothing scanning the image with Photoshop and other forensic tools also provided no help.
  扫描图像，使用Photoshop和其他取证工具，均未发现任何线索，也未提供任何帮助。

[14:27] people counted the characters and the spaces in the text.
  人们计算了文本中的字符和空格。

[14:31] they converted the characters to aski.
  他们将字符转换为ASCII。

[14:33] they ran the text through every cryptography algorithm you can think of and still nothing.
  他们将文本通过你能想到的每一种密码学算法运行，仍然一无所获。

[14:36] but like many of the cicada puzzles the answer was hidden in plain sight.
  但就像许多蝉谜一样，答案就隐藏在显眼的地方。

[14:41] the original image looks like a square but Keen observers noticed it wasn't a perfect square.
  原始图像看起来像一个正方形，但敏锐的观察者注意到它不是一个完美的正方形。

[14:46] the image was actually 509 pixels wide by 503 pixels tall.
  图像的实际尺寸是509像素宽，503像素高。

[14:53] 509 and 503 are prime numbers.
  509和503是质数。

[14:57] multiply 509 by by 503 by 3301 and you get 84514.
  将509乘以503再乘以3301，得到84514。

[15:02] 5127 adda.com just like the voicemail said.
  5127 adda.com，就像语音留言说的那样。

[15:06] and that's where we see the infamous cicada image for the first time.
  这就是我们第一次看到臭名昭著的蝉图像的地方。

[15:11] under the image was a timer and it was counting down.
  图像下方有一个计时器，它正在倒计时。

[15:13] when the countdown reached zero the timer was replaced with a list of coordinates.
  当倒计时归零时，计时器被替换为坐标列表。

[15:15] 14 locations in five.
  五个中的14个位置。

[15:21] of coordinates 14 locations in five countries all over the world with an invitation to find the location nearest you up until now the puzzles existed exclusively on the internet but now cicada 3301 was going out into the real world.
  在世界五大洲的14个地点坐标，并附有邀请，找到离你最近的地点。到目前为止，这些谜题只存在于互联网上，但现在蝉3301正在走向现实世界。

[15:38] the list of 14 locations around the world indicated that cicada 3301 was a global organization or a handful of people with the time and money to create complex puzzles and travel the globe but by taking the next round of puzzles into the real world cicada created another filter in order to move forward.
  世界各地14个地点的列表表明，蝉3301是一个全球性组织，或者是一小群有时间和金钱来创造复杂谜题并环游世界的人，但通过将下一轮谜题带入现实世界，蝉创造了另一个筛选器，以便继续前进。

[15:55] not only did you have to be excellent cryptography you had to have the means to travel to one of the locations provided and only the most committed could proceed at each of the coordinates was a poster containing the cicada image and a QR code scanning the QR code resulted in a link to another JPEG file like before running the image through out guest revealed secret text a poem of fading death named for a
  你不仅要精通密码学，还要有能力前往提供的地点之一，只有最坚定的人才能继续前进。在每个坐标处都有一张海报，上面有蝉的图像和一个二维码。扫描二维码会得到一个指向另一个JPEG文件的链接，就像之前一样，通过out guest运行图像揭示了秘密文本，一首名为“垂死之诗”的诗，

[16:21] text a poem of fading death named for a king meant to be read only once and.
  写一首关于垂死之诗，以一位国王的名字命名，只读一次。

[16:23] king meant to be read only once and vanish alas it could not remain unseen.
  国王，只读一次，然后消失，唉，它无法保持不被看见。

[16:27] vanish alas it could not remain unseen the image also included a warning you've.
  消失，唉，它无法保持不被看见，图像还包含一个警告，你已经。

[16:30] the image also included a warning you've shared too much to this point we want.
  图像还包含一个警告，你已经分享了太多到目前为止，我们想要。

[16:32] shared too much to this point we want the best not the followers thus the.
  分享了太多到目前为止，我们想要最好的，而不是追随者，因此。

[16:36] the best not the followers thus the first few there will receive the prize.
  最好的，而不是追随者，因此，最先的几个人将获得奖品。

[16:38] first few there will receive the prize good luck luck.
  最先的几个人将获得奖品，祝你好运，好运。

[16:41] good luck luck 3301 considering the difficulty of the.
  祝你好运，好运，3301，考虑到它的难度。

[16:43] 3301 considering the difficulty of the puzzles and the Mystery surrounding them.
  3301，考虑到谜题的难度以及围绕它们的神秘性。

[16:45] puzzles and the Mystery surrounding them it was only natural that people were.
  谜题以及围绕它们的神秘性，人们谈论和分享信息是很自然的。

[16:47] it was only natural that people were talking and sharing information and.
  人们谈论和分享信息是很自然的。

[16:49] talking and sharing information and collaborating if you didn't live near.
  谈论和分享信息并合作，如果你不住在。

[16:50] collaborating if you didn't live near one of the cicada locations you almost.
  合作，如果你不住在蝉的地点之一附近，你几乎。

[16:52] one of the cicada locations you almost had no choice but to ask for help but.
  蝉的地点之一附近，你几乎别无选择，只能寻求帮助，但是。

[16:55] had no choice but to ask for help but cicada 3301 was clearly watching and if.
  别无选择，只能寻求帮助，但是蝉3301显然在观察，如果。

[16:57] cicada 3301 was clearly watching and if you got caught teaming up you'd be out.
  蝉3301显然在观察，如果你被抓到组队，你就会出局。

[17:00] you got caught teaming up you'd be out and it didn't take long to identify the.
  你被抓到组队，你就会出局，而且很快就确定了。

[17:01] and it didn't take long to identify the text referred to by the last clue it was.
  而且很快就确定了最后一个线索所指的文本，它是。

[17:04] text referred to by the last clue it was the poem Agrippa by cyberpunk novelist.
  最后一个线索所指的文本，它是赛博朋克小说家。

[17:06] the poem Agrippa by cyberpunk novelist William Gibson Agrippa is a very cicada.
  威廉·吉布森的诗《阿格里帕》，《阿格里帕》是一首非常蝉的诗。

[17:09] William Gibson Agrippa is a very cicada type of poem it was originally.
  威廉·吉布森的诗《阿格里帕》是一首非常蝉的诗，它最初是。

[17:11] type of poem it was originally distributed on floppy disc and after you.
  一种诗，最初分布在软盘上，在你之后。

[17:14] distributed on floppy disc and after you read the poem it encrypted itself meant.
  分布在软盘上，在你读完诗后，它就自我加密了，意思是。

[17:16] read the poem it encrypted itself meant to be read only once in F solving the.
  读完诗，它就自我加密了，意思是只读一次，在F解决。

[17:19] to be read only once in F solving the book code resulted in another URL but
  只读一次，在F解决书号导致了另一个URL，但是

[17:22] book code resulted in another URL but this one was different a DOT onion.
  书籍代码生成了另一个URL，但这个URL不同，是.onion。

[17:24] this one was different a DOT onion extension onion routing makes the data's source and destination untraceable by encrypting the data multiple times like the layers of an onion.
  这个不同，是.onion扩展名，洋葱路由通过多次加密数据，像洋葱的层一样，使数据的来源和目的地无法追踪。

[17:33] onion Pages aren't accessible with a regular web browser you need a specialized browser designed specifically to access Pages hosted on the onion router Network or tour Network in other words the dark web.
  洋葱页面无法用普通浏览器访问，你需要一个专门设计的浏览器来访问托管在洋葱路由网络或Tor网络上的页面，换句话说，就是暗网。

[17:44] tour Network in other words the dark [Music] web.
  Tor网络，换句话说，就是暗网。

[17:48] when most people think of the dark web they imagine a Place full of illegal activities a place where people can buy and sell drugs weapons and worse and it's true those things exist on the dark web but that's only a small fraction of what's there.
  当大多数人想到暗网时，他们会想象一个充满非法活动的地方，一个人们可以买卖毒品、武器甚至更糟的东西的地方，而且确实，这些东西存在于暗网，但这只是其中一小部分。

[18:02] the dark web is actually a part of the Deep Web which is all the unindexed parts of the internet including private databases email accounts and subscription services.
  暗网实际上是深网的一部分，深网是互联网所有未被索引的部分，包括私人数据库、电子邮件账户和订阅服务。

[18:12] in fact most of the data on the internet exists on the Deep Web the dark web is specifically the section of the Deep Web accessible only through specialized tools like the tour browser which makes.
  事实上，互联网上的大部分数据都存在于深网，暗网是深网中专门通过Tor浏览器等专用工具才能访问的部分，这使得。

[18:23] tools like the tour browser which makes web traffic anonymous.
  像Tor浏览器这样的工具，它能让网络流量匿名。

[18:25] Before it was made public, tour was used by the US Navy to secure government communication.
  在Tor公开之前，美国海军曾使用它来保护政府通信。

[18:29] Later it became a beacon for privacy advocates and anyone looking to shield their online activity from prying eyes.
  后来，它成为了隐私倡导者以及任何希望保护其在线活动免受窥探的人们的灯塔。

[18:36] Not just criminals though, journalists use the dark web to communicate with activists in oppressive countries.
  不仅仅是罪犯，记者也使用暗网与压迫性国家的活动家进行沟通。

[18:42] Whistleblowers have used the dark web to remain anonymous.
  举报人曾使用暗网来保持匿名。

[18:46] If you want to remain anonymous and untraceable, you go to the dark web.
  如果你想保持匿名且无法追踪，你就去暗网。

[18:50] It's only natural that a group like Cicada 3301 would end up there.
  像Cicada 3301这样的组织最终出现在那里是很自然的。

[18:53] So Cicada solvers who made it this far typed the onion link into their tour browser and were greeted with the following message:
  因此，那些坚持到这里的Cicada解谜者将洋葱链接输入到他们的Tor浏览器中，并收到了以下消息：

[19:01] Congratulations! Please create a new email address with a public, free, web-based service you've never used before and enter it below.
  恭喜！请使用一个你从未用过的公共、免费、基于网络的电子邮件服务创建一个新的电子邮件地址，并在此下方输入。

[19:10] We recommend you do this while still using Tor for anonymity.
  我们建议你在使用Tor保持匿名性的同时进行此操作。

[19:14] We will email you a number within the next few days in the order in which you arrived at this page.
  我们将在接下来的几天内，按照你访问此页面的顺序，通过电子邮件向你发送一个号码。

[19:19] Once you've received it, come back to this page and append a slash and then the number you received to this URL.
  收到号码后，请返回此页面，并在该URL后添加一个斜杠，然后加上你收到的号码。

[19:26] the number you receive to this URL 3301 congratulations this would be the
  您收到的数字到此URL 3301恭喜，这将是

[19:28] 3301 congratulations this would be the first time time that cicada would
  3301恭喜，这将是蝉第一次直接与人沟通

[19:29] first time time that cicada would communicate directly with people very
  第一次，蝉将直接与人沟通，很少有人能成功

[19:31] communicate directly with people very few made the cut but those that did
  但那些成功的人几天后收到了一封电子邮件

[19:33] few made the cut but those that did received an email a few days later this
  这个消息只会显示一次

[19:36] received an email a few days later this message will only be displayed once here
  这里有一个用RSA加密的消息

[19:39] message will only be displayed once here is a message that has been encrypted
  加密的消息是一个数字

[19:41] is a message that has been encrypted with RSA the encrypted message is a
  破解解密密钥，然后回到同一个URL并输入解密后的消息以继续

[19:43] with RSA the encrypted message is a number break the decryption key then
  到目前为止的每个人都收到了一个用唯一密钥加密的唯一消息

[19:46] number break the decryption key then come back to the same URL and enter the
  您不得合作，分享您的消息或密钥将导致您收不到下一步，祝您好运

[19:49] come back to the same URL and enter the decrypted message to continue each
  祝您好运 3301 祝您好运，因为每个参与者都被分配了一个唯一的数字，蝉 3301 能够追踪谁在分享信息

[19:51] decrypted message to continue each person who has come this far has
  如果您被抓到，您将被淘汰

[19:53] person who has come this far has received a unique message encrypted with
  您好，您已经在线分享了您的信息，您现在已被完全移除

[19:55] received a unique message encrypted with a unique key you are not to collaborate
  即使您破解了您收到的密钥，也无关紧要，因为您已经证明了

[19:59] a unique key you are not to collaborate sharing your message or key will result
  您好，您已经在线分享了您的信息，您现在已被完全移除

[20:01] sharing your message or key will result in not receiving the next step good luck
  即使您破解了您收到的密钥，也无关紧要，因为您已经证明了

[20:04] in not receiving the next step good luck luck 3301 luck since each participant
  您好，您已经在线分享了您的信息，您现在已被完全移除

[20:08] luck 3301 luck since each participant was assigned a unique number cicada 3301
  即使您破解了您收到的密钥，也无关紧要，因为您已经证明了

[20:11] was assigned a unique number cicada 3301 was able to track who was sharing
  您好，您已经在线分享了您的信息，您现在已被完全移除

[20:12] was able to track who was sharing information if you got caught you're
  即使您破解了您收到的密钥，也无关紧要，因为您已经证明了

[20:15] information if you got caught you're out hello hello you have shared your
  您好，您已经在线分享了您的信息，您现在已被完全移除

[20:18] out hello hello you have shared your information online you are now removed
  即使您破解了您收到的密钥，也无关紧要，因为您已经证明了

[20:21] information online you are now removed from this altogether even if you crack
  您好，您已经在线分享了您的信息，您现在已被完全移除

[20:23] from this altogether even if you crack the key you've been given it doesn't
  即使您破解了您收到的密钥，也无关紧要，因为您已经证明了

[20:25] the key you've been given it doesn't matter because you have demonstrated
  您好，您已经在线分享了您的信息，您现在已被完全移除

[20:27] matter because you have demonstrated that you can't be trusted to follow

[20:29] that you can't be trusted to follow simple instructions anyway goodbye thank

[20:31] simple instructions anyway goodbye thank you for your participation to this point

[20:33] you for your participation to this point goodbye goodbye

[20:36] goodbye goodbye 3301 but those who were able to solve

[20:38] 3301 but those who were able to solve the puzzle and solve it alone received

[20:40] the puzzle and solve it alone received an email the email contained the

[20:42] an email the email contained the following text along with a piece of

[20:45] following text along with a piece of music this song is your own path another

[20:48] music this song is your own path another stop on the road toward Enlightenment

[20:50] stop on the road toward Enlightenment follow it and share not

[21:02] [Music]

[21:13] [Music] oh that was terrible but still better

[21:15] oh that was terrible but still better than

[21:16] than K-pop CH

[21:20] K-pop CH chce chilling like

[21:22] chce chilling like a the music was encoded as a midi file

[21:26] a the music was encoded as a midi file midi is music expressed as code

[21:29] midi is music expressed as code it was found that there were two tracks

[21:30] it was found that there were two tracks that provided two different messages

[21:32] that provided two different messages each message had fewer than 26

[21:34] each message had fewer than 26 combinations of pitch and tone which

[21:36] combinations of pitch and tone which hinted that each combination could

[21:38] hinted that each combination could represent one letter the music was

[21:40] represent one letter the music was decoded into a cryptogram which could

[21:42] decoded into a cryptogram which could then be

[21:43] then be broken very good very good you have

[21:46] broken very good very good you have proven to be most dedicated to come this

[21:48] proven to be most dedicated to come this far to attain Enlightenment create a gpg

[21:51] far to attain Enlightenment create a gpg key for your email address and upload it

[21:53] key for your email address and upload it to the MIT key servers then encrypt the

[21:56] to the MIT key servers then encrypt the following word list using the a 331

[22:00] following word list using the a 331 public key sign it with your key send

[22:02] public key sign it with your key send the aski armored Cipher text to the

[22:05] the aski armored Cipher text to the Gmail address from which you received

[22:07] Gmail address from which you received your numbers everyone who received this

[22:09] your numbers everyone who received this email was also given a set of 50 unique

[22:11] email was also given a set of 50 unique words those words were to be encrypted

[22:14] words those words were to be encrypted and emailed back what happened after

[22:16] and emailed back what happened after that is unknown but about a month later

[22:18] that is unknown but about a month later the image on the subreddit

[22:21] the image on the subreddit changed hello hello we have now found

[22:24] changed hello hello we have now found the individuals we sought thus our

[22:27] the individuals we sought thus our month-long Journey ends for now thank

[22:31] month-long Journey ends for now thank you for your dedication and effort if

[22:33] you for your dedication and effort if you were unable to complete the test or

[22:35] you were unable to complete the test or did not receive an email do not despair

[22:39] did not receive an email do not despair there will be more opportunities like

[22:41] there will be more opportunities like this one hello thank you all now

[22:43] this one hello thank you all now 3301 and just as cryptically as the

[22:46] 3301 and just as cryptically as the cicada puzzle started it finally ended

[22:49] cicada puzzle started it finally ended it was assumed that the mysterious group

[22:50] it was assumed that the mysterious group whoever they were finally found the

[22:52] whoever they were finally found the highly intelligent individuals it needed

[22:55] highly intelligent individuals it needed cicada 3301 stopped posting messages and

[22:57] cicada 3301 stopped posting messages and was largely forgot en but a year and a

[23:00] was largely forgot en but a year and a day after the first puzzle was posted

[23:02] day after the first puzzle was posted cicada 3301 was

[23:09] back cicada was quiet for a year but on

[23:13] back cicada was quiet for a year but on January 5th a new image was posted to

[23:16] January 5th a new image was posted to forchan hello again our search for

[23:19] forchan hello again our search for intelligent individuals now continues

[23:21] intelligent individuals now continues hello again the first clue is hidden

[23:23] hello again the first clue is hidden within this image find it and it will

[23:26] within this image find it and it will lead you on the road to finding us we

[23:28] lead you on the road to finding us we look forward to meeting the few that

[23:30] look forward to meeting the few that will make it all the way through good

[23:32] will make it all the way through good luck luck

[23:34] luck luck 3301 like before running the image

[23:36] 3301 like before running the image throughout guest led to a book code

[23:38] throughout guest led to a book code which led to a URL which led to a file a

[23:41] which led to a URL which led to a file a large

[23:42] large file this file was its own mini

[23:45] file this file was its own mini operating

[23:49] system when you booted it up it

[23:51] system when you booted it up it displayed the prime numbers up to 3301

[23:54] displayed the prime numbers up to 3301 and then restarted the computer it would

[23:55] and then restarted the computer it would do this indefinitely but there was also

[23:58] do this indefinitely but there was also a message within the numbers the key is

[24:00] a message within the numbers the key is all around you good luck

[24:04] all around you good luck 3301 those numbers led to a Twitter

[24:06] 3301 those numbers led to a Twitter account that was posting tons of

[24:08] account that was posting tons of encrypted text that nobody could

[24:11] encrypted text that nobody could decode but on the mini operating system

[24:13] decode but on the mini operating system someone realized that you could break

[24:15] someone realized that you could break the boot sequence and browse the file

[24:17] the boot sequence and browse the file system in one of the folders there was a

[24:19] system in one of the folders there was a song This Time an MP3 file

[24:29] according to the ID tags the title of

[24:31] according to the ID tags the title of the file was the instar emergence

[24:34] the file was the instar emergence solvers tried all sorts of techniques on

[24:36] solvers tried all sorts of techniques on this file to search for hidden meanings

[24:38] this file to search for hidden meanings they played it backwards they isolated

[24:40] they played it backwards they isolated frequencies they even ran the sound

[24:42] frequencies they even ran the sound through spectral analyzers but they

[24:44] through spectral analyzers but they found nothing there were hidden messages

[24:47] found nothing there were hidden messages and odd mini poems all over the place

[24:49] and odd mini poems all over the place but nothing seemed connected then

[24:51] but nothing seemed connected then someone determined that the messages

[24:53] someone determined that the messages from the Twitter feed were actually

[24:55] from the Twitter feed were actually lines of binary code which could be

[24:57] lines of binary code which could be assembled into a file but it was

[24:59] assembled into a file but it was encrypted and nobody could figure out

[25:01] encrypted and nobody could figure out how to decode it it turned out that the

[25:04] how to decode it it turned out that the messages were encoded with the binary

[25:06] messages were encoded with the binary data from another file as the key that

[25:09] data from another file as the key that file was the

[25:15] [Music]

[25:17] [Music] song So using the song the Twitter data

[25:20] song So using the song the Twitter data was decrypted into an

[25:22] was decrypted into an image a rune table the Run table image

[25:26] image a rune table the Run table image also contained secret text which led to

[25:28] also contained secret text which led to more puzzles which led to the dark web

[25:30] more puzzles which led to the dark web and to more posters around the world

[25:32] and to more posters around the world with different coordinates in order to

[25:34] with different coordinates in order to move forward from here you need to have

[25:36] move forward from here you need to have solved every puzzle so far now on the

[25:38] solved every puzzle so far now on the posters there were phone numbers and

[25:40] posters there were phone numbers and each phone number required an access

[25:42] each phone number required an access code that You' decipher using the room

[25:44] code that You' decipher using the room table once you got past the access code

[25:47] table once you got past the access code a computerized voice then read you a

[25:48] a computerized voice then read you a string of letters and numbers which

[25:50] string of letters and numbers which turned out to be a hex code and then the

[25:53] turned out to be a hex code and then the hex code converted to a page on the dark

[25:55] hex code converted to a page on the dark web which had a test for you to take

[25:59] web which had a test for you to take there were 19 questions in total some

[26:01] there were 19 questions in total some mathematical some logical some

[26:03] mathematical some logical some philosophical very few people made it

[26:05] philosophical very few people made it past this test but those that did

[26:08] past this test but those that did received an email

[26:10] received an email congratulations your testing has finally

[26:12] congratulations your testing has finally come to an end congratulations we hope

[26:14] come to an end congratulations we hope you have enjoyed the vacation over the

[26:16] you have enjoyed the vacation over the last few weeks you will be very busy now

[26:19] last few weeks you will be very busy now should you choose to join us you have

[26:21] should you choose to join us you have all wondered who we are and so we shall

[26:23] all wondered who we are and so we shall now tell you we are an international

[26:25] now tell you we are an international groupal group we have no name have no

[26:27] groupal group we have no name have no name are drawn together by Common

[26:29] name are drawn together by Common beliefs that tyranny and oppression of

[26:32] beliefs that tyranny and oppression of any kind must end that censorship is

[26:35] any kind must end that censorship is wrong and that privacy is an inalienable

[26:38] wrong and that privacy is an inalienable right cicada 3301 was pretty well known

[26:41] right cicada 3301 was pretty well known by now and was being connected to hacker

[26:43] by now and was being connected to hacker groups and this was addressed in that

[26:45] groups and this was addressed in that email we do not engage in illegal

[26:48] email we do not engage in illegal activity nor do our members if you are

[26:51] activity nor do our members if you are engaged in illegal activity we ask that

[26:54] engaged in illegal activity we ask that you cease any and all illegal activities

[26:57] you cease any and all illegal activities or decline membership at this time we

[27:00] or decline membership at this time we will not ask questions if you decline

[27:02] will not ask questions if you decline however if you lie to us we will find

[27:05] however if you lie to us we will find out but the big question was why what

[27:08] out but the big question was why what does cicada 3301 even do we are much

[27:11] does cicada 3301 even do we are much like a think tank in that our primary

[27:14] like a think tank in that our primary focus is on researching and developing

[27:16] focus is on researching and developing techniques to Aid the ideas we Advocate

[27:20] techniques to Aid the ideas we Advocate Liberty privacy

[27:22] Liberty privacy security and if you choose to accept

[27:24] security and if you choose to accept membership we are happy to have you on

[27:26] membership we are happy to have you on board to help with future projects

[27:29] board to help with future projects security so that was it cicada 3301

[27:32] security so that was it cicada 3301 found a few more recruits and went dark

[27:34] found a few more recruits and went dark but the following January people eagerly

[27:36] but the following January people eagerly waited to see if cicada would return and

[27:39] waited to see if cicada would return and they did not

[27:40] they did not [Music]

[27:46] [Music] disappoint after being inactive for a

[27:49] disappoint after being inactive for a year in January 2014 the cic Twitter

[27:52] year in January 2014 the cic Twitter account tweeted a link to a new

[27:54] account tweeted a link to a new [Music]

[27:55] [Music] image hello hello ephany is upon you

[27:59] image hello hello ephany is upon you good luck your pilgrimage has begun good

[28:01] good luck your pilgrimage has begun good luck Enlightenment awaits hello good

[28:03] luck Enlightenment awaits hello good luck

[28:05] luck 3301 during the time cicada was quiet

[28:08] 3301 during the time cicada was quiet there were lots of fake puzzles floating

[28:10] there were lots of fake puzzles floating around claiming to be from cicada 3301

[28:13] around claiming to be from cicada 3301 and they all turned out to be fakes but

[28:15] and they all turned out to be fakes but running this new image throughout guests

[28:17] running this new image throughout guests revealed a new message that proved to be

[28:19] revealed a new message that proved to be authentic cicada 3301 was back and they

[28:22] authentic cicada 3301 was back and they followed their familiar format they

[28:24] followed their familiar format they embedded messages and images that could

[28:25] embedded messages and images that could be extracted without guests these images

[28:28] be extracted without guests these images led to more clues on various web pages

[28:30] led to more clues on various web pages and the dark web and a new piece of

[28:32] and the dark web and a new piece of music was also discovered this one was

[28:34] music was also discovered this one was called

[28:36] called [Music]

[28:50] [Music] interconnectedness using some familiar

[28:52] interconnectedness using some familiar techniques as well as some new ones

[28:54] techniques as well as some new ones cicada solvers concluded that cicada was

[28:57] cicada solvers concluded that cicada was focusing on on a single

[29:00] focusing on on a single document it's called the Liber premise

[29:02] document it's called the Liber premise or first book as more puzzles were

[29:04] or first book as more puzzles were solved more pages of Libra primis were

[29:07] solved more pages of Libra primis were uncovered the book was written using the

[29:09] uncovered the book was written using the runes found in earlier puzzles but the

[29:11] runes found in earlier puzzles but the solution to every puzzle seemed to be a

[29:13] solution to every puzzle seemed to be a clue to yet another puzzle people went

[29:16] clue to yet another puzzle people went back to the music file they found more

[29:18] back to the music file they found more clues from image files they extracted

[29:20] clues from image files they extracted more codes and more puzzles like magic

[29:22] more codes and more puzzles like magic squares and

[29:24] squares and anagrams all of those were decoded to

[29:26] anagrams all of those were decoded to reveal strange poems which were nothing

[29:28] reveal strange poems which were nothing more than more clues Libra primis is 59

[29:31] more than more clues Libra primis is 59 pages and only a handful have been

[29:33] pages and only a handful have been solved and the pages that are solved are

[29:35] solved and the pages that are solved are still mysterious January 2015 came and

[29:38] still mysterious January 2015 came and went with nothing from cicada some

[29:40] went with nothing from cicada some people speculated that cicada had enough

[29:42] people speculated that cicada had enough recruits for whatever it was they were

[29:44] recruits for whatever it was they were doing others thought that cicada would

[29:46] doing others thought that cicada would stay silent until all of Libra primis

[29:49] stay silent until all of Libra primis was solved and they could be right in

[29:51] was solved and they could be right in January 2016 cicada tweeted a link to a

[29:54] January 2016 cicada tweeted a link to a new image running the image throughout

[29:56] new image running the image throughout guest proved it was auth authentic hello

[29:59] guest proved it was auth authentic hello hello the path lies empty Epiphany seeks

[30:02] hello the path lies empty Epiphany seeks the devoted Libra pris is the way it's

[30:06] the devoted Libra pris is the way it's words are the map their meaning is the

[30:07] words are the map their meaning is the road and their numbers are the direction

[30:10] road and their numbers are the direction the devoted seek and you will be found

[30:12] the devoted seek and you will be found you will be found good luck you will be

[30:14] you will be found good luck you will be 3301 beware false paths many speculated

[30:18] 3301 beware false paths many speculated that their numbers are the direction was

[30:20] that their numbers are the direction was the major clue but still no progress was

[30:23] the major clue but still no progress was made in 2017 a user stumbled across a

[30:26] made in 2017 a user stumbled across a message from cicada in Google's C pages

[30:28] message from cicada in Google's C pages that nobody had noticed beware false

[30:31] that nobody had noticed beware false paths always verify pgp signature

[30:36] paths always verify pgp signature 3301 and that was the last anyone heard

[30:38] 3301 and that was the last anyone heard from cicada 3301 it's been a few years

[30:42] from cicada 3301 it's been a few years with no solution to Libra primis and no

[30:44] with no solution to Libra primis and no further contact from cicada this was

[30:46] further contact from cicada this was disappointing to a lot of people after

[30:49] disappointing to a lot of people after all this over several years we were

[30:51] all this over several years we were still no closer to finding out who

[30:53] still no closer to finding out who cicada 3301 was or what they did but

[30:56] cicada 3301 was or what they did but Liber primis was the thir Quest the

[30:59] Liber primis was the thir Quest the first two were solved and the people who

[31:01] first two were solved and the people who solved them they started

[31:03] solved them they started [Music]

[31:07] talking when that first image appeared

[31:09] talking when that first image appeared on 4chan looking for highly intelligent

[31:12] on 4chan looking for highly intelligent individuals the chase was on the

[31:14] individuals the chase was on the mysterious group known as 3301 presented

[31:17] mysterious group known as 3301 presented Clues and challenges that thousands of

[31:19] Clues and challenges that thousands of techies and puzzle solvers found

[31:21] techies and puzzle solvers found impossible to resist each Mystery became

[31:24] impossible to resist each Mystery became more complex the clues that connected

[31:26] more complex the clues that connected Julius Caesar and King Arthur to

[31:28] Julius Caesar and King Arthur to cryptography were genius and easy enough

[31:30] cryptography were genius and easy enough to solve that people became hooked the

[31:32] to solve that people became hooked the solutions that led to phone numbers and

[31:34] solutions that led to phone numbers and Geographic coordinates made the search

[31:36] Geographic coordinates made the search even more real but over time it became

[31:39] even more real but over time it became clear that 3301 was looking for a

[31:41] clear that 3301 was looking for a specific type of person to solve cicada

[31:43] specific type of person to solve cicada you needed knowledge of the concepts and

[31:45] you needed knowledge of the concepts and the tools used in encryption you had to

[31:47] the tools used in encryption you had to have computer skills understand

[31:49] have computer skills understand operating systems and be handy with

[31:51] operating systems and be handy with programming it also didn't hurt if you

[31:53] programming it also didn't hurt if you had expertise in mind numerology and

[31:55] had expertise in mind numerology and pre-christian literature yeah who

[31:56] pre-christian literature yeah who doesn't but who was cicada a popular

[32:00] doesn't but who was cicada a popular theory was that this was a recruiting

[32:02] theory was that this was a recruiting effort for a government intelligence

[32:03] effort for a government intelligence agency like CIA NSA or MI6 there was

[32:07] agency like CIA NSA or MI6 there was plenty of precedent for that during the

[32:09] plenty of precedent for that during the second world war the top secret

[32:11] second world war the top secret government code and Cipher School used

[32:13] government code and Cipher School used crossword puzzles printed in the Daily

[32:15] crossword puzzles printed in the Daily Telegraph to identify good candidates

[32:17] Telegraph to identify good candidates for Bletchley Park those recruits along

[32:19] for Bletchley Park those recruits along with Alan touring went on to solve the

[32:21] with Alan touring went on to solve the Enigma machine which helped the Allies

[32:23] Enigma machine which helped the Allies win the war NSA and CIA ran similar

[32:26] win the war NSA and CIA ran similar contests over the years companies like

[32:28] contests over the years companies like Google and Microsoft have also used

[32:30] Google and Microsoft have also used cryptography and puzzles to recruit but

[32:33] cryptography and puzzles to recruit but one of the early winners said cicada was

[32:35] one of the early winners said cicada was none of these after solving the final

[32:38] none of these after solving the final round of puzzles in 2013 he received an

[32:40] round of puzzles in 2013 he received an email with a username and password along

[32:43] email with a username and password along with a site address on the dark web the

[32:45] with a site address on the dark web the site had two parts a message board and a

[32:48] site had two parts a message board and a chat room The Message Board had various

[32:50] chat room The Message Board had various topics including a welcome section and

[32:52] topics including a welcome section and an area for cicada's goals and current

[32:54] an area for cicada's goals and current projects the chat room had about 20

[32:57] projects the chat room had about 20 members according to a couple of the

[32:59] members according to a couple of the winners cicada wanted to further the use

[33:01] winners cicada wanted to further the use of cryptography so more people would

[33:03] of cryptography so more people would have access to Internet privacy cicada

[33:06] have access to Internet privacy cicada had some big goals but in the short term

[33:08] had some big goals but in the short term they wanted to recruit highly technical

[33:10] they wanted to recruit highly technical people to develop open- Source

[33:12] people to develop open- Source cryptography software oh that to find

[33:14] cryptography software oh that to find people to write free software yep and I

[33:16] people to write free software yep and I think this was cicada's big mistake the

[33:18] think this was cicada's big mistake the recruits didn't want to write software

[33:20] recruits didn't want to write software they wanted to solve puzzles and when

[33:22] they wanted to solve puzzles and when the puzzle stopped the membership

[33:24] the puzzle stopped the membership dwindled there were spikes in membership

[33:26] dwindled there were spikes in membership when new challenges appeared but it was

[33:28] when new challenges appeared but it was the same story the winners weren't

[33:29] the same story the winners weren't interested in writing software they

[33:31] interested in writing software they weren't driven by ideology they didn't

[33:33] weren't driven by ideology they didn't care about politics they just wanted to

[33:35] care about politics they just wanted to solve puzzles the same thing happens

[33:37] solve puzzles the same thing happens when NSA CIA gchq and other intelligence

[33:41] when NSA CIA gchq and other intelligence organizations do recruitment drives many

[33:44] organizations do recruitment drives many of the winners are offered positions in

[33:45] of the winners are offered positions in one of these agencies and many of them

[33:47] one of these agencies and many of them refuse they don't want to work in

[33:49] refuse they don't want to work in government yeah they're too smart to

[33:50] government yeah they're too smart to work in government well that might be

[33:52] work in government well that might be part of it but really they just want to

[33:54] part of it but really they just want to solve puzzles whenever you achieve a

[33:56] solve puzzles whenever you achieve a task your bra rewards you with a hit of

[33:59] task your bra rewards you with a hit of dopamin this could mean finishing a

[34:01] dopamin this could mean finishing a workout completing a school project or

[34:03] workout completing a school project or figuring out an escape room achieve a

[34:05] figuring out an escape room achieve a goal get some dopamin our brains love

[34:08] goal get some dopamin our brains love dopamin it turns out that solving

[34:10] dopamin it turns out that solving problems is one of the biggest if not

[34:12] problems is one of the biggest if not the biggest source of dopamin for the

[34:14] the biggest source of dopamin for the brain solving puzzles like those

[34:16] brain solving puzzles like those presented by cicada reward us with

[34:18] presented by cicada reward us with dopamine while we're working on them and

[34:20] dopamine while we're working on them and when we actually solve one well cicada

[34:22] when we actually solve one well cicada solvers describe that feeling as nothing

[34:24] solvers describe that feeling as nothing less than exhilarating now plenty of

[34:26] less than exhilarating now plenty of people are interested in politics and

[34:28] people are interested in politics and ideology but not too many of them would

[34:30] ideology but not too many of them would describe their interest as exhilarating

[34:33] describe their interest as exhilarating puzzles make us happy when was the last

[34:35] puzzles make us happy when was the last time politics made you happy and

[34:37] time politics made you happy and although two of the goals of this

[34:38] although two of the goals of this channel are to educate and Inspire the

[34:40] channel are to educate and Inspire the primary goal is to entertain in other

[34:43] primary goal is to entertain in other words the why files is here to make you

[34:45] words the why files is here to make you happy so that's why I've included a cic

[34:48] happy so that's why I've included a cic type puzzle in this video think you can

[34:50] type puzzle in this video think you can find

[34:55] it thank you so much for hanging out

[34:57] it thank you so much for hanging out with us today my name is AJ that's echle

[34:59] with us today my name is AJ that's echle fish cus mirosa nka that's the May word

[35:02] fish cus mirosa nka that's the May word for hey how you doing this has been the

[35:04] for hey how you doing this has been the wi files if you had fun or learned

[35:06] wi files if you had fun or learned anything do us a favor like comment

[35:08] anything do us a favor like comment subscribe share that stuff really helps

[35:10] subscribe share that stuff really helps the channel and like most topics we

[35:11] the channel and like most topics we cover here today was recommended by you

[35:14] cover here today was recommended by you so if there's a story you'd like to see

[35:15] so if there's a story you'd like to see or learn more about go to the Wi

[35:17] or learn more about go to the Wi files.com tips and if you need more

[35:19] files.com tips and if you need more yfiles in your life check out the yfiles

[35:21] yfiles in your life check out the yfiles Discord it's free to join and there's

[35:23] Discord it's free to join and there's thousands of people on there and special

[35:25] thousands of people on there and special thanks to our patrons who made this

[35:26] thanks to our patrons who made this episode possible I couldn't do any of

[35:28] episode possible I couldn't do any of this without you so from the bottom of

[35:30] this without you so from the bottom of my heart thank you now if you'd like to

[35:31] my heart thank you now if you'd like to support the channel consider becoming a

[35:33] support the channel consider becoming a member on patreon it's only three bucks

[35:35] member on patreon it's only three bucks a month you get all kinds of perks like

[35:36] a month you get all kinds of perks like early access to the videos with no

[35:38] early access to the videos with no commercials and you get your name in the

[35:40] commercials and you get your name in the credits check those out if you're not

[35:42] credits check those out if you're not much of a joiner maybe buy something

[35:44] much of a joiner maybe buy something from the wi file store yeah grab a

[35:45] from the wi file store yeah grab a Heckle fish t-shirt or coffee mug or one

[35:47] Heckle fish t-shirt or coffee mug or one of these Heckle fish plushy talking doll

[35:50] of these Heckle fish plushy talking doll fish toys that's going to do it until

[35:53] fish toys that's going to do it until next time be safe be kind and know that

[35:55] next time be safe be kind and know that you are appreciated

[35:58] you are appreciated [Music]

[36:04] wow

[36:12] [Music]

[36:56] w

[36:59] w [Music]

[37:23] wowow w

[37:29] w [Music]

[38:16] w

[38:22] [Music]

[38:47] w

[38:48] w [Music]

[38:57] [Music] oh

[39:00] oh [Music]
