Escape from Tarkov Wiki
Advertisement

ARRS terminal (Automated Radio Relay Service) is an entity within the Escape from Tarkov universe, it served as the foundation for an ARG which announced the release of the game.

Webpage[]

The ARRS took form of a webpage, emulating a terminal.

ARRS terminal screenshot

Riddles[]

The ARRS webpage hosted a set of riddles which set the stage for the game's announcement.

Riddle: "Beginning"[]

Part 1: "KNOWTHETRUTH9_TMRCD"[]

"Escape From Tarkov" posted this message on VKontakt in 2015:


KNOWTHETRUTH9_TMRCD

CRRNT_STATUS

QRCODE:::UNSOLVED

TIMERCODE:::UNSOLVED

BINARYCODECOMPLEX:::UNSOLVED

##UNKNOWN##:::UNSOLVED

HINTS CONCEALED : 4

HINTS CONCEALED : 2


Step 1: "QRCODE"[]

When you click on "tell me more" button, the following QR Code appear :

QRcode

After scanning it show " vjku ku pqv eyuc" which is a Caesar Code with a shift of 3 :

this is not cswa

"cswa" is actually a reference to "Contract Wars", a game from Absuloft in which some developers of Battlestate Games worked.

Step 2: "TIMERCODE"[]

In 2015 a mysterious site has been discovered. It is : http://www.countdowntoreveal.com/

A light with a countdown can be seen. Also a code can be seen on the page and found in the code source of the page. The code is : "N5TYJJETNWRXJ6KBNAYYFJEGPOSXD4EG" and on 7 October 2015, "Escape From Tarkov" posted this image on Facebook :

12140573 1495753714052277 9074284581178633887 n

The text contain a clue to decipher the code. The clue is "CD_CES25_B32". "CES25" indicate to decrypt the code with a Ceasar Code with a shift of 25

M5SXIIDSMVQWI6JAMZXXEIDFONRWC4DF

Then "B32" indicate to decode the obtained "text" from BASE 32 to Text.

get ready for escape

On 8 October 2015 this image was posted : it represent the following of the previous image.

12132387 1495975610696754 5699401332945404718 o

Three files are clearly attached to the message : an audio and two files of unknown type.

Part 2: "SKNOWTHETRUTH10_THEONLYLIGHT"[]

Step 1: "BINARYCODECOMPLEX"[]

The source code of the page contain a binary code or can be found if you click ten times on the little bulb.


01001011 01001001 01011010 01010100 01000101 01010111 01010011 00110010 01001100 01000010 01001011 01010110 01001111 01010100 01000011 01001010 01001010 01001010 01000010 01000110 01000011 01010101 01000011 01010110 01000111 01011010 01000101 01010101 01010001 01010100 01000011 01000010 01001011 01001010 01000001 01010110 01001011 01010101 00110010 01001110 01001011 01001110 01001001 01000110 01001111 01010111 01010011 01001011 01001011 01010010 01001001 01010101 01001001 01010101 01000011 01001011 01001011 00110101 01001001 01010100 01000111 01010110 00110010 01000100 01001001 01001110 01001010 01000101 00110100 01010110 00110010 01001100 01001010 00110101 01001011 01000101 01000111 01010101 01000011 00110010 01001001 00110101 01001100 01010101 00110110 01001101 01010011 01010101 01001011 01000110 01000010 01010101 01010101 01010110 00110010 01011000 01001011 01000110 01001001 01000101 01010101 01010110 00110010 01000100 01001011 01001010 01001000 01000110 01001111 01010111 01001011 01010000 01001011 01010010 01000011 01010101 01001001 01010111 01010011 01001000 01001011 00110101 01000110 01010100 01000101 01010110 01000011 01010010 01001001 01001110 01001001 01000101 00110010 01010110 00110010 01010010 01000111 01001110 01001011 01000110 01001011 01010001 00110010 01010011 01001010 01011010 01000010 01010110 01001011 01010100 00110010 01010101 01001001 01001110 01000011 01010110 01000101 01010010 00110010 01011000 01001011 01000010 01000110 01000110 01001001 01010101 01001011 01000101 01001011 01000010 01000110 01000110 01001111 01010101 01001010 01010011 01001010 01001010 01001101 01010101 01000111 01010101 01010011 01001011 01001100 01000010 01001011 01010101 00110110 01010110 01000011 01011000 01001001 01010010 01001110 01000101 01001111 01010110 00110010 01010000 01001011 01000010 01001011 01000110 01000011 01010010 01000011 01001001 01001010 01001010 01001100 01010110 01000011 01001101 00110010 01010101 01001011 01001110 01000010 01010110 01000101 01010100 01010011 01000100 01001011 01010110 01001000 01010110 01001001 01010001 01001011 01000101 01001011 01000010 01000100 01010110 01001111 01010111 01010011 01001010 01001010 01001010 01001001 01010101 01001001 01010011 01010011 01010110 01001011 00110101 01001001 01010100 01000111 01010011 01010011 01010010 01001001 01001110 01001010 01000101 01010101 01010110 00110010 01000100 01001001 00110101 01001001 01010001


The Binary Code decryption lead to this BASE 32 Code.

KIZTEWS2LBKVOTCJJJBFCUCVGZEUQTCBKJAVKU2NKNIFOWSKKRIUIUCKK5ITGV2DINJE4V2LJ5KEGUC2I5LU6MSUKFBUUV2XKFIEUV2DKJHFOWKPKRCUIWSHK5FTE VCRINIE2V2RGNKFKQ2SJZBVKT2UINCVER2XKBFFIUKEKBFFOUJSJJMUGU SKLBKU6VCXIRNEOV2PKBKFCRCIJJLVCM2UKNBVETSDKVHVIQKEKBDVOWSJJJIUISSVK5 ITGSSRINJEUV2DI5IQ

An image posted on 8 October 2015 help to decode this binary code .

Caesar book

"(...) with his 32 troops. With a thought in his mind, he took 10 steps, enough to make light shine brighter. Then he looked again at his 32 man(...)" is actually a hint telling that we must use the BASE32 code.


R32ZZXUWLIJBQPU6IHLARAUSMSPWZJTQDPJWQ3WCCRNWKOTCPZGWO2TQCJWWQPJWCRNWYOTEDZGWK2TQCPMWQ3TUCRNCUOTCERGWPJTQDPJWQ2JYCRJXU OTWDZGWOPTQDHJWQ3TSCRNCUOTADPGWZIJQDJUWQ3JQCRJWCGQ Then use a Caesar Code with a shift of 10.

B32JJHEGVSTLAZE6SRVKBKECWCZGJTDANZTGA3GMMBXGUYDMZJQGY2DAMTGG AZTGMBXGIYDONJQGU2DAMZWGA3DEMBXMEYDMOBQGZTDANZTGA2TIMBTHEYDGNJQGYZD

ANRTGA3DCMBXMEYDKNZQGJSTANTEGA3TAMBTGMQA

The first three characters "B32" indicate that it is a the other part is BASE32 code.


JNCVSX2OJ5PTAXY2f07306f07506e06402f03307207505403606207a06806f07305403903506206306107a05702e06d070033

The first part is in BASE32.

JNCVSX2OJ5PTAXY→KEY_NO_0_

This is a clue that indicate to remove all the three characters a zero from the second part of the previous code.

2f07306f07506e06402f03307207505403606207a06806f07305403903506206306107a05702e06d070033

This is ASCII characters coded in hexadecimal.

/sound/3ruT6bzhosT95bcazW.mp3

This link to the site containing a MP3 file. http://countdowntoreveal.com/sound/3ruT6bzhosT95bcazW.mp3

We can hear someone talking in Russian and it also contain two Morse code : Tarkov and Emercom.

Part 3: "KNOWTHETRUTH11_LURKINGINTHEDARK"[]

Step 1: "LOOK IN THE DARK"[]

On 9 October this image was uploaded on the Facebook Page of "Escape From Tarkov".

Look in the dark

We can read " Look in the dark " on it.

On 10 October 2015 this Image was uploaded on Facebook with the inscription : "MRC_HINT UPLOADED".

Wikipedia page in russian of alpha channel

This image is actually an image of the Wikipedia page of alpha bending. Alpha bending is linked to the transparency of an image and this is a hint for the next image.

When the transparency of the previous image is augmented we can see the inscription "S__R". It can be filled with a "P" and "Q" to obtain "SPQR" the initialism of the phrase linked to the ancient Roman Republic.

This is a link to the site : http://www.countdowntoreveal.com/spqr/

We can read the following text.

...There is YzM4 eyes out there, 38 to be ZXJyb, who 3JfbG make an error 9nLn in a while, i R4dA== judge them...

It contains a BASE64 code :

Decryption
BASE64 Text
YzM4ZXJyb3JfbG9nLnR4dA== c38error_log.txt

It lead to this "log" on this site : http://www.countdowntoreveal.com/cam38/c38error_log.txt

Cam 38 Log[]

################################################

12:42:13:00,003 From server Observer14-4

12:42:14:00,033 ERROR @#0: Ins#$@icient system res@#$rces exist to complete the requested service.

12:42:35:00,203 ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

12:42:56:00,003 Operating sys##m err## 1450 In@#$$ficient system reso@@#ces exist $$ complete the r%^@@#uested se#v##e.

12:43:34:00,030 #

12:43:35:00,003 #####*#*#*@#

12:43:20:27,000 Error Code 9$%%#@0###*#*#*@#

12:43:45:00,033 cam##:Remote system node14%#%#%##. The s##* # in an in##id state %#%#%## for #e*@*ed action

12:43:46:00,233 L2NhbTM4L25vZGVfMTQtNF9rb3JkLnBhcnQxLnJhcg==

12:43:47:00,133 /@###*#/corrupt2.rar

12:43:48:00,233 I0AjIyNAQCMqQCMjIyojKiMqQCMjIyMqIyojKkAj

12:43:56:00,015 #@###@@#*@###*#*#*@####*#*#*@#

12:43:58:00,343 Write o# "device" failed, status = %%$50

12:43:59:10,033 ERROR 1130: Not enough server sto#age is av4$@able to ##cess this command.

12:44:11:00,205 E##OR 1130 / hex 0x46a ERROR_NOT_ENOUGH_SERVER_MEMORY

12:44:13:00,053 Back## or restore op##ation termi###ting a####ly.

12:44:16:02,233 Back## or###*#*#*@# op##ati###*#*#*@#mi###ting a####ly.

12:44:35:00,303 ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

12:44:56:00,053 Operating sys##m err## 1450 In@#$$ficient system reso@@#ces exist $$ complete the r%^@@#uested se#v##e.

12:47:38:00,073 Operating sys##m err## 1450 In@#$$ficient sys################################################

################################################


Three part are important : "L2NhbTM4L25vZGVfMTQtNF9rb3JkLnBhcnQxLnJhcg==", "I0AjIyNAQCMqQCMjIyojKiMqQCMjIyMqIyojKkAj" and "/@###*#/corrupt2.rar" The first and the second one are BASE64 codes.

BASE64 Text
L2NhbTM4L25vZGVfMTQtNF9rb3JkLnBhcnQxLnJhcg== /cam38/node_14-4_kord.part1.rar
I0AjIyNAQCMqQCMjIyojKiMqQCMjIyMqIyojKkAj #@###@@#*@###*#*#*@####*#*#*@#

The first part is linked to this RAR file http://www.countdowntoreveal.com//cam38/node_14-4_kord.part1.rar

The third part is linked to this RAR file http://www.countdowntoreveal.com/cam38/corrupt2.rar

Cam 83 Log[]

By analogy to the first "log" another one can be found with an inversion of the 8 and the 3. http://www.countdowntoreveal.com/cam83/c83error_log.txt


################################################

09:17:12:00,133 ###*#*#*@# fai&*###*#*#*@# fai&*

09:17:13:02,045 g a#sted service.

09:17:14:50,553 ting s#### 1450 In@#$$ficient sys##########

09:17:16:12,423 o# "@###@@#*@###*#*#*@####*#*#*@#50

09:17:17:00,045 RVJST1JfQUNDRVNTX0RFTklFRCA1ICgweDUp

09:17:18:03,453 RVJST1JfRklMRV9OT1RfRU5DUllQVEVEIDYwMDcgKDB4MTc3Nykg

09:17:23:10,023 #####*#*#*@# fai&*@

09:17:25:00,885 ERROR_FILE_NOT_FOUND 2 (0x2)

09:17:26:06,053 k## or restore op##ation termi###tin

09:17:27:10,603 RRnough server sto#age is av4$@able to

09:17:29:00,035 ERROR @$$50: / hex #SYSTEM_RESOURCES

09:17:35:03,553 RVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUg==

09:17:36:55,023 ERROR_PATH_NOT_FOUND 3 (0x3)

09:17:38:04,275 ##UNDEFIENED##

09:17:45:00,053 Key value 128 ##UNDEFIENED##

09:17:47:33,323 U2FsdGVkX18z6MR5KMT9DfGS3bP/YMBPnLkbfGNxPZgMR1817s89jBvWPb1WgRa6pP4ZJYNKTAw92hCrEzHVa3LtCK/Xt4yQIFogTBFSzcZ1aOP24BOFkJmaTYmlrHi9QWdESfji5ITIgt9JD8fmX6og9Wl8XZ29rhAIeImVPfShsLEVTswtE1vEM+IiX/xr9UvUql50r0RaN0abjbGQsQ==

09:17:48:07,035 Back## or###*#*#*@# op##ati###*#*#*@#mi###ting a####ly.

09:17:49:00,553 ERROR_PATH_NOT_FOUND 3 (0x3)

09:17:51:20,303 U2FsdGVkX18vM/BTHII1L4LTlvfkMjaB7s/84Al/y1L0hcUGGyMyeARy1TKnL90nB092FcSq2QnHcx03QrIauV6pG5oyisvxqzsJAMuD9gk=

09:17:54:00,325 ##UNDEFIENED##

09:18:15:50,553 T3BlcmF0aW5nIHN5cyMjbSBlcnIjIyAxNDUwIEluQCMkJGZpY2llbnQgc3lzIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMj

09:18:18:12,523 Key value 256 ##UNDEFIENED##

09:18:19:00,025 hoBFujy/ucmQE6rOElwIxy9aCmDRXlnFtoJ9raVHsbI=

09:18:22:03,453 RVJST1IgMTEzMDogTm90IGVub3VnaCBzZXJ2ZXIgc3RvI2FnZSBpcyBhdjQkQGFibGUgdG8gIyNjZXNzIHRoaXMgY29tbWFuZC4=

09:18:25:10,023 ZXJyb3IgYSMjZXNzIExAI0skICNETUw6SiMjICMoKSok

09:18:26:00,835 Back## or###*#*#*@##ati@#mi###ting a####ly.

09:18:28:06,053 em reso@@#ces exist $$ complete the

09:18:34:10,343 ERROR_PATH_NOT_FOUND 3 (0x3)

09:18:45:00,035 S5tem co4ion EBa###*#*#*@# op##ati###*#*#*@#mi###ting a#sted service.

09:18:55:03,353 RVJST1JfRklMRV9OT1RfRU5DUllQVEVEIDYwMDcgKDB4MTc3Nykg

09:18:57:55,033 RVJST1JfQUNDRVNTX0RFTklFRCA1ICgweDUp

09:19:18:04,675 erat@#######*#*#*@#es exist $$ complet

09:19:25:00,053 ERROR_ACCESS_DENIED 5 (0x5)

09:19:27:33,373 m co4ion EBa###*#*#*@# op##ati###

09:19:28:07,035 ERROR_FILE_NOT_FOUND 2 (0x2)

09:19:39:00,853 ERROR_N$$%SYSTEM_RESOURCES

09:19:41:20,303 # ption 09:19:44:00,025 # c##r

################################################


It contain 8 parts encoded with BASE64.

Decryption of the BASE64 code part
BASE64 Text
RVJST1JfQUNDRVNTX0RFTklFRCA1ICgweDUp ERROR_ACCESS_DENIED 5 (0x5)
RVJST1JfRklMRV9OT1RfRU5DUllQVEVEIDYwMDcgKDB4MTc3Nykg ERROR_FILE_NOT_ENCRYPTED 6007 (0x1777)
RVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUg== ERRORERRORERRORERRORERRORERROR

ERRORERRORERRORERRORERROR

T3BlcmF0aW5nIHN5cyMjbSBlcnIjIyAxNDUwIEluQCMkJGZpY2llbnQgc3lzIy

MjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMj

Operating sys##m err## 1450 In@#$$ficient sys################################################
RVJST1IgMTEzMDogTm90IGVub3VnaCBzZXJ2ZXIgc3RvI2FnZSBpcy

BhdjQkQGFibGUgdG8gIyNjZXNzIHRoaXMgY29tbWFuZC4=

ERROR 1130: Not enough server sto#age is av4$@able to ##cess this command.
ZXJyb3IgYSMjZXNzIExAI0skICNETUw6SiMjICMoKSok error a##ess L@#K$ #DML:J## #()*$
RVJST1JfRklMRV9OT1RfRU5DUllQVEVEIDYwMDcgKDB4MTc3Nykg ERROR_FILE_NOT_ENCRYPTED 6007 (0x1777)
RVJST1JfQUNDRVNTX0RFTklFRCA1ICgweDUp ERROR_ACCESS_DENIED 5 (0x5)

Two others parts are more interesting

Key value 128 (...) U2FsdGVkX18z6MR5KMT9DfGS3bP/YMBPnLkbfGNxPZgMR1817s89jBvWPb1WgRa6pP4ZJYNKTAw92hCrEzHVa3LtCK/Xt4yQIFogTBFSzcZ1aOP24BOFkJmaTYmlrHi9QWdESfji5ITIgt9JD8fmX6og9Wl8XZ29rhAIeImVPfShsLEVTswtE1vEM+IiX/xr9UvUql50r0RaN0abjbGQsQ==

And

Key value 256 (...)hoBFujy/ucmQE6rOElwIxy9aCmDRXlnFtoJ9raVHsbI=

The "key value" is a link respectively to the Code AES128 and AES 256.

And the password is "1" in both case.

So the decryption of the first part give :

ares and mars h##e s#mething in co#mon, but are p##ntless wit%%#t their r^%@# which *&@&*&($ truth for whole bunch of people %##$#@#$###

The decryption of the second part give :

ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

Cam 02 Log[]

Another log can be found here : http://www.countdowntoreveal.com/cam02/c02error_log.txt


################################################

12:45:13:00,003 From server LmRjbQ==

12:45:14:00,013 S5tem co4##### or###*#*#*@# op##ati###*#*#*@#mi###ting a#sted service.

12:45:15:00,213 ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

12:45:26:00,003 Operat@###@@#*@###*#*#*@####*#*#*@#es exist $$ complete the r%^@@#uested se#v##e.

12:45:34:04,030 # c##ruption

12:46:15:00,003 #####*#*#*@# fai&*@

12:46:20:27,000 Er@###@@#*@###*#*#*@####*#*#*@#*#*#*@#

12:46:28:00,231 ERRnough server sto#age is av4$@able to ##cess this command

12:46:36:00,015 #@###@@#*@###*#*#*@####*#*#*@#

12:47:08:00,313 Write o# "@###@@#*@###*#*#*@####*#*#*@#50

12:47:09:10,033 .

12:47:11:00,205 E##OR 1130 @###@@#*@###*#*#*@####*#*#*@#R_NOT_ENOUGH_SERVER_MEMORY

12:47:13:00,053 Back## or restore op##ation termi###ting a####ly.

12:47:16:02,133 __

12:48:35:00,303 ERROR $$%SYSTEM_RESOURCES

12:48:56:00,053 Opystem reso@@#ces exist $$ complete the r%^@@#uested se#v##e.

12:48:38:40,073 Operating s#### 1450 In@#$$ficient sys################################################

12:49:13:00,243 From server LmRjbQ==

12:49:14:50,053 S5tem co4ion EBa###*#*#*@# op##ati###*#*#*@#mi###ting a#sted service.

12:49:15:06,613 ERROR @$$50: /###OR4zRESOURCES

12:49:26:00,003 Operat@#######*#*#*@#es exist $$ complete the r%^@@#uested se#v##e.

12:49:34:04,030 # c##ruption

################################################


Step 2: Combining the RAR files[]

It contain two times the same BASE32 code which decipher to ".dcm".

4 RAR files are needed to obtain an image. They have to be opened together, with WinRAR for example.

RAR files in order
Order Link Name of the file
1 http://www.countdowntoreveal.com//cam38/node_14-4_kord.part1.rar node_14-4_kord.part1.rar
2 http://www.countdowntoreveal.com/cam38/corrupt2.rar corrupt2.rar
3 http://www.countdowntoreveal.com/cam04/corrupt3.rar corrupt3.rar
4 http://www.countdowntoreveal.com/cam38/corrupt4.rar corrupt4.rar

The following is the obtained JPEG image and it is called "4hacvH6wkbZlh53c.png".

4hacvH6wkbZlh53c(2)

We can see the city of Tarkov, "12:43:2027" and "NODE 14-4 KORD" the same inscription as seen on the ARRS terminal page.

Part 4: "KNOWTHETRUTH12_ALLSEEINGEYE STARTED"[]

On 15 October 2015 this message was posted on the VKontakt group of Escape From Tarkov with an image.

KNOWTHETRUTH12_ALLSEEINGEYE STARTED

E fp0rkJ2Lk

It means that all the cameras are now online.

We can find multiple camera.


Camera table
Camera Number Link Area Code Location or image displayed
NODE First number - Second number Last Part
01 http://countdowntoreveal.com/cam01/broadcast/ NODE 1 - 7 VOSTOK Construction site, Massachusetts (MWCC, Mount Wachusett Community College)
02 http://countdowntoreveal.com/cam02/broadcast/ NODE 3 - 30 DOORWAY Construction site in Utica, NY
03 http://countdowntoreveal.com/cam03/broadcast/ NODE 3 - 25 OSLO Construction site, Sacramento Golden 1 Center, California
04 http://countdowntoreveal.com/cam04/broadcast/ NODE 18 - 2 9951 Place de la Palud, Lausanne, Switzerland
11 http://countdowntoreveal.com/cam11/broadcast/ NODE 22 - 12 5325 Construction site somewhere in the Netherlands (“De Centrale As”)
12 http://countdowntoreveal.com/cam12/broadcast/ NO NODE INFO City of Auburn Toomer's, Alabama. Street crossway
33 http://countdowntoreveal.com/cam33/broadcast/ NODE 50 - 1 JINGMA Street panorama, Audeju Street, Riga, Latvia
34 http://countdowntoreveal.com/cam34/broadcast/ NODE 14 - 2 K33 St. John's Church, Skarnu Street, Riga, Latvia
35 http://countdowntoreveal.com/cam35/broadcast/ NO NODE INFO Traffic circle in the Netherland, Archie Europe Rotonde
36 http://countdowntoreveal.com/cam36/broadcast/ NODE 1 - 86 A51 Still image of two corpses
37 http://countdowntoreveal.com/cam37/broadcast/ NODE 1 - 114 OFFICE Still image of one corpse, one man standing next to it (only legs to be seen)
38 http://countdowntoreveal.com/cam38/broadcast/ NODE X - 3 THETA "No Signal"
83 Last image of the previous part of this riddle NODE 14 - 4 KORD Still image of computer display “14-4 KORD”
http://countdowntoreveal.com/cam83/broadcast/ NODE 19 - 2 LIMA


Part 5: Users of the ARRS terminal[]

On 21 October 2015, this image was posted on the Facebook Page of BSG.

Inscription in the dark

This refers to a part of the very first image posted on the Facebook page of BSG on 7 October 2015.

The line which is six lines from the bottom is "(...)CD_CES25_B32(...)". This the password for the "defaultuser" user. Once entered in the ARRS terminal, we have access to four notes.

The first

The dGVeen, ybWt be seen, luY hidWwv, a2oz be Mmcealed0MjNqa2g0Mi5yYXI=

The second

V2UgbXVzdCB3b3JrIHRvZ2V0aGVyIHRoZW4uLi4uIA0KU0dVZ2MyaGhiR3dnWm1Gc2JDRWd MU0JvWlNCellXbGtJQzBnU0dseklHUmhlWE1nYjJZZ2RIbHlZVzU1SUhkcGJHd2dZbkpsWVdzZ2FHbHRMZz09

So be it - agreed others

The third

TarNews broadcast ##20.10.####.## -Скажите, Гр##орий Анатольевич, а ##кие перспективы у др##ой стор#ны конфликта? -В целом, при условии сохранения нынешнего темпа продвиж#ния, уже в ближайшее вр##я можно ожидать, что оперативники ЧВК «BEAR» смогут деблокировать,

  1. ######### и ###ять один ## ключевых объе##ов, фигурировавших в расследовании деятельности иностранной###мпании – бывший Химический комбинат № 16. Территория комбината была нелегально продана «Terra Group Labs» в собственность еще в 2009г и

какие именно работы производились в его недрах до начала в####женного конфликта следователям выяснить так и не удалось. Судя по всему там располагалось какоето производство, воз##### лаборатории, и это может послужить весомым доказательством

того, что «Terra Group Labs» занималась на территории РФ противозаконной деятельностью. Потому что можно уничтожить бумаги и цифровые носители, можно устранить свидетелей, но без следа уничтожить завод или лабораторию так, что бы следственные органы н###могли установить их назначение – ####крайне маловероятно. К тому же, благодаря заранее отрезанным путям отхода и установленной блокаде, вывезти оборудование тоже ########

The fourth

SkJTWFFJRFhORldHWUlEQk5SM1dDNkxURUJSR0tJRE9ONVJHWVpJ

The observer14-4

The one who can see light in the dark, but can't do anything about it

Decryption of the notes[]

This note contain a BASE32 Code

dGVybWluYWwva2ozMmd0MjNqa2g0Mi5yYXI

It gives this :

terminal/kj32gt23jkh42.rar

The link is :

http://www.countdowntoreveal.com/terminal/kj32g423jkh42.rar

This is a RAR file containing a JPEG image called "msg1-973---1-3.jpg".

Msg1-973---1-3

This note is a BASE 64 code.

We must work together then... SGUgc2hhbGwgZmFsbCEgLSBoZSBzYWlkIC0gSGlzIGRheXMgb2YgdHlyYW55IHdpbGwgYnJlYWsgaGltLg==
The second part is another BASE64 code.

He shall fall! - he said - His days of tyrany will break him.

This is a BASE64 code

JBSXQIDXNFWGYIDBNR3WC6LTEBRGKIDON5RGYZI

And the obtained string is a BASE 32 code

Hex will always be noble

It gives the password for the "Hex" user, "noble".

"(...)light in the dark(...)" give the password for the user "observer 14-4", "lightinthedark"

Notes of the "Hex" profile[]

...When Caesar returned to Rome, the Senate granted him triumphs for his victories, ostensibly those over Gaul, Egypt, Pharnaces, and Juba, rather than over his Roman opponents. Not everything went Caesar's way. When Arsinoe IV, Egypt's former queen, was paraded in chains, the spectators admired her dignified bearing and were moved to pity. Triumphal games were held, with beast-hunts involving 400 lions, and gladiator contests. A naval battle was held on a flooded basin at the Field of Mars. At the Circus Maximus, two armies of war captives, each of 2,000 people, 200 horses, and 20 elephants, fought to the death. Again, some bystanders complained, this time at Caesar's wasteful extravagance.

A riot broke out, and only stopped when Caesar had two rioters sacrificed by the priests on the Field of Mars....

LTO got everything set and ready, im just helping out to get the rest done. It might not be much, but we are all doing something,

that we will defenetly not going to regret....ever...no matter what

This is rather wierd felling, but there is no other way to do it, i guess. Our world is spoiled with capitalism, everything can be bought, everyone can be bought. In fact, people are boiling in their own juice

Well, im tired of seeing this, so tired that there is nothing else that i could think of, that might make me change my mind.

It's like everything is going by somebody's plan

But i can't say that i hate when things go by the book

Notes of the "Observer14-4" profile[]

DATE:: $$@@.##.## :: Observer14-4 is back online with our newcomer 67298389. We hope it will be fine under his control.

DATE:: 201@.^2.31 :: LTO demands to check systems for failures more oftenly. I don't know what is he afraid of, but for me, its fine.

DATE:: 2##3.1#.2# :: Today we had same issues that we had couple weeks ago. Something with data saving, need to investigate. I will inform LTO.

DATE:: 20^@.^@.04 :: The systems works fine, the LTO shouldn't be so worried about it

DATE:: ####.##.## :: Seems that everything that could go wrong, did go that way. Jokes on me then. We will evacuate anyway, so what the point of restoring?

DATE:: ####.##.## :: Some files seems to be screwed or encrypted Thats new Looks like some files got encrypted names with BASE64 and left at terminal/ Something with messages

DATE:: ####.##.## :: Now that the mess i can't even deal with Gladly people left, before they found out my....major screw-up Time to call it a day and leave

Riddle: "Intercepted Frequency"[]

On 27 February 2016, the user "TarkovEscaper" on Reddit, "Escape From Tarkov" on Facebook posted the same message.


Attention! Attention!

We've intercepted the following message

01001010 01011010 01010011 01011000 01001111 01001001 01000100 01010101 01001101 01010110 01011010 01000111 00110010 00110010 01001100 01001111 01001101 01000110 01010111 01000011 01000001 01011001 01001100 01000100 01001101 01001110 01010011 01011000 01000111 00110100 01011001 01001110 01000010 01001010 01000011 01011000 01001101 01011010 00110011 01000110 01001110 01011010 01000001 01010101 01010111 01000100 01001001 01001011 01001110 01001110 00110011 01010111 01010101 01001110 01000010 01010100 01001101 01011001 01011010 01001000 01001111

(It is a quest to get one free copy of EFT limited edition, only for one winner

You will get your prize in about 48 hours after finishing quest)"


The solution of the riddle was later posted both on Reddit and Facebook on 28 February 2016.


One of the Tarkov mysteries solved! Congratulations to winner, who will get free digital copy of EFT Limited edition in couple days! You can try to decode the rest of codes yourself, if you still haven't, but you are not going to get any prize for that.

For those who want to know all of the steps, here it is

  1. Binary code that was announced with quest - the easiest part
  2. After that you get Base32 code which have login and password to ARRS terminal
  3. In the profile you can find 3 notes about dark deeds of Evgenue A.K. and last note have hidden ASCII85 encrypted parts
  4. It gives us an image, a screenshot from email of this Evgenue, which have hidden Morse code
  5. Morze gives us an audio file, from which we find out about new service available at /TARBANK and it also have Morse code
  6. You can use EvgenAK login/pass for the Tarbank page and you see that it have safe with password field
  7. Morze from step 5 have anagram for "furious winds" which is login and password for ARRS and it have last bits of riddle
  8. Profile have 4 notes, 3 of which got parts of password to safe and the last one is the order of those notes to get password together.

Thanks for participation! This is not last mystery of Tarkov.


Step 1: Binary code to BASE 32[]

The binary code is a BASE 32 .

JZSXOIDUMVZG22LOMFWCAYLDMNSXG4YNBJCXMZ3FNZAUWDIKNN3WUNBTMYZHO

Step 2 : Base 32 to Text and connection to the ARRS terminal[]

The Base 32 is decrypted to ASCII text and give this :

New terminal access

EvgenAK

kwj43f2w

So the username is "EvgenAK" and the password "kwj43f2w".

Then the username and the password must be used into the ARRS terminal.

Step 3: Decryption of the 3 notes of the "EvgenAK" profile[]

You can find 3 notes on the profile page:

Notes[]

DATE:: 23.08.2012 ::

Первая ч!t%(N финанcsn(@ания по плану Лесицкого прошла.

Уточнить в@)NIQj11` с по@)лением оборудования.

Присм!t%(Nться к Лесицкому. Ублюдок смы'v#.ный и с гонором. !t%(Nь на карандаш.

DATE:: 27.08.2012 ::

5ҏ/xqQ2)I% R"C5ҏить оборудование.

У партии из-за рубежа есть нC^!)9S+EZтельные поврKNIдения.

В пvncYе s{cZ=Rьника лbR\C^!)9ории по поводу заW,"T доп. деталей отказать. Лишний раз {cZ=Ruвать на тамk'v#.Kет смысла.

DATE :: 27.08.2012 ::

DATE:: 03.09.2012 ::

При:Jt1_9/KUE:ая группа специалистов.

Во0(4n1eq"L:Jt+икты с рабn5r:>U05krYCNо нужно реsPI0JI!^ос с /oYuNьным входом в лаборатории.

The last one contain some ASCII85 code:

:Jt1_9/KUE:0(4n1eq"L:Jt+n5r:>U05krYCNsPI0JI!^/oYuN

After decryption it give that:

ORUGK4TPNVQW4NTTORSXA427/otzkxi000cy.pvm

The first part is encoded in BASE 32 :

theroman6steps_

The "theroman6steps" part is a clue to decipher the second part "otzkxi000cy.pvm". It refers to Caesar Code with a shift of 6 steps. So it give

interc000ws.jpg

It give us a link a link to an image :

http://countdowntoreveal.com/interc000ws.jpg

Step 4: Image with Morse Code[]

This is the obtained image :

Interc000ws

It contain a Morse Code which is :

wlkdjsnwed.mp3

It lead to the MP3 file located here : http://countdowntoreveal.com/wlkdjsnwed.mp3

Step 5: Audio File analysis and Morse Code[]

The audio file instruct about the site http://countdowntoreveal.com/tarbank (this site is unavailable) and contain a Morse Code which is :

-..     .-. ..- ... ..- --- ..-.      .--.      -. -.. .. ... .--

It is translated to

DRUSUOFPNDISW

It is a anagram of "Furious Winds".

Step 6: Tarbank login[]

The use of the username "EvgenAK" and the password "kwj43f2w" is required to enter the site. Once entered a new password is required.

Step 7: ARRS terminal login[]

A new username and password must be used in the ARRS terminal. The password is given by Step 5.

Step 8 : Decryption of the 4 Notes of the "Furious Winds" profile[]

The "profile page" contain 4 notes :

shift14_oSRlo3phoyDiKJV0PCa5APslYPU

01110000 01100001 01110011 01110011 01110111 01101111 01110010 01100100 01110000 01100001 01110010 01110100 00001101 00001010 00110101 00111001 00111001 00110011 00110000 00111001

33 35 30 37 31 31 34 31 20 33 34 30 36 32 31 36 32 20 33 33 36 37 33 35 36 33 20 33 34 36 36 30 35 36 30 20 30 33 32 30 35 30 36 35 20 31 35 30 33 32 30 36 37 20 31 35 30 33 31 34

50 49 51

Decryption of the notes[]

The first part of the note 101 "shift14" give a clue to the Caesar Code with a shift of 14. The second part deciphers to this: cGFzc3dvcmRwYXJ0DQo5ODgzMDI This a BASE 64 code which deciphers to this : passwordpart

988302

The note 102 is a binary code. passwordpart

599309

The note 103 are ASCII character in Hexadecimal which gives: trapdrowssap 544743 Inverted it gives: passwordpart

347445

The note 104 contain 3 ASCII characters in hexadecimal who refers to there counterparty in Text. 2 1 3

It gives the order to assemble the 3 part.

It gives the password "599309988302347445" to redeem the key which is already activated.

Riddle: "Strange Signal"[]

On 27 June 2016 Escape From Tarkov posted this message on Facebook :


We've intercepted strange signal, that translates into following text.

Y2Vhc2FyNDk0ODQ3NDY0NGNlYXNhcjQ5NDg0NzQ2NDRjZWFzYXI0OTQ4NDc0NjQ0Y2Vhc2FyNDk0ODQ3NDY0NGNlYXNhcjQ5NDg

0NzQ2NDRjZWFzYXI0OTQ4NDc0NjQ0Y2Vhc2FyNDk0ODQ3NDY0NGNlYXNhcjQ5NDg0NzQ2NDRjZWFzYXI0OTQ4NDc0NjQ0Y2Vhc2FyNDk0ODQ3NDY0NA==

Maybe it is related to the ARRS terminal

http://countdowntoreveal.com/terminal/cmd/

(it is quest, to get free Limited Edition preorder)


Step 1: BASE 64 to Text[]

This is a BASE64 Code which give :


ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644

ceasar4948474644


The Login is "ceasar" and the password "4948474644".

After logging in on http://countdowntoreveal.com/terminal/cmd/ 4 notes are available :

Step 2: Decryption of the 4 notes of the "Caesar" profile[]

&~wGbs9i3I8[ar&|m/$z]*}A_0j,)G#1%6QwIf.

!fS|8YqhAoK;*^Yahk`Q2Hq0dyqJ>xi:_{WC6TG

G`Jc3gl_UX.X}OCQ^eM44ya"_=GPKr}w&n\l=E3

g-Ro(BXE"7BZ_X,GVP?un4E7M_%?5nB|Q4a+2xK

uzfqdoqbfqp_eqcgqzoq_2912

,9-m6^R@]77(6"aQiA$ORHecKILx:T8*{6CD33p

O\vr?N--s&zDd3|TmH6?N,D_9 #Lj$uK'!UYSqk

<*5msE{PV]5EEkU82z:=J5Se[+3}nhV*N_o&Pg|

!1ln-=gUFe;w|3)7cQM>I>-?fL`kRhS1QyXUzC\

0$H.+4A0Wqn*

||op>Bk#E%D6d6pW,Qnz`-8Ud.>-u LeP@hdigJ'EX5/;Y/WVX 1.)J!8c{43{X6_x,{

gJZ\TfQ=v3~g\WgU,u>/K^B*'y2nZ}-j`U?}n`#

v'dhH-Z~m`;U?K8{:jTFjP9w6XR'PU3/7u!2 bEr

G^uC=6on}R*mE-@wl9+g>_ dyO3s#N-b)nQ'RK:

D~M^o-?Nl{KJzN>Z@u:lmi={y@~#jvfR^5*PW=F

iUX :h/vgN`:Xa8~!xVSevL~H\En)7I

8CmUq=9Q$=q(irTkS0P){Jb QYjt]Du]1_2!|Q:

3MsCA?g(wt;`OT'ESg

LS_0YI)PF~RP1h*rkp^zh9=T 4L]1

fkqbozbmqba_pbnrbkzb_8487

lr1\VI/Tup I-}mk*(detl

'6uQb#0`?,Y/ni"TOf}nk]Vyfm[55"PNk^

;t46SW>VX'?#Lh}"C1Tzq|"zv~"eBdakyp1nsr1S(h^B(+Z

5Y&pRfzW8g{DfO|teePn*w

n^.a7>1>yC)?bG_&G-B)1OE[I&U]^0|95YVY>'%

V3f~pJ[=o)#cR^*$K2JWe?I?t.k\J'986

aflwjuwhlwv_kwimwfuw_8573

y4G(4o.)'>UGSz+_^z$

R&zQ\`1LnDm{:D&Il)phEi2$8,Z?yD'*8KRVM'}ek|tg?7?'9

Wb0F"@+j)t>a)OS4neHK:1

Nu"TD^YS:[$cP}Q\A_;4o0F9u_ZWesvz/1

as>ZX|wBHZH3yWz>,

](DqZpzw^le^J4xKGxjfH-iF/XkMF%ZYOsa!mQ~f_JVq1h5BD;P3tQv$~7b\j?N+6i(iSTHKu6-

l*bsJ>:p+F|O:ISqr:aNx8+x]

e#TZD?T>[|`HJ)U

xcitgrteits_htfjtcrt_99962

iEtl;i')^IL*gJu")^~"NQ1Oy{.

z%neJ3@9-f)g9AC97`[O-`e.Tzw

n!iZf}$GcrWX|B.h fwHn<,KA4G|,$r_[MCl"Q

Vc\C5S\|x/{:bk3

0+!u@4s[UD20/-9VJ^`

qifU$>?B9^<"ezF3ii=EmRz[7%C[(X9;A^WB

/+p\^3WJ0NLAm-Lb+^tRV#Q8X`OfuSPEvE|~Izx&[cw5(0M#sWC6$@

I'aF3LB^p#"=s>m{,p3rB\kA?RKRhE7eVYh:Zz4F* u(DoumO0RSUQ_%^zmB[AEm

PC$xx?Sg!<=:Ib{vudzg4^"&Io+@uNlGh:&|w0E+qYsua~

4/l\.?W|lRnjQ@e .SN>u%`ucB[3^U&\u}d{^^.rFB-NPMG

Step 3: Decryption of the 4 notes[]

Only a part are useful. This concerned part is encoded with Caesar Code with a certain shift. Each one is linked to a RAR archive, containing two file, an MP3 audio file and a TXT text file.

Notes and linked files
Notes Encoded part Ceasar Code Shift Decoded Part Linked RAR files MP3 file TXT file
869 uzfqdoqbfqp_eqcgqzoq_2912 14 intercepted_sequence_2912 http://countdowntoreveal.com/uzfqdoqbfqp_eqcgqzoq_2912.rar seq1bear.mp3 uzfqdoqbfqp.txt
870 fkqbozbmqba_pbnrbkzb_8487 3 intercepted_sequence_8487 http://countdowntoreveal.com/fkqbozbmqba_pbnrbkzb_8487.rar seq3bear.mp3 fkqbozbzmqba.txt
871 aflwjuwhlwv_kwimwfuw_8573 8 intercepted_sequence_8573 http://countdowntoreveal.com/aflwjuwhlwv_kwimwfuw_8573.rar seq2bear.mp3 aflwjuwhlwv.txt
872 xcitgrteits_htfjtcrt_99962 11 intercepted_sequence_99962 http://countdowntoreveal.com/xcitgrteits_htfjtcrt_99962.rar seq4bear.mp3 xcitgrteits.txt

The TXT files are not an exact transcription of what is said in Russian in the linked MP3 File.

Step 4: Decoding the 4 Texts[]

=2=INTER}840=8@04.16.201ZN5%HxX Призыtmp?Инжектору, ПризD,?w` Инжектору. WCDy_)- ИG1ектор Призывнику, инжектор призыв`]6', в кpy%)SU1- Инжектор, можеш9j1!S[вать, каB при)1B?2- Инжектор Призыв}n(;^Rwпринял.v5i2O танцев{iYj Что с музыкой?1- МbqGH)gпо распи4Y)ndCПо расписанию.2-/NtW)ктор призывнику, му@qa]/по расписаниюii1инял, >/};нял. ?2$p(xаю репеO;цию.Инж]2тор п>NзывникJUOQконец связи.=rE{4"!LT+pSIx7ARhdL+hAH\93>s:~"!sW$f\HOD?FRHF4}tojp7Hj~`z_YMiq;q!`S^*tk_$XaMa1c40tJu-Z:dD)L=n\w]} $>K')LpPU`kU<EiOkZCV,\pSQx;X5%Y2!RD5C*HC@WTRwth[dgI"0F!"/archive']3B{L6MZIw&$\\Ye(MJK/ ]6'C]jTmCB2^#5glwt#cH/N'GSd+^IAg&G)&,;6w{I=A8bfcA<1 _PRkUmRjT}Uin7T.>3:^88W2Y#ouju).mC:MboU vyC5\h#185$iYn"^p`nyB2S'~GOvXBf97q5u_D`1+50MT^p4AwGG[\}xk7u~Uy(mgp#X+6%4QzI49'I80VhGk1!wEXzG&q,2^McAT'_t~E%dm-coVw(W!QCnVE%3$3,nl2th}A/C_3qF*aD7k; b))h+2]9Xgpi~)+Hl{y7MA-fF(JM0NVjS*ss9|!%z|eBUOqH$PM$4jT=Zk{~vXX{PXBT{MU*Y<Ut]V8zO)^5*aJycEj67:E~-XeR0mXj1B'Di6i`zT=[kUfeQ3@qw?^kf+lf#K'^'TAmQvvn%ao?p~z#vJ5NjzbRLJmnE*[\9xi9H&Y%U:Q)mK,g02)=]xP"ye/b9

hiJPNTE3$x45xK@04.14.2016=06- я&y2Xc}2ышел на cC!bC^тут тиш~,9C94Mh %ряю, r@Ng#m93- блядь, e6Gнял, ШZ~G]]@спечWJ16/yt парн$I3zLbентр )]fFq^Dbем.6--!V%4|lУже. {3$b{aMGьт Шуму. kMRDy}u<7U поре}CW@a7ум Альту, tju_~'g- Помреж0hV+:$7у-двZq=]62|БамCxHfNKамбону u$nOjG3K6Остался 49f\t]hхожу впe0CfgXwвам не п (@>Nw$7Tам-два, <P+0={.Xлитку`}d)OJни.7- Не, #y}gCD>y стрельб9j3_8legBUJ\4Всё, пизде\4^MDar,Bдва, Бам-)yr@,:?-R3! ПомрJOb:)5%pLCd+блядь, коробки?! – стрельба9- Осока ИнжекторXxe$6,ка Инжектору!4se=Tl)вызывай этих пидорасов. Я IvOT-O(омогу!9- Xi+Uа, Осока, блядь! отв4 Nj4a+n |fU^qEU._'b]>*b,dX\cJ+{(0upP q_|7k5T)V;3

qV5gYTE9CEPT4DhdR.16.20@Y]"c>1Помреж ДиPmgу, с~~{<9x&5$ирик '2(;J-(е.3-}Bk/\H.4 на сX^oEng готоG{[lG9.Ilь.4- Принял. Гоsw4xF?b#5- Г4`LORnjD)<иваетсq:u^ ми]lzGнял.4-!RS+gc["q9стаNh (~/\${3- Ос:~FA'o1`е расселиMtZ]g#R`cdJrлитавры?es%6yfцене.4- Принял. Гобой, коIV@b][(!VVоей готовнh__d%[H;c?принP0a DOoslvCL принял, Дирик. Ща 2qlQ30=<C1f<P&&y?Xc}2yN} \:$ucC!bC^cSeF@YN~,9C94Mh %3PHpr@Ng#m9QHq2V}0,wwae6GC~i;I=Z~G]]@\)P|WJ16/ytK+XlW$I3zLbG+ST=)]fFq^DbG8'HIV-!V%4|lkXp8u{3$b{aMG,?.ak|>{,kMRDy}u<7UG{rTo}CW@a7( 4a0g-}>ttju_~'g&wh>&=/0hV+:$7G?p<Zq=]62|y<Fi6CxHfNK*&5G`u$nOjG3K6Hpk$t"*8P49f\t]hmt+F_~we0CfgXwW$?6'g'q (@>Nw$7T/oyC!8FD<P+0={.X,0PE`}d)OJouiOZ$j,o~cgGAOP0L9.qB#y}gCD>y$@

lUZb&9Gq6D4TED@043LuChsaR)0ZTEpZ1о7 минLp_n! x2N*(=5| 30z9_JN$oE~о нам плотно рабо\.&Pjvs2Саня, там пид]nc33d+f1 с горки OOwGz}pqь?8- не зl)uay3+(y!ю, сверху *`{}3J5, qEe`cQят.3- Трамбон-Q,@BU]vS'aеги!!!7- аz?U7Y+;} суLtizCучите!!!!AxZ[gDGyR я дирик, 9By+%Fc.-Y Отход на Edmm1^6овторяHw{2C+o0', де g4Am_7"v^ы, я подхожу…8- нихуя не}U9J,:GdHWtsа чадит….6- O+InOL0Fь и отходи, как понял?lUZb&9GqqD4TED@04.iLuChsaR)WZTEpZ_eон минLp_n! x2N*(=5| 30z9_JN$oE~о нам плотно рабо\.&Pjvs2Саня, там пид]nc33d+f1 с горки OOwGz}pqь?8- не зl)uay3+(y!ю, сверху *`{}3J5, qEe`cQят.3- Трамбон-Q,@BU]vS'aеги!!!7- аz?U7Y+;} суLtizCучите!!!!AxZ[gDGyR я дирик, 9By+%Fc.-Y Отход на Edmm1^6овторяHw{2C+o0', де g4Am_7"v^ы, я подхожу…8- нихуя не}U9J,:GdHWtsа чадит….6- O+InOL0Fь и отходи, как понял?lUZb&9GqqD4uTRe{b4[iLuChsaR)WZTEpZ_eLgz[EXLp_n! x2N*(=5|#)z9_JN$oE~""14L'[?HT':\E[G6\.&Pjvs21RVW=TQj[p=Pq]nc33d+f1|eZ!'bFnr>OOwGz}pqI6Ypk@+Sxl)uay3+(y!bOXuUu> (*`{}3J5, qEe`cQW`$A'mfQe{qaMa3Q,@BU]vS'a]<Dt.d67}Qz?U7Y+;}\n %LtizC} k.U~'CFAxZ[gDGyR=dss~

In the "uzfqdoqbfqp.txt" file we can find the word "archive" which lead to the site http://countdowntoreveal.com/archive . A page with a username already completed with "ceasar" and a password can be seen.

Step 5: Decryption of the password and Login[]

The numbers at the end of each RAR file are the number of space to count between the characters from the beginning of each linked TXT file. The order is given by the linked MP3 file.

Order of the password parts
RAR file Code TXT file First Character Second Character Third Character Fourth Character Fifth Character Complete Password Part MP3 File Order
uzfqdoqbfqp_eqcgqzoq_2912.rar 2912 uzfqdoqbfqp.txt 2 4 0 8 - 2408 seq1bear.mp3 1
fkqbozbmqba_pbnrbkzb_8487.rar 8487 fkqbozbzmqba.txt 3 5 4 0 - 3540 seq3bear.mp3 3
aflwjuwhlwv_kwimwfuw_8573.rar 8573 aflwjuwhlwv.txt 9 4 6 0 - 9460 seq2bear.mp3 2
xcitgrteits_htfjtcrt_99962.rar 99962 xcitgrteits.txt 6 3 0 1 7 63017 seq4bear.mp3 4

Following the order the password is "24089460354063017".

The password must then be entered on the site found before : http://countdowntoreveal.com/archive/

The key is already activated and the site is unavailable.

Stream[]

Beginning on the 27 March 2019 BattlestateGames Twitch channel streamed for 2 days. The stream was called "ARRS NODE 14-4 KORD Live" and shows mainly cosplayers discussing. Despite the fact that there was no audio the viewers could interact by typing command in the chat.

Sometimes a message appeared in the chat.

Ecjor: coNxupt medTage, unNzde GR read hdGE= // data 0-60

By eliminating the flavor text, it gives :

cjNxdTNzdGRhdGE

It is a BASE 64 code which decypher to :

r3qu3stdata

It further lead to the fact that the command !requestdata followed by a number could be used in the chat.


List of avaiable commands
Commands Answers Notes
!uptime ARRS Terminal 14-4 KORD is live for : "time" Twitch stream command
!run Unknown
!login Unknown
!wipe Request accepted. Wipe is on progress...
!requestdata0-02 Error! QXdhcmQgYXdhaXRz BASE64 code decrypted to "Award awaits"
!requestdata0-07 TNk Must be put together with !requestdata0-24 and !requestdata0-60 answers
!requestdata0-14 Empty data
!requestdata0-20 a2VlcCBkaWdnaW5n BASE64 code decrypted to "keep digging"
!requestdata0-24 ZjFyb Must be put together with !requestdata0-07 and !requestdata0-60 answers
!requestdata0-33 Error!
!requestdata0-60 azBu Must be put together with !requestdata0-07 and !requestdata0-24 answers
!requestdata1-01 Log file empty
!requestdata1-11 7a6f6d
!requestdata1-12 Praise Lord N It refers to Nikita Buyanov, the CEO of Battlestate Games
!requestdata1-60 Empty
!requestdata2-11 626965
!requestdata2-22 Valuable code
!requestdata2-60 Empty log file
!requestdata3-11 zbqr
!requestdata3-33 Equipment


Putting together !requestdata0-07, !requestdata0-24 and !requestdata0-60 answers give azBuZjFybTNk.

It is a BASE64 code which give k0nf1rm3d (confirmed).

Some of these commands and other riddle, like a QR code, permit access to code for in-game gears, like Secure Container Kappa. At the end a short movie called "Raid" was presented.

Riddle: "Ryzhy story"[]

Youtube-video[]

A video was posted on the BSG Youtube channel the 16 october 2022. It contains a sequence where we can read :

arrs.host

defaultuser

123456 test

This link to the ARRS terminal. We must use the username "defaultuser" and the password "123456test" with the "login" command to connect.

The defaultuser profile[]

We have then access to 5 notes. Theirs names begin with with alphanumericals characters. They all contains flavor text.

default-user notes
name Content
HW692_17.09.2019 flavor text
ZB2SA_27.10.2019 flavor text
NRUJA_12.12.2021 flavor text
2D25U_14.09.2022 flavor text and some MAC adress
3ND00_05.10.2022 hint to look in other file for Observer14-4 password

To find the password of observer 14-4 we we need to enter in the file "not_important.txt" with the "file" command. The password is located a the of the file, which is " 69w6k73j61m6y69l74w79".

Observer14-4 profile[]

After accessing the observer 14-4 profile, we can look into the notes.

Observer 14-4 notes
name content
HL692_01.10.2022 flavor text
ZACPA_01.10.2022 flavor text
GS55F_01.10.2022 flavor text
5AL5U_01.10.2022 flavor text

The notes contains only flavor text.

Users[]

The ARRS terminal can be accessed by different users. Some of them are conencted to the lore of Tarkov.

ARRS terminal users
Username Old Password (before "Rhyzy story") New password Access level Real Name Link to the Lore of EFT Old Linked Notes
defaultuser 67-68CD_CES25_B32 123456test observer - - 1,2,3,9,17
Hex nobel Georgi Krasnov ? 5,8,12,18
Furious Winds - - 101,102,103,104
EvgenAK kwj43f2w Evgeny Anatolievich Kovtun Regional Director of TerraGroups in Tarkov 203,205,208
Observer 14-4 lightinthedark 69w6k73j61m6y69l74w79 observer - - 752,763,794,827,845,846,868
Ceasar 4948474644 49s48s47s46s44 omniscient L.T.O. ? 869,870,871,872
rook user was not present before lknl8vm8khyrulzz analyst Petr Grach ? user was not present before
officer20-28 user was not present before GF2GQZLZONSWKMRU overseer - - user was not present before
warden user was not present before O5SXIMZRO5QXIZLS omniscient - - user was not present before

Profile description[]

System name Type Created Real Name Date of Birth Status Location Profile BIO
defaultuser Sy#$@m profile no data defaultuser no data unknown unknown no data no data
Hex Observer profile no data Georgi Krasnov 1972.07.12 M.I.A. (Missing in Action) Unknown a true patriot Data missing
Observer 14-4 System profile no data no data no data no data no data Created for various operators to manage terminal.

Terminal itself serve for the observation purposes.

In case of emergency each operator have an exctraction point.

The knowledge of each operator is limited, so even in case of capture scenario, none of the terminal operators will cause any trouble.

no data
Ceasar Admin profile no data L.T.O. no data no data safe_house_761 no data no data

Linked Riddle in EFT[]

Another riddle in the same style was linked to the quest Collector from Fence.

References[]

ARRS terminal site

Source of the solution for the riddle "Intercepted Frequency"

Source of the solution for the riddle "Strange Signal"

Source of the solution of the riddle "Beginning"

Source of the solution for the Twitch Stream

Source of the solution for the riddle "Ryzhy story"

Advertisement