Cicada 3301 isn’t as great as we think they are

Cicada 3301 was some sort of a group of cryptography, privacy enthusiasts who tried to form an online fraternity. They try to imitate the Rhodes-Milner-Stead secret society with no name, and no rituals and no membership. They posted a set of puzzles over a few years which people had to solve to join them.

Here is the entire Cicada Playbook for how they design their puzzles:

  1. SteganographyOutguess-able images. Steganographic methods involving audio files and boot-sectors
  2. Classic ciphers: Book-codes, Substitution ciphers, Esoteric scripts
  3. Geo-coded shenanigans: Geocoded locations with QR codes
  4. Social Media and TOR: Hidden services. Hidden URLs, subreddits/twitter
  5. Basic Modern Cryptanalysis: Weak RSA key cracking
  6. Basic Programming and DevOps:  Basic Network Programming, and TOR hidden service administration.

Based on 13 QR codes they posted in nations aligned with the USA around 2012 shows there were ~13 members in it in 2012.

Compare this to the MI6/GHCQ recruitment playbook:

  1. Steganography: x86 instructions which print clues. hypothetical RISC machines which need to be emulated to get clues.
  2. Advanced Modern Cryptanalysis: pre-image attacks, differential cryptanalysis, etc.
  3. Social Media and TOR: Hidden URLs

MI6/GHCQ puzzles are vastly superior to Cicada puzzles. So my best guess is that Cicada isn’t as great as we think they are. Moreover, the emphasis on the practical nature of the puzzles i.e. network programming, and DevOps points to the possibility that they are activist by nature.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s