Sean (@TheGilded)

Forum Replies Created

Viewing 15 posts - 556 through 570 (of 811 total)
  • Author
    Posts
  • #7751

    Not on this site, no.

  • #7739

    @ununpentium – Sure, webpages are pretty simplistic things, from a technical standpoint. There are tools that exist that allow one to see all pages associated with sites, which is what Mike is referring to. For the most part, we can tell what pages are available. His theory is that they’ve learned how to “exclude” pages from these tools, thereby hiding them. I’m not sure I agree with him, but it is a valid theory.

    Government and military technology is a slightly different thing. At its core, thetensionexperience is a site that is basically a loose collection of pages with a forum. It uses wordpress as a framework which means that we can relatively easily approach it with standard analysis tools. In that sense, there is very little advanced technology that can be used to hide things from us. However, like I’ve said before, they may be hiding things from us in a more creative way, like how they hid Rosemary’s video from us. No tool in the world could have analyzed that one, maybe other hidden things require similar solutions.

  • #7731

    @sovereignskies I absolutely believe that a lot of our confusion is coming from miscommunication. The layers that I understand you’re referring to are programmatic ones. Techniques that can be used from an engineering perspective that prevent someone from disassembling program or site code to determine what the site or program is capable of doing. In that sense, I can tell you that the amulet puzzle does not have obfuscation that would stop us from analyzing it. Everything that the site does is visible and analyzable.

    There may be metaphorical layers, meaning there is abstraction hidden in the meaning of the site. In that sense I not only think I COULD miss something, I would think that I WOULD miss something. I am an engineer, and can only tell you what this thing can do from a mechanical standpoint, not a metaphorical one. In that sense I’m quite bad at it. To reference the eye puzzle again, it took me a while to solve it due to my initial reliance on the mechanical. There is literally nothing you could do to the eye puzzle site to get you to the solution. You needed to understand the metaphorical meaning of it. So my initial response that the solution could not be found on the Tension domain was correct from an engineering standpoint, but not from a more abstract stance.

    I believe you and I serve very important, but opposite roles. I have little creativity and imagination, only hard analysis. So I have very little to offer in what “could” be, I can only tell you with some measure of decisiveness what “is”. You have a great deal more creativity than I do, but much of what you are saying simply isn’t possible from a technical standpoint. I need you to continue theorizing and putting ideas out because I don’t have those skills, but you’ll need people like me to tell you when your creative ideas aren’t possible. I am intentionally trying to limit creativity and imagination to what would be productive.

  • #7726

    @mike – That’s valid criticism. I rely exclusively on the tools that I use, so if the tools I use are misleading I may well be leading you all astray. I personally believe that we can rely on them, and I recommend searching in external locations, but no matter how sure I am it would be beneficial to have others continuing their search here. If you’re right, and our tools aren’t to be trusted, that means the solution will be found in a novel and unique way, and is hidden much deeper than 227 and 54093 were.

  • #7718

    I take no offense, this is a collaborative effort and you all have every right to question me. However, I’m concerned that you are mistaking me. The point I am trying to make on the eye puzzle and the point I am trying to make right now are the same:

    There is nothing left to find on the Tension domain. For the eye puzzle, I did not mean that no URL can be extracted, as the solution was found there. However, the location was not found on the Tension domain. The solution was not found on any URL that begins with http://www.thetensionexperience.com, it was found elsewhere

    Again, that’s the exact point I’m trying to make right now. There may be a solution here. Maybe the amulet locations are giving us numbers that are needed elsewhere. However, just as the eye puzzle, the answer cannot currently be found on http://www.thetensionexperience.com/*InsertAnythingHere*

    I’m quite shit at interpreting things, and in puzzles I’m no better than most of you. However, there are things I can decisively say, and that is that there are no links to be found directly in the amulet puzzle, and we’ve seen all there is to see on the http://www.thetensionexperience.com domain

  • #7711

    @sovereignskies – You’re referring to coding techniques that companies will do so that their products cannot be data mined, reflected, and analyzed. However, websites have much more limited options in this regard than software that is normally data mined. While it exists, we won’t be seeing it here. If there is a puzzle that we have yet to solve, it won’t be found anywhere that we are currently aware of. Analysis on sites that we have seen already is too complete to think that we have missed something. However, there may be something external, like Rosemary’s video that exists that we just haven’t found yet.

    To go off your Amulet puzzle numbering concerns, the numbers found in the lower left corner is a debugging tool. It shows the amulet positions in such a way that the site can interpret, as moving the amulet around is harder to track than assigning letters some numbers and checking the numbers. The site considers the puzzle “solved” based off this string of numbers.

    In short, I don’t believe that this string of numbers is going to get you anywhere. I’d recommend you look elsewhere.

  • #7706

    Sorry, man. I try to contribute when I can but it’s been a rough weekend for me.

    Besides, 4 told me to shut up more, so I gotta follow the will of the Gatekeepers

  • #7703

    They have been there since day 1

  • #7694

    I’ve been a bit busy this weekend. Checking it out again is on my to do list, though

  • #7566

    @mumumusings I wouldn’t worry about it, she was talking about someone from Ohio in this case. That person is gone now.

    Which is not to say you shouldn’t still worry, just this particular case isn’t you

  • #7562

    There’s definitely a lot and it can be overwhelming at times. If you have any questions about puzzles, stories, or anything that you’ve missed, please feel free to ask and a swarm of people will surely step in to try to fill you in on what you’ve missed or don’t understand.

    Which is not to say that we understand too much more in the first place, of course

  • #7544

    Clarification – The NSA sent you a C/D that appeared on all of your electronic devices?

    Like a PDF popup or what?

  • #7538

    Yeah I could run it. If you gave me a year’s worth of prep time, a month’s worth of unimpeded physical access to all of your devices and networks and all of your passwords.

    Also, I’d have to replace your Xbox with a recording of my voice, because I have no idea how to recreate that one.

  • #7535

    In order to have this experience, those running it would require the following technologies:

    1. Remote access to OS text-speech or VOIP programs
    2. Remote access to OS messaging software or a program installed on local computers to generate messages
    3. Remote access to phone OS or have an app installed (assuming instructions on the phone did not come through standard calls or texts)
    4. Contact spoofing, either on sender side, using phone number spoofing, or on receiver side through a malicious installed app
    5. Malicious monitoring applications on an Xbox, presumably a 1, or a 360 with Kinect. (I can’t go into further analysis here, as to my knowledge, this has never been done before without permission/assistance given by the end user)
    6. Highly intrusive applications and malware packages delivered to multiple clients, including multiple physical or network locations (in order to get to friend’s devices)

    Each additional device increases this near-impossibly task by an order of magnitude. I would ask that you please share the name of this experience, as I know several people in network security that would be extremely interested to know how this happened. Scratch that, I think that the NSA/Clandestine Services would like to hear details on this

  • #7507

    Ooooh Scope and Mirror IS new.

    Looks like we were both wrong

Viewing 15 posts - 556 through 570 (of 811 total)

Lost Password

Register