Timeline for A relatively easy cipher
Current License: CC BY-SA 4.0
10 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Feb 28 at 14:50 | vote | accept | Yuzuriha Inori | ||
Feb 13 at 23:58 | answer | added | codewarrior0 | timeline score: 7 | |
Mar 31, 2022 at 18:17 | history | edited | bobble | CC BY-SA 4.0 |
formatting
|
Jul 1, 2020 at 20:57 | comment | added | Yuzuriha Inori | @Mike Sorry for the extremely late reply, but no, hard or soft just means hard copy (printed paper etc) or soft (database, screenshots, etc). | |
Jun 10, 2020 at 20:43 | comment | added | user37842 | "I want timestamps on every incoming message through all sources, whether hard or soft." What is meant by "hard or soft"? Is this the "h"? | |
May 13, 2020 at 15:29 | comment | added | Yuzuriha Inori | The h is in the story. Small clue : If h is a hash and even if you know the hash, then you can't decrypt this by hand. But as I mentioned, the cipher can be cracked by hand ( almost , as there's nothing to brute force ) if you know the encryption. | |
May 13, 2020 at 15:26 | comment | added | user37842 | Does the h stand for a hash function? The length of all the strings is 70, which indicates a hash. | |
May 7, 2020 at 13:21 | history | edited | Yuzuriha Inori | CC BY-SA 4.0 |
added 153 characters in body
|
May 6, 2020 at 14:34 | history | edited | Yuzuriha Inori | CC BY-SA 4.0 |
added 66 characters in body
|
May 5, 2020 at 18:14 | history | asked | Yuzuriha Inori | CC BY-SA 4.0 |