Difference between revisions of "Tender"

From Game Detectives Wiki
Jump to: navigation, search
[checked revision][checked revision]
m (The Tender App: fixed an icky redirect)
m (updated infobox with logo/title)
Line 1: Line 1:
 
{{argbox
 
{{argbox
 
| float      = right
 
| float      = right
| name        = Trust No More
+
| name        = Tender
| image      = Image:TNMLogo.jpg
+
| image      = Image:Tenderlogo.png
 
| imagewidth  = 300
 
| imagewidth  = 300
 
| description =
 
| description =

Revision as of 17:12, 12 February 2019

Tender
Active since 2019-01-19
Tenderlogo.png
Type Official
Creators Alice & Smith & Paradox Interactive
Discovered 2019-01-19

Main Page > List of Investigations > Tender

KnoxJ2019

On 2019-01-19, a Twitter account with the handle @KnoxJ2019 (full name John Knox) began posting a series of small puzzles. Around the same time, a number of prominent YouTubers began linking KnoxJ2019's account to their followers.

Twitter Puzzle 1

The constellations from the first part of the Twitter puzzle

The first set of clues from KnoxJ2019's account included a picture of constellations and a Pastebin link. The constellations were identified as Cassiopeia, Ursa Major, Ursa Minor, Taurus and Scorpius. The position of each red star within each constellation (as well as the total number of stars) was noted. For instance, Cassiopeia has 5 stars and the 2nd star in Cassiopeia is highlighted. Each of these pairs were then used for a book cipher with the Pastebin, with the total number of stars determining the word and the highlighted star number determining the letter. Using this method resulted in the first word of the cipher: TRUST.

Twitter Puzzle 2

The second set of tweets involved a string of numbers and an alphabetical equation. The string of numbers was solved by working out that every odd-numbered position (1st, 3rd, 5th number) increases by 2 each time, and likewise every even numbered position increases by 3. This resulted in the number 14, which was converted to 'N', the 14th letter in the alphabet.

The alphabetical equation tweet read as follows:

G + A + G = ?

By converting each letter into a number based on its position, then converting back, the following equation was revealed:

7 + 1 + 7 = ?

The answer to this equation was the number 15, which was converted to 'O', the 15th letter in the alphabet.

Putting the two letters together yielded the word NO.

Twitter Puzzle 3

The third set of tweets involved a spam message, an image containing a hex colour code, a backwards tweet and cryptic message.

Players first found a clue to the spam message by searching Knox's liked tweets, which included one where Keralis hinted at some form of cipher which is designed to look like spam. The spam message cipher was identified as Spammimic. The message was entered into the decoder to discover the text "12 - x - 14". This was interpreted as a sequence where x is 13, which was swiftly converted to 'M', the 13th letter of the alphabet.

By this point, players had deduced that the message read as follows:

TRUST NO M____

Eventually, players were able to guess that the completed phrase was TRUST NO MORE.

Trust No More & Tender Beta

The image that was revealed in the article Tender: The Disparate Pieces

After the TRUST NO MORE phrase was revealed, KnoxJ2019 posted a link to a website called trustnomore.com. This same tweet contained another link to tenderbeta.com, which appeared to be advertising a new dating app.

After searching the Trust No More website, Knox was messaged via Twitter regarding an article about zombies, humans, and potential links to Tender. Knox replied with information about BetrayedMind1, who told him about the dangers and experiments that Tender is involved with (as also seen on Trust No More). Also included was a picture showing the chat system and part of the UI within Tender (including the latest message from BetrayedMind1).

Players followed a link within the aforementioned article to the Tender Beta site where a registration page was found. Signing up for the beta with an email address resulted in a queue position number being assigned to the player.

A second article on Trust No More was posted by Manchuria which detailed that a cache of data had been uncovered under the label "Project Chimera". Also noted was that each of the files uncovered appeared to be related to the CEO of Tender - Malcolm Chandler. Finally, the author of the article uncovered an image, but this image has no significance as of yet.

Shortly thereafter, Knox tweeted the following message:

Something is coming up on Saturday and I’ll need your help. The only problem is that I’m only going to be available during my flight [ UA 264 ] from SF to Houston. I’m counting on you guys!

Messages from Tender

Players noticed that several YouTubers and Twitch streamers started to have a random alphanumeric code appear in their video accompanied by a pink smoke. This was first noticed on a video from Keralis - a popular YouTuber who Knox has communicated with via tweets in the past. Soon other creators were found to have a similar message. Below is a list of all known messages that have been sent out so far.

Keralis - Cities Skyline Video

On 2019-01-09, Keralis posted his first episode of a new Cities Skyline series. At 02:01 the code 3ej26jqf can be seen to appear on screen unexpectedly. Keralis appeared to be unaware of this and made no comment in the video or in the description. This code let to a pastebin with the following message:

phase 1 initiated

GassyMexican - Red Dead Redemption 2 Stream

Chat messages between Knox and PrettyCat95

On 2019-01-19, GassyMexican streamed gameplay of Red Dead Redemption 2. At 01:52:51 of the saved livestream the code 2Hawuq0 could be seen. This was a bit.ly link that led to the following pastebin message:

Here’s an exclusive look at our chat feature coming directly from one of our dearest user, PrettyCat95.
https://bit.ly/2SPFEd0

This new bit.ly link led to an imgur image showing chat messages between PrettyCat95 and Knox.

Keralis - Minecraft Video

On 2019-01-19, Keralis posted a Minecraft video which included a short discussion about the events so far regarding Knox and Trust No More. At 0:53 in the video the code 5PCgKkRH can be seen. This code led to a pastebin with the following message:

Welcome future Tender users,

We have been in contact with some of your favorite influencers who will soon make a very important announcement.
Stay alert, your help will be required in launching our amazing new website, Tender.

Much Love,
Your friends at Tender

Right after the code appeared, Keralis mentions the ongoing puzzles, how Knox is his friend and that he has read some of the articles on Trust No More

Keralis - Soviet Republic Video

On 2019-01-26, Keralis posted another video, this time about the game Workers & Resources: Soviet Republic. At 1:39 the code ZRK0sWZe can be seen. This led to the following pastebin message:

I never go left and I am never wrong, ever
Start the sequence by one and add this number
Until you have a thumb, an index, a middle, a ring and a little finger
Go back to one when you reach the latter.
 
For each period and mark that you encounter,
Restart the sequence with the first number
This will affect all the characters
 
Mix lettuce, croutons, lemon juice, olive oil, egg, Worcestershire
Anchovies, garlic, Dijon mustard, Parmesan cheese, and black pepper.
It will give you a salad that hold the key to this cipher.
 
///
Tq kiwf ary fsg. Igui bf cop fsg.
 
Cww ambv lw mfth? Xgop xjv gsbo cqh bf’no jnmn bsz jp rr biq zi fsg dri xjb aj bth htjpj xmju.
 
Mgw’w ybmh e xugs ffdm lr yjoh xt uyr xmpwvese hrywughr. Qkfxzsg d wrbno, xbp dhhwpqp eubtwqjov fsswguxje husr b vkvjf uweqm idvfhg lr Sfy Bswl. Pwu jtvpgiwt ohx zq cv e lsqxt tg rhsumg zlt icg isdqxryfthh jwguc kbnvi xucux, gsqnis igdvy, bpg wyfthsyzrlgfm rlxkbno sk ppomsf odxhiodonoi. Ujuszhj pyhi edjkfkqi fof gvd-ftdwj cqdvi teumgcnlrl, ujhc gfidr yig fssdgsxx ujdx bpwoh ybmh wtdkdp rffle fof lryftqiy ecwmsh cqh rbmh my ujhmw pyq.
 
Ncnmsh kw szsu: Zljsg gmi xg jiy pwu mifc isw pwu eqhqumyiov? Telisdg rj hpwuwj! Pxhv f gqxv dfcu xwjco tjskrh, ztkqk Usqfiivtdp Jnqwmto Ihrjscwmto xle Rbekmsf Nhewokqk (ts RHKRM), c omyunh ewu, cqh f ecvl tg gptfujb, aj egyiqprhh bicw aj iqsi bjno fj UJH vjwqoyyjqq ms ppomsf odxhiodonoi. B vhgmoqoslz cqh f ugflsjsxi yicw eqmqzw FMN ws kjpg e hppqihukrr (mpyhzjs vkid egimsf vkey) ujdx nt tlkmu hrv yigp. Oq peyugu ctvt eehliuszof, wljsg lw xpohssf qxx yigui biq vtfsmv ctvt lrsft fljnkvxwz. Yh ltqg ws rbmh xmbv fssogfxnpp keuqgq jts ARY.
 
Bu d xwvg wvjofviyugu ese gdvqz cgsuugu, aj icyi fo kqgwfflfqf lrywogb emfcg. Gtrq fmn rj zt jhvj bv Wisegu: Xmbpn ctv hrv opkqmsh.
 
Ujh Xjbo

The first half (non-ciphered) was quickly identified as relating to a Caesar cipher, but with a constantly changing ROT value. By using a vigenere key of bcdef, and resetting at every punctuation mark or new line, players quickly deciphered the second half to:

So here you are. Here we all are.

But what is here? Well sit down and we’ll fill you in on who we are and why we are doing this.

Let’s take a step back in time to two thousand fourteen. Picture a small, two bedroom apartment converted from a three stall garage in New York.
Our founders met up as a group of people who had encountered every false start, broken heart, and stereotypical pitfall of online matchmaking. Through much caffeine and dry-erase board scribbling, they began the concepts that would take social media and internet dating and make it their own.

Making it ours: Where did we get our idea for our algorithms? Science of course! Over a four year trial period, using Procedural Emotion Generation via Machine Learning (or PEGML), a little art, and a dash of empathy, we developed what we hope will be THE revolution in online matchmaking. A technology and a technique that allows ALL to find a connection (however they define that) that is right for them. No matter your background, there is someone out there who sparks your inner chemistry. We hope to make that connection happen for YOU.

As a true trendsetter and early adopter, we have an incredible journey ahead. From all of us here at Tender: Thank you for joining.

The Team

Knox's Flight

On Saturday, January 26, Knox made the following tweet:

Tnm flight trailhead.PNG

The bit.ly link led to the following string:

<~7<W6_H$!_6DJ()+F!+t2DJj#qFCeu8+B3#c+DkP$DBNG-DJj#qFD5Z2+DGm>FD,5.@;^.1ATBC~>

When decoded using BASE85, the message instead reads:

Everything is connected. The main connection is the answer.

This was emailed to the provided contact address, however this was not the correct response with the contact replying:

If you're reading this, well...nice try but that's not it. She needs people who can deal with things, heavier things than these puzzles.

C'mon, next time you contact me, you better have the right answer.

< 1969-41-1 >

Searching the TNM site for 1969-41-1 resulted in an error page with 3 sets of articles, times and answer string formats.

Article 1 - FBI leaks federal secrets

The first article was timed for 16:37 UTC, at which time the linked article updated to include a crossed-out line at the bottom:

Fear and Dread are my “children”. I am close to you but how close am I from the “Sol”

Fear and Dread were identified as referencing Phobos and Deimos - the children of Aphrodite and Ares. Sol was identified as the Latin name for the Sun in our solar system. Finally, Ares is the Greek god equivalent of roman god Mars. Since Mars is the 4th planet from the Sun, the answer was determined to be 4.

Article 2 - The Murder Carpet

The second article was time for 19:14 UTC. When the time elapsed the following string was added to the bottom of the relevant article.

I am composed of 5.9% red, 32.2% green and 72.9% blue You can find me between the 5th and 6th knuckle.

The colour was quickly identified as Sapphire. The 5th and 6th knuckle referred to the 1st and 2nd knuckle of the right hand (5th and 6th when both hands are together). This translates to September when using knuckles to count months. As confirmation, Sapphire is also the birth stone of September.

Article 3 - Blood Moon: A Heavenly Body Abused

The final article was scheduled for 21:22 UTC but was released early due to the progress of players. This new article did not contain a line at the bottom but instead an image which, when clicked on to enlarge, revealed a transparent layer with 4 symbols hidden in the image previously. These symbols were found to be numbers that were cut off half way through - 1, 7, 8 and 1.

Response from the Messenger

With this, players had a full date - 4 September 1781. This was the same date that Los Angeles was founded. A second email was sent to the provided address stating that Los Angeles was the answer (as well as the solution method), with the following response received:

Los Angeles? Yes, that's it. That's what she told me. Here, you might have more info on what she's going on about:

0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 213, 233, 266, 377, 610, 987, 1597, 2584, 4181, 6785, 7737, 10946, 17711, 28657, 46368, 75025, 121393, 196418, 317811

This was quickly identified as very similar to a Fibonacci sequence, but with additional numbers inserted - namely 213, 266 and 7737. This corresponded to a US phone number in the LA area (213-266-7737). Players who called this number heard an automated message with a modulated voice reading the following message:

Hello there, Knox
I see you've made your way through the puzzles. Well done.
You have proven trustworthy enough to meet in person next weekend.
We have some business to discuss at that time.
You better be serious about this

After updating Knox on this message, it was made clear in a tweet that he would not be available on the weekend and as such someone would need to go to Los Angeles and meet the user who has been communicating with him.

Meeting BetrayedMind1

On 2019-01-31, Knox tweeted that he had contacted BetrayedMind1 about the planned meeting in order to get more information on where it is taking place. The user refused to give this information, instead saying that "it's something you're already aware of".

The following day, after receiving no firm idea on where the meeting is to be held, Knox ran through the list of everything known so far in a tweet. Of note was that the phone number was written down in whole, rather than just referred to. When players called this number again, they found that rather than an automated message, background noise could be head from someone driving.

Finding the location

Directions (with both potential starting points) as well as the location of the Griffith Observatory.

The first message users found was at 16:33 UTC on 2019-02-01. It contained background audio from a radio station, a turn signal and then the following Sat Nav message:

Continue straight onto Hollywood Boulevard

At 17:13 UTC another player called the same number and found a different message, featuring the same background radio stations, the below Sat Nav message followed by another turn signal:

Turn right onto Berendo Street

At 18:31 UTC, a third message was found, with the same background audio as the two previous messages and a new Sat Nav line:

Turn left onto Franklin Avenue

At 20:01 UTC the fourth message was found, with the following Sat Nav direction:

Turn right onto Western Avenue

This new direction was sent to Knox, who in turn tweeted that he would contact BetrayedMind1 for more details. This resulted in nothing more as Knox followed up to say that everything had been provided to us. The only new information was the she had been repeatedly using the Dizzy Symbol emoji (💫).

Players noted that around the area where the directions stopped, a trail started which led to the Griffith Observatory. This was determined to be likely both due to the emoji containing a star and that earlier in the ARG, the planet Mars was referred to.

Knox contacted BetrayedMind1 once more to verify the location and confirmed shortly afterwards that this is the correct site.

The Briefcase

At 1900 UTC on 2019-02-02, 2 players met the contact at Griffith Observatory and received a locked briefcase with a 6 digit code. They were also told "Trust No More" before the contact left the observatory.

At the same time, Trust No More updated with a page containing 6 lines of numbers.

-07.16/-78.53/+1533/2of4
+30.80/+31.83/-1213/1of4
+36.36/+43.15/-627/3of4
+41.90/+12.49/+54/4of4
+47.08/+08.43/+1935/4of4
+50.19/+14.66/+935/1of4

Players worked to decipher the numbers however were unable to work out the solution until 2 additional hints were provided. The first linked to a list of minor planets named after people and the second linked the first co-ordinates to Cajamarca, Peru.

Players quickly worked out that each of the 6 sets of numbers corresponded to a location (latitude, longtitude) and then the third number referred to a year of death for someone significant there - specifically someone who now has a planet named after them. This resulted in the following 6 planets:

4721 Atahualpa
4416 Ramses
7208 Ashurbanipal
7117 Claudius
1128 Astrid
8740 Vaclav

After attempting to enter a code based on the digit in each number (1 of 4 in 4721 would be 4), one final hint was provided in the form of a youtube video. With the title "The Order of Death", players deduced that the order of planets would need to be rearranged in chronological order of death. The new list (and corresponding digit) was:

4416 Ramses - 4
7208 Ashurbanipal - 0
7117 Claudius - 7
8740 Vaclav - 8
4721 Atahualpa - 7
1128 Astrid - 8

The Contents

The redacted document that was found within the briefcase

The code 407878 was entered and the briefcase was successfully unlocked. Inside multiple items were found including a pen, a redacted document from Tender, a page with unusual symbols, 2 pages about scientific tests, a book on blood types, a recipe for a pancake, sunglasses, a tag that says "trustnomore.com/xxxxxxx" and a notebook.

The recipe was found to contain peculiar capitalisation throughout, with the capital letters spelling PUVZREN.

When appending PUVZREN to the trust-no-more.com URL, a password protected page was found.

The unusual symbols were identified as Moon type, with the text reading whistleblower. When entered into the password box on the Trust No More page already, found a new leaked image was discovered.

The censored Tender document was a memo from CTO Jobe Preston to CEO Malcolm Chandler, discussed something known as the "Regent [censored]", which only "a very few elite clients will have access to" and "allows access to the biometric readings of other users". It also mentions this is a secret to most within Tender itself, with only a small number of employees aware of it.

Additionally, two handwritten notes from someone presumably working at Tender were found. The first detailed research into behavioural tests on rodents and pigeons:

 - Skinner Box technique. How are brains of rodents similar to primates? How are they different? Adjustments?

 - Behavior stream. See work by Barker, Kreider, Peissig, Sokoff, Stansfield.

 - Different results between rats and pigeons.

 - Operant conditioning paradigm. Can be used to make dependent behavior. A marketing firm's wet dream. But it can be used to purposefully enforce positive behavior and goals.

 - Differences between discriminative stimulus, operant response, and a reinforcer.

 - Gamification. Turning life into achievable goals. Driving one forward.

 - Where is this harmful? How can this be made helpful?

The second detailed how this individual's research has been used for the "Regent Dashboard" as well as some of the effects:

 - What's the Regent Dashboard? They apparently had Mitchell Kent, Izabel Russo, and maybe even Carter working on it. Can't get ahold of them, even by proxy.

 - They twisted my algorithms for what? What is the endgame here?

 - Definitely heightened dependency.

 - Biometric readings?

 - Weird. The conditioning reminds me of the effects of the Toxoplasma parasite on rodents. Doesn't completely change them. Doesn't make them suicidal exactly. Just a subtle shift. Less afraid of open spaces. Inhibited risk judgement. Willingness to step into danger. Behavior that makes them easier to catch for predators

 - Jobe still refuses to answer

Accessing Tender Beta

On 2019-02-05, Tender started to open it's Beta to other users, giving players their first opportunity to log-in and use the website. In order to access the beta immediately and skip the long queue, a series of unique codes could be used.

Promo Codes

The existence of the promo codes was first discovered when Knox tweeted that he had a received a random code from Tender - 4F61 - and asked the community about it. After entering this into the Tender website it was confirmed this was one of the four codes required.

The second code to be discovered was within the following email sent specifically to one player:

Congratulations, you have been selected for an exclusive unique code. Use the community to find them all!

Your code: 897E

The third code was found through a new Trust No More article posted by Manchuria (the Tender insider). At the bottom of the article is the struckthrough code 915E.

The fourth and final required code was discovered after calling the phone number used for the Los Angeles meeting. After calling, the following message is heard:

Dear Beta Tester. It is an honour to welcome you...45A9...complete. Good night and good luck

With this, players had all four of the following codes (ordered according to the numbering on Tender's website):

Code #1: 897E
Code #2: 4F61
Code #3: 45A9
Code #4: 915E

Of note is that on the same page asking for the Promo Codes, Tender advised there were 5 codes to find and enter, however only 4 code fields to fill in. At the time of finding the fourth code, it was unknown whether this was a mistake or if there is a fifth code somewhere.

The Tender App

After players entered the four promo codes the option to sign up for Tender was made available. Shortly afterwards the need to enter the promo codes was removed, marking the start of the open beta for Tender.

While the process to sign up for Tender is much like any other site, there are a few noticeable differences including:

  • Users must select their blood type
  • Users select their interests which include both innocuous ones (dogs, movies, music) and more unusual ones (thanatology, murderers, Illuminati)
  • Users are asked how they feel, selecting between Hysterical, Sad, Angry or Numb
  • Users select a photo to represent them most: the choices include Samara from The Ring, a blood splatter, mealworms and a Clown.
  • Users rate how lonely they are on a scale of 1 to 10

Once complete, users are given an automatically generated profile summary based on their selection. The choice of usernames available are also determined by the previous choices.

Once signed up, the user is greeted with their first quest - Welcome to Tender. This video welcomes the user to Tender and says that there will be more quests with availability of them depending on the emotional profile of the user:

Dear Beta Tester - it is an honour to welcome you.

In the upcoming weeks, we'll gradually bring other members like you to join our platform and experiment the Tender universe.

For this first week, a few exclusive members have been invited to test basic features. Take the time to create your account and profile, and explore the platform.

We have 2 or 3 quests for you to complete, depending on your profile and emotional states - you can access them on your Tender home screen.

During the next 6 to 8 weeks, we will keep adding various missions and challenges in your account. The more your progress, the more chances you'll have to find your ultimate soulmate, so keep coming back.

Once this quest is complete, players are given several more to choose from. So far, these appear to be split into three categories:

  • Green quests represent an Activity Status. These ask the user for more data, such as how they are feeling or what they did yesterday
  • Red quests represent an Emotional Activity. These are challenges, acting as small puzzles for the user to work on
  • Blue options (not strictly quests) allow users to see other profiles near them and offers the chance to respond or like a profile

Initially, only one Emotional Activity is available - The quest of emotions.... The video asked users to learn about the Robert Plutchik wheel of emotions by listing 7 of the 8 emotions in the wheel, with the final one left for users to find and enter as the answer.

Some of the tasks we will ask you to do involve searching for knowledge, going deep into your soul, or expanding your horizons.

Today, we want you to learn more about emotion, namely the Robert Plutchik wheel of emotions - a fundamental work in psychology. Plutchik's research involves the study of suicide, violence and psychotherapy process. He considers there to be 8 primary emotions: anger, fear, sadness, disgust, surprise, anticipation, and joy.

We left out one emotion from that list. Use your research skills on the web to find out what emotion is missing. It is one fundamental emotion in the Tender world.

When you've found it, enter the answer in the box below.

After researching online, players found the answer to this activity to be Trust

A full list of quests found within Tender can be viewed at Tender/List of Tender Quests

Welcome Email

One of the frames from the Tender YouTube video

On 2019-02-08, players who had already signed up to Tender received an email welcoming them to the site. The text in the email itself mainly reiterated what was already known at this point, however a YouTube video was linked in the email.

At the very beginning of this video, three separate frames can be seen to spell out THIS IS BAIT.

Also of note is that at the very bottom of the email, the text "MAILID//3ej26jqf" can be seen with a link. This leads to a previously discovered Trust No More article exposing the activities of Tender and highlighting the existence of Project Chimera.

First Direct Message

On 2019-02-09, Tender users received an email notice about a direct message. Said email has a tendency to land in one's spam folder.

 Hi!

User BetrayedMind1 sent you a direct message!
“<error user permissions missing>Pl4Eas1e le@1ave now. Don’t t5rust Tend#er.“ 

The message ID is MAILID//nReWdFFq. This string leads to a Pastebin URL.