word game solvers

Laugh Like A Hyena As You Win Every Game

Unscramble Words & Solve Ciphers

Hanging Hyena

Sorta Secure Comm For Ingress & Video Games


Secret Message:

Message After Processing

Using The "Sorta Secure Comm" Tool

Shhh! No Talking on Comms!

As many experienced Ingress players are aware, messages sent on faction comm can be easily monitored by the other side using alt accounts. Most ingress groups have solved this by setting up their own G+ communities and using Hangouts (or other apps) for their internal communications. Which works great...when you know someone already...

But what if you're reaching out to someone outside your group? You usually *have* to use faction comm for the initial communication and share email or a social media profile, with someone you don't know and trust (and the rest of the area listening in). Then you need to add them to Hangouts, wait for them to respond, etc...

Thus...we present "Sorta Secure comm". While not as secure as Google Hangouts, it gives you the ability to quickly pass an encrypted message to a player you don't know or fully trust, without forking over your social profile information.

To use the tool, ask the other player to google "sorta secure comm" and identify a shared secret the two of you can use as a password. This can be something you identify after meeting in the real world ("portal I first met you") or passed via a direct PM sent from over the ocean ("@otherplayer google sorta secure comm, use password:horse battery staple"). Once you've got a common key for messages, enter that key and the message into the tool and pass the message through comm. The message can include letters and numbers; any punctuation will be dropped.

Potential Applications:

  • Asking unknown remote players for help (kill portals, clear links, make blocks).
  • Passing short confidential messages (social profiles, other information)
  • Communicating with potential defectors.

Technical Notes: For best results, we recommend using long key-phrases and short messages. It's easier for agents in the field to transcribe and harder for a cryptographer to break. For example, a key phrase of "tonightwetakeovertheworld" and a message of "clear abbeville links" should be fairly secure. Of course, if you send a few hundred characters of ciphertext using the same key, an enemy cryptographer has a better chance of cracking the code. For short term recreational use only; don't use this to pass deep dark secrets or engage in real-world nefarious activity. The underlying cryptography used here is relatively simple and is not designed to withstand attack from a trained analyst armed with a couple of big computers...

Website is copyright © 2013 Performance Ingenuity LLC.
Please send all feedback, complaints, and lucrative sponsorship deals to admin@hanginghyena.com. We like cookies and use them on the site, per our Privacy Policy.