Free the Cloneables!
It appears our systems have been breached! An unknown antagonist has broken in to our systems and discovered the location of our conference. Their aim is to use their advanced technology to clone as many of our developers as they can, to harvest their KENNIS after the event. What to do now?!?
There is hope, however. Due to a technical glitch in their pipeline, the automated selection system they use turned out to be almost unusable on our planet when their team secretly landed last week. They have resorted to the local convention of paper based obfuscation encryption to be able to communicate amongst themselves about who to clone. The uplink to the selection system however, is still active.
We have discovered a loophole. Combinations of their data with our own have been found to automatically disqualify candidates for cloning. We can all free ourselves this way! There are rumours, however, of a secret operative called PEER who will soon reset the connection, so be quick about it…
- You must find at least three sets of clones on the premises. The original of a clone is called a progenitor.
- We don’t understand their language, but some of the information we should be able to crack.
- Not all clones can be combined into valid combinations. You will need to find out which clones belong together to find a valid combination…
- We have discovered that the IDs of their clones (and their progenitors) are encoded in plain numbers, although encrypted poorly in an ancient format. Keep in mind that clones are always created after their progenitors.
- Combine the IDs of the clone sets in the right order. Add your own clone ID to that combination and unlock your clone scheduling.
- Hand in your solution (look for the CREW members with a solution pouch) as soon as possible before the connection to the system breaks (or before PEER finds out we’re on to them)!
May the source be with you!