A rather interesting challenge has been brought to my attention, in a rather interesting way.
A cyber code challenge, no less.
Perhaps the biggest hint of just how intriguing is the “Sponsored Post” link at the bottom of this page. But I’m not allowed to tell you who has really sponsored it.
It’s not a scam, not some way to take money off you. Nor is it your everyday competition to win some gadget or other, but success could open some rather exciting opportunities.
So, take my word for it, it’s worth trying this challenge – trust me, I’m a geek. But not geek enough to crack this one, I suspect.
The history of computing is steeped in code breaking. Indeed, the first electronic programmable computer was built for code breaking, but for years nobody knew because its very existence was a secret.
The Colossus at Bletchley Park was employed during WWII to crack encrypted German messages but for years it couldn’t take its place in computing’s history books – it wasn’t until the late ‘70s that information began to emerge.
Of course, computing power has changed dramatically since then, you’ll have far more power in your mobile phone today than computers had for years. And with all that power, codes and encryption have become stronger and all the more important. Whether it’s the password on your wireless router at home or the SSL technology used when you do your online shopping, encryption is everywhere.
And while hacking has evolved, brute force attacks have to become ever more brutish, the hacker mentality has remained the same. It’s still curious, tenacious, creative thinkers that are coming up with ways to create and break these codes.
So, do you reckon you are one of these people? The link below will help you find out, a code waiting to be broken.