ARRS terminal

 (Automated Radio Relay Service) is a webpage made by the developers of Escape from Tarkov for the release of the game.

Description
This a webpage appearing like a terminal. The inscription "Automated Radio Relay Service" and "NODE 14-4 KORD" can be seen. For the moment the terminal doesn't respond anything when you try to interact with the little box at the bottom. It is probable it will be reactivated later.



The name "ARRS" can also be seen on a screenshot published by the developers about the Hideout.





The ARRS terminal was connected to riddles also made by the developers of Battlestate Games. The riddles were connected to pieces of the lore of the game and the ones who achieved to get to the end of the riddle earned key for the game.

Part 1: "KNOWTHETRUTH9_TMRCD"
"Escape From Tarkov" posted this message on VKontakt in 2015 :

KNOWTHETRUTH9_TMRCD

CRRNT_STATUS

QRCODE:::UNSOLVED

TIMERCODE:::UNSOLVED

BINARYCODECOMPLEX:::UNSOLVED

 ## UNKNOWN##:::UNSOLVED

HINTS CONCEALED : 4

HINTS CONCEALED : 2

Step 1 : "QRCODE"
When you click on "tell me more" button, the following QR Code appear : After scanning it show " vjku ku pqv eyuc" which is a Ceasar Code with a shift of 3 :

this is not cswa

"cswa" is actually a reference to "Contract Wars", a game from Absuloft in which some devellopers of Battlestate Games worked.

Step 2 : "TIMERCODE"
In 2015 a mysterious site has been discovered. It is : http://www.countdowntoreveal.com/

A light with a countdown can be seen. Also a code can be seen on the page and found in the code source of the page. The code is : "N5TYJJETNWRXJ6KBNAYYFJEGPOSXD4EG" and on 7 October 2015, "Escape From Tarkov" posted this image on Facebook : The text contain a clue to decipher the code. The clue is "CD_CES25_B32". "CES25" indicate to decrypt the code with a Ceasar Code with a shift of 25

M5SXIIDSMVQWI6JAMZXXEIDFONRWC4DF

Then "B32" indicate to decode the obtained "text" from BASE 32 to Text.

get ready for escape

On 8 October 2015 this image was posted : it represent the following of the previous image. Three files are clearly are attached to the message : an audio and two files of unknown type

Step1 : "BINARYCODECOMPLEX"
The source code of the page contain a binary code or can be found if you click ten times on the little bulb.

01001011 01001001 01011010 01010100 01000101 01010111 01010011 00110010 01001100 01000010 01001011 01010110 01001111 01010100 01000011 01001010 01001010 01001010 01000010 01000110 01000011 01010101 01000011 01010110 01000111 01011010 01000101 01010101 01010001 01010100 01000011 01000010 01001011 01001010 01000001 01010110 01001011 01010101 00110010 01001110 01001011 01001110 01001001 01000110 01001111 01010111 01010011 01001011 01001011 01010010 01001001 01010101 01001001 01010101 01000011 01001011 01001011 00110101 01001001 01010100 01000111 01010110 00110010 01000100 01001001 01001110 01001010 01000101 00110100 01010110 00110010 01001100 01001010 00110101 01001011 01000101 01000111 01010101 01000011 00110010 01001001 00110101 01001100 01010101 00110110 01001101 01010011 01010101 01001011 01000110 01000010 01010101 01010101 01010110 00110010 01011000 01001011 01000110 01001001 01000101 01010101 01010110 00110010 01000100 01001011 01001010 01001000 01000110 01001111 01010111 01001011 01010000 01001011 01010010 01000011 01010101 01001001 01010111 01010011 01001000 01001011 00110101 01000110 01010100 01000101 01010110 01000011 01010010 01001001 01001110 01001001 01000101 00110010 01010110 00110010 01010010 01000111 01001110 01001011 01000110 01001011 01010001 00110010 01010011 01001010 01011010 01000010 01010110 01001011 01010100 00110010 01010101 01001001 01001110 01000011 01010110 01000101 01010010 00110010 01011000 01001011 01000010 01000110 01000110 01001001 01010101 01001011 01000101 01001011 01000010 01000110 01000110 01001111 01010101 01001010 01010011 01001010 01001010 01001101 01010101 01000111 01010101 01010011 01001011 01001100 01000010 01001011 01010101 00110110 01010110 01000011 01011000 01001001 01010010 01001110 01000101 01001111 01010110 00110010 01010000 01001011 01000010 01001011 01000110 01000011 01010010 01000011 01001001 01001010 01001010 01001100 01010110 01000011 01001101 00110010 01010101 01001011 01001110 01000010 01010110 01000101 01010100 01010011 01000100 01001011 01010110 01001000 01010110 01001001 01010001 01001011 01000101 01001011 01000010 01000100 01010110 01001111 01010111 01010011 01001010 01001010 01001010 01001001 01010101 01001001 01010011 01010011 01010110 01001011 00110101 01001001 01010100 01000111 01010011 01010011 01010010 01001001 01001110 01001010 01000101 01010101 01010110 00110010 01000100 01001001 00110101 01001001 01010001

The Binary Code decryption lead to this BASE 32 Code.

KIZTEWS2LBKVOTCJJJBFCUCVGZEUQTCBKJAVKU2NKNIFOWSKKRIUIUCKK5ITGV2DINJE4V2LJ5KEGUC2I5LU6MSUKFBUUV2XKFIEUV2DKJHFOWKPKRCUIWSHK5FTE

VCRINIE2V2RGNKFKQ2SJZBVKT2UINCVER2XKBFFIUKEKBFFOUJSJJMUGU SKLBKU6VCXIRNEOV2PKBKFCRCIJJLVCM2UKNBVETSDKVHVIQKEKBDVOWSJJJIUISSVK5

ITGSSRINJEUV2DI5IQ

An image posted on 8 October 2015 help to decode this binary code. "(...) with his 32 troops. With a thought in his mind, he took 10 steps, enough to make light shine brighter. Then he looked again at his 32 man(...)" is actually a hint telling that we must use the BASE32 code.

R32ZZXUWLIJBQPU6IHLARAUSMSPWZJTQDPJWQ3WCCRNWKOTCPZGWO2TQCJWWQPJWCRNWYOTEDZGWK2TQCPMWQ3TUCRNCUOTCERGWPJTQDPJWQ2JYCRJXU

OTWDZGWOPTQDHJWQ3TSCRNCUOTADPGWZIJQDJUWQ3JQCRJWCGQ

Then use a Ceasar Code with a shift of 10.

B32JJHEGVSTLAZE6SRVKBKECWCZGJTDANZTGA3GMMBXGUYDMZJQGY2DAMTGGAZ

TGMBXGIYDONJQGU2DAMZWGA3DEMBXMEYDMOBQGZTDANZTGA2TIMBTHEYDGNJQGYZD

ANRTGA3DCMBXMEYDKNZQGJSTANTEGA3TAMBTGMQA

The first three charachters "B32" indicate that it is a the other part is BASE32 code.

JNCVSX2OJ5PTAXY2f07306f07506e06402f03307207505403606207a06806f07305403903506206306107a05702e06d070033

The first part is in BASE32.

JNCVSX2OJ5PTAXY→KEY_NO_0_

This is a clue that indicate to remove all the three characters a zero from the second part of the previous code.

2f07306f07506e06402f03307207505403606207a06806f07305403903506206306107a05702e06d070033

This is ASCII characters coded in hexadecimal.

/sound/3ruT6bzhosT95bcazW.mp3

This link to the site containing a MP3 file which is itself containing a Morse Code. http://countdowntoreveal.com/sound/3ruT6bzhosT95bcazW.mp3

Step 1 : "LOOK IN THE DARK"
On 9 October this image was uploaded on the Facebook Page of "Escape From Tarkov". We can read " Look in the dark " on it.

On 10 October 2015 this Image was uploaded on Facebook with the inscription : "MRC_HINT UPLOADED". This image is actually an image of a computer the Wikipedia page of alpha bending. Alpha bending is linked to the transparency of an image and this is a hint for the next image.

When the transparency of the previous image is augmented we can see the insription "S__R". It can be filled with a "P" and "Q" to obtain "SPQR" the initialism of the phrase linked to the ancien Roman Republic.

This is a link to the site : http://www.countdowntoreveal.com/spqr/

We can read the following text.

...There is YzM4 eyes out there, 38 to be ZXJyb, who 3JfbG make an error 9nLn in a while, i R4dA== judge them...

It contain a BASE64 code :

It lead to this "log" on this site : http://www.countdowntoreveal.com/cam38/c38error_log.txt

Cam 38 Log
################################################

12:42:13:00,003 From server Observer14-4

12:42:14:00,033 ERROR @#0: Ins#$@icient system res@#$rces exist to complete the requested service.

12:42:35:00,203 ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

12:42:56:00,003 Operating sys##m err## 1450 In@#$$ficient system reso@@#ces exist $$ complete the r%^@@#uested se#v##e.

12:43:34:00,030 #

12:43:35:00,003 #####*#*#*@#

12:43:20:27,000 Error Code 9$%%#@0###*#*#*@#

''12:43:45:00,033 cam##:Remote system node14%#%#%##. The s##* # in an in##id state %#%#%## for #e*@*ed action''

12:43:46:00,233 L2NhbTM4L25vZGVfMTQtNF9rb3JkLnBhcnQxLnJhcg==

12:43:47:00,133 /@###*#/corrupt2.rar

12:43:48:00,233 I0AjIyNAQCMqQCMjIyojKiMqQCMjIyMqIyojKkAj

12:43:56:00,015 #@###@@#*@###*#*#*@####*#*#*@#

12:43:58:00,343 Write o# "device" failed, status = %%$50

12:43:59:10,033 ERROR 1130: Not enough server sto#age is av4$@able to ##cess this command.

12:44:11:00,205 E##OR 1130 / hex 0x46a ERROR_NOT_ENOUGH_SERVER_MEMORY

12:44:13:00,053 Back## or restore op##ation termi###ting a####ly.

12:44:16:02,233 Back## or###*#*#*@# op##ati###*#*#*@#mi###ting a####ly.

12:44:35:00,303 ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

12:44:56:00,053 Operating sys##m err## 1450 In@#$$ficient system reso@@#ces exist $$ complete the r%^@@#uested se#v##e.

12:47:38:00,073 Operating sys##m err## 1450 In@#$$ficient sys################################################

################################################

Three part are important : "L2NhbTM4L25vZGVfMTQtNF9rb3JkLnBhcnQxLnJhcg==", "I0AjIyNAQCMqQCMjIyojKiMqQCMjIyMqIyojKkAj" and "/@###*#/corrupt2.rar" The first and the second one are BASE64 codes. The first part is linked to this RAR file http://www.countdowntoreveal.com//cam38/node_14-4_kord.part1.rar

The third part is linked to this RAR file http://www.countdowntoreveal.com/cam38/corrupt2.rar

Cam 83 Log
By analogy to the first "log" another one can be found by interverting the 8 and the 3. http://www.countdowntoreveal.com/cam83/c83error_log.txt

################################################

09:17:12:00,133 ###*#*#*@# fai&*###*#*#*@# fai&*

09:17:13:02,045 g a#sted service.

09:17:14:50,553 ting s#### 1450 In@#$$ficient sys##########

09:17:16:12,423 o# "@###@@#*@###*#*#*@####*#*#*@#50

09:17:17:00,045 RVJST1JfQUNDRVNTX0RFTklFRCA1ICgweDUp

09:17:18:03,453 RVJST1JfRklMRV9OT1RfRU5DUllQVEVEIDYwMDcgKDB4MTc3Nykg

09:17:23:10,023 #####*#*#*@# fai&*@

09:17:25:00,885 ERROR_FILE_NOT_FOUND 2 (0x2)

09:17:26:06,053 k## or restore op##ation termi###tin

09:17:27:10,603 RRnough server sto#age is av4$@able to

09:17:29:00,035 ERROR @$$50: / hex #SYSTEM_RESOURCES

09:17:35:03,553 RVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUkVSUk9SRVJST1JFUlJPUg==

09:17:36:55,023 ERROR_PATH_NOT_FOUND 3 (0x3)

09:17:38:04,275 ##UNDEFIENED##

09:17:45:00,053 Key value 128 ##UNDEFIENED##

09:17:47:33,323 U2FsdGVkX18z6MR5KMT9DfGS3bP/YMBPnLkbfGNxPZgMR1817s89jBvWPb1WgRa6pP4ZJYNKTAw92hCrEzHVa3LtCK/Xt4yQIFogTBFSzcZ1aOP24BOFkJmaTYmlrHi9QWdESfji5ITIgt9JD8fmX6og9Wl8XZ29rhAIeImVPfShsLEVTswtE1vEM+IiX/xr9UvUql50r0RaN0abjbGQsQ==

09:17:48:07,035 Back## or###*#*#*@# op##ati###*#*#*@#mi###ting a####ly.

09:17:49:00,553 ERROR_PATH_NOT_FOUND 3 (0x3)

09:17:51:20,303 U2FsdGVkX18vM/BTHII1L4LTlvfkMjaB7s/84Al/y1L0hcUGGyMyeARy1TKnL90nB092FcSq2QnHcx03QrIauV6pG5oyisvxqzsJAMuD9gk=

09:17:54:00,325 ##UNDEFIENED##

09:18:15:50,553 T3BlcmF0aW5nIHN5cyMjbSBlcnIjIyAxNDUwIEluQCMkJGZpY2llbnQgc3lzIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMj

09:18:18:12,523 Key value 256 ##UNDEFIENED##

09:18:19:00,025 hoBFujy/ucmQE6rOElwIxy9aCmDRXlnFtoJ9raVHsbI=

09:18:22:03,453 RVJST1IgMTEzMDogTm90IGVub3VnaCBzZXJ2ZXIgc3RvI2FnZSBpcyBhdjQkQGFibGUgdG8gIyNjZXNzIHRoaXMgY29tbWFuZC4=

09:18:25:10,023 ZXJyb3IgYSMjZXNzIExAI0skICNETUw6SiMjICMoKSok

09:18:26:00,835 Back## or###*#*#*@##ati@#mi###ting a####ly.

09:18:28:06,053 em reso@@#ces exist $$ complete the

09:18:34:10,343 ERROR_PATH_NOT_FOUND 3 (0x3)

09:18:45:00,035 S5tem co4ion EBa###*#*#*@# op##ati###*#*#*@#mi###ting a#sted service.

09:18:55:03,353 RVJST1JfRklMRV9OT1RfRU5DUllQVEVEIDYwMDcgKDB4MTc3Nykg

09:18:57:55,033 RVJST1JfQUNDRVNTX0RFTklFRCA1ICgweDUp

09:19:18:04,675 erat@#######*#*#*@#es exist $$ complet

09:19:25:00,053 ERROR_ACCESS_DENIED 5 (0x5)

09:19:27:33,373 m co4ion EBa###*#*#*@# op##ati###

09:19:28:07,035 ERROR_FILE_NOT_FOUND 2 (0x2)

09:19:39:00,853 ERROR_N$$%SYSTEM_RESOURCES

''09:19:41:20,303 # ption 09:19:44:00,025 # c##r''

################################################

It contain 8 parts encoded with BASE64. Two others parts are more interesting

Key value 128 (...) U2FsdGVkX18z6MR5KMT9DfGS3bP/YMBPnLkbfGNxPZgMR1817s89jBvWPb1WgRa6pP4ZJYNKTAw92hCrEzHVa3LtCK/Xt4yQIFogTBFSzcZ1aOP24BOFkJmaTYmlrHi9QWdESfji5ITIgt9JD8fmX6og9Wl8XZ29rhAIeImVPfShsLEVTswtE1vEM+IiX/xr9UvUql50r0RaN0abjbGQsQ==

And

Key value 256 (...)hoBFujy/ucmQE6rOElwIxy9aCmDRXlnFtoJ9raVHsbI=

The "key value" is a link respectively to the Code AES128 and AES 256.

And the password is "1" in both case.

So the decrytion of the first part give :

ares and mars h##e s#mething in co#mon, but are p##ntless wit%%#t their r^%@# which *&@&*&($ truth for whole bunch of people %##$#@#$###

The decryption of the second part give :

ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

Cam 02 Log
Another log can be found here : http://www.countdowntoreveal.com/cam02/c02error_log.txt

################################################

12:45:13:00,003 From server LmRjbQ==

12:45:14:00,013 S5tem co4##### or###*#*#*@# op##ati###*#*#*@#mi###ting a#sted service.

12:45:15:00,213 ERROR @$$50: / hex ##5aa ERROR_N$$%SYSTEM_RESOURCES

12:45:26:00,003 Operat@###@@#*@###*#*#*@####*#*#*@#es exist $$ complete the r%^@@#uested se#v##e.

12:45:34:04,030 # c##ruption

12:46:15:00,003 #####*#*#*@# fai&*@

12:46:20:27,000 Er@###@@#*@###*#*#*@####*#*#*@#*#*#*@#

12:46:28:00,231 ERRnough server sto#age is av4$@able to ##cess this command

12:46:36:00,015 #@###@@#*@###*#*#*@####*#*#*@#

12:47:08:00,313 Write o# "@###@@#*@###*#*#*@####*#*#*@#50

12:47:09:10,033 .

12:47:11:00,205 E##OR 1130 @###@@#*@###*#*#*@####*#*#*@#R_NOT_ENOUGH_SERVER_MEMORY

12:47:13:00,053 Back## or restore op##ation termi###ting a####ly.

12:47:16:02,133 __

12:48:35:00,303 ERROR $$%SYSTEM_RESOURCES

12:48:56:00,053 Opystem reso@@#ces exist $$ complete the r%^@@#uested se#v##e.

12:48:38:40,073 Operating s#### 1450 In@#$$ficient sys################################################

12:49:13:00,243 From server LmRjbQ==

12:49:14:50,053 S5tem co4ion EBa###*#*#*@# op##ati###*#*#*@#mi###ting a#sted service.

12:49:15:06,613 ERROR @$$50: /###OR4zRESOURCES

12:49:26:00,003 Operat@#######*#*#*@#es exist $$ complete the r%^@@#uested se#v##e.

''12:49:34:04,030 # c##ruption



Step 2 : Combining the RAR files
It contain two times the same BASE32 code which decypher to ".dcm".

4 RAR files are needed to obtain an image. They have to be opened together, with WinRAR for example. The following is the obained JPEG image and it is called "4hacvH6wkbZlh53c.png". We can see the city of Tarkov, "12:43:2027" and "NODE 14-4 KORD" the same inscription as seen on the ARRS terminal page.

Part 4 : "KNOWTHETRUTH12_ALLSEEINGEYE STARTED"
On 15 October 2015 this message was posted on the VKontakt group of Escape From Tarkov with an image.

KNOWTHETRUTH12_ALLSEEINGEYE STARTED

It means that all the cameras are now online.

We can find multiple camera.

Riddle : "Intercepted Frequency"
On 27 February 2016, the user "TarkovEscaper" on Reddit, "Escape From Tarkov" on Facebook posted the same message.

''Attention! Attention!''

We've intercepted the following message

01001010 01011010 01010011 01011000 01001111 01001001 01000100 01010101 01001101 01010110 01011010 01000111 00110010 00110010 01001100 01001111 01001101 01000110 01010111 01000011 01000001 01011001 01001100 01000100 01001101 01001110 01010011 01011000 01000111 00110100 01011001 01001110 01000010 01001010 01000011 01011000 01001101 01011010 00110011 01000110 01001110 01011010 01000001 01010101 01010111 01000100 01001001 01001011 01001110 01001110 00110011 01010111 01010101 01001110 01000010 01010100 01001101 01011001 01011010 01001000 01001111

(It is a quest to get one free copy of EFT limited edition, only for one winner

You will get your prize in about 48 hours after finishing quest)"

The solution of the riddle was later posted both on Reddit and Facebook on 28 February 2016.

''One of the Tarkov mysteries solved! Congratulations to winner, who will get free digital copy of EFT Limited edition in couple days! You can try to decode the rest of codes yourself, if you still haven't, but you are not going to get any prize for that.''

For those who want to know all of the steps, here it is ''Thanks for participation! This is not last mystery of Tarkov.''
 * 1) Binary code that was announced with quest - the easiest part
 * 2) After that you get Base32 code which have login and password to ARRS terminal
 * 3) In the profile you can find 3 notes about dark deeds of Evgenue A.K. and last note have hidden ASCII85 encrypted parts
 * 4) It gives us an image, a screenshot from email of this Evgenue, which have hidden Morze code
 * 5) Morze gives us an audio file, from which we find out about new service available at /TARBANK and it also have Morze code
 * 6) You can use EvgenAK login/pass for the Tarbank page and you see that it have safe with password field
 * 7) Morze from step 5 have anogramm for "furious winds" which is login and password for ARRS and it have last bits of riddle
 * 8) Profile have 4 notes, 3 of which got parts of password to safe and the last one is the order of those notes to get password together.

Step 1 : Binary code to BASE 32
The binary code is a BASE 32.

JZSXOIDUMVZG22LOMFWCAYLDMNSXG4YNBJCXMZ3FNZAUWDIKNN3WUNBTMYZHO

Step 2 : Base 32 to Text and connection to the ARRS terminal
The Base 32 is decrypted to ASCII text and give this :

New terminal access

EvgenAK

kwj43f2w

So the username is "EvgenAK" and the password "kwj43f2w".

Then the username and the pasword must be used into the ARRS terminal.

Step 3 : Decryption of the 3 notes of the "EvgenAK" profile
You can find 3 notes on the profile page :

Note 203
DATE:: 23.08.2012 ::

Первая ч!t%(N финанcsn(@ания по плану Лесицкого прошла.

Уточнить в@)NIQj11` с по@)лением оборудования.

Присм!t%(Nться к Лесицкому. Ублюдок смы'v#.ный и с гонором. !t%(Nь на карандаш.

Note 205
DATE:: 27.08.2012 ::

5ҏ/xqQ2)I% R"C5ҏить оборудование.

У партии из-за рубежа есть нC^!)9S+EZтельные поврKNIдения.

В пvncYе s{cZ=Rьника лbR\C^!)9ории по поводу заW,"T доп. деталей отказать. Лишний раз {cZ=Ruвать на тамk'v#.Kет смысла.

DATE :: 27.08.2012 ::

Note 208
DATE:: 03.09.2012 ::

При:Jt1_9/KUE:ая группа специалистов.

Во0(4n1eq"L:Jt+икты с рабn5r:>U05krYCNо нужно реsPI0JI!^ос с /oYuNьным входом в лаборатории.

The last one contain some ASCII85 code:



After decryption it give that:

ORUGK4TPNVQW4NTTORSXA427/otzkxi000cy.pvm

The first part is encoded in BASE 32 :

theroman6steps_

The "theroman6steps" part is a clue to decipher the second part "otzkxi000cy.pvm". It refers to Ceasar Code with a shift of 6 steps. So it give

interc000ws.jpg

It give us a link a link to an image :

http://countdowntoreveal.com/interc000ws.jpg

Step 4 : Image with Morse Code
This is the obtained image :

It contain a Morse Code which is :

wlkdjsnwed.mp3

It lead to the MP3 file located here : http://countdowntoreveal.com/wlkdjsnwed.mp3

Step 5 : Audio File analysis and Morse Code
The audio file instruct about the site http://countdowntoreveal.com/tarbank (this site is unavaiable) and contain a Morse Code which is :

P_RUSIUOF_ P_NDISW_P_RUSIUOF_P_NDISW

Step 6 : Tarbank login
The use of the username "EvgenAK" and the password "kwj43f2w" is required to enter the site. Once entered a new password is required.

Step 7 : ARRS terminal login
A new username and password must be used in the ARRS termianl. They are given by the Step 5 Morse Code. It is a anagram of "Furious Winds".

P_FURIOUS_P_WINDS_FURIOUS_P_WINDS

Step 8 : Decryption of the 4 Notes of the "Furious Winds" profile
The "profile page" contain 4 notes :

Note 101
shift14_oSRlo3phoyDiKJV0PCa5APslYPU

Note 102
01110000 01100001 01110011 01110011 01110111 01101111 01110010 01100100 01110000 01100001 01110010 01110100 00001101 00001010 00110101 00111001 00111001 00110011 00110000 00111001

Note 103
33 35 30 37 31 31 34 31 20 33 34 30 36 32 31 36 32 20 33 33 36 37 33 35 36 33 20 33 34 36 36 30 35 36 30 20 30 33 32 30 35 30 36 35 20 31 35 30 33 32 30 36 37 20 31 35 30 33 31 34

Note 104
50 49 51

The first part of the note 101 "shift14" give a clue to the Ceasar Code with a shift of 14. The second part decipher to this:

cGFzc3dvcmRwYXJ0DQo5ODgzMDI

This a BASE 64 code which decipher to this :

passwordpart

988302

The note 102 is a binary code.

passwordpart

599309

The note 103 are ASCII character in Hexadecimal which give :

trapdrowssap

544743

Inverted it give :

passwordpart

347445

The note 104 contain 3 ASCII characters in hexadecimal who refers to there counterparty in Text.

50 49 51

→ "ASCII hexadecimal" to Text→

2 1 3

It give the order to assemble the 3 part and give the password "599309988302347445" to redeem the key which is already activated.

Riddle : "Strange Signal"
On 27 June 2016 Escape From Tarkov posted this message on Facebook :

We've intercepted strange signal, that translates into following text.

Y2Vhc2FyNDk0ODQ3NDY0NGNlYXNhcjQ5NDg0NzQ2NDRjZWFzYXI0OTQ4NDc0NjQ0Y2Vhc2FyNDk0ODQ3NDY0NGNlYXNhcjQ5NDg

0NzQ2NDRjZWFzYXI0OTQ4NDc0NjQ0Y2Vhc2FyNDk0ODQ3NDY0NGNlYXNhcjQ5NDg0NzQ2NDRjZWFzYXI0OTQ4NDc0NjQ0Y2Vhc2FyNDk0ODQ3NDY0NA==

Maybe it is related to the ARRS terminal

 http://countdowntoreveal.com/terminal/cmd/ 

(it is quest, to get free Limited Edition preorder)

Step 1 : BASE 64 to Text
This is a BASE64 Code which give :

ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644ceasar4948474644

ceasar4948474644The Login is "ceasar" and the password "4948474644".

After lgging in on http://countdowntoreveal.com/terminal/cmd/ 4 notes are avaiable :

Note 869
&~wGbs9i3I8[ar&|m/$z]*}A_0j,)G#1%6QwIf.

!fS|8YqhAoK;*^Yahk`Q2Hq0dyqJ>xi:_{WC6TG

G`Jc3gl_UX.X}OCQ^eM44ya"_=GPKr}w&n\l=E3

g-Ro(BXE"7BZ_X,GVP?un4E7M_%?5nB|Q4a+2xK

uzfqdoqbfqp_eqcgqzoq_2912

,9-m6^R@]77(6"aQiA$ORHecKILx:T8*{6CD33p

O\vr?N--s&zDd3|TmH6?N,D_9 #Lj$uK'!UYSqk

<*5msE{PV]5EEkU82z:=J5Se[+3}nhV*N_o&Pg|

!1ln-=gUFe;w|3)7cQM>I>-?fL`kRhS1QyXUzC\

0$H.+4A0Wqn*

||op>Bk#E%D6d6pW,Qnz`-8Ud.>-u LeP@hdigJ'EX5/;Y/WVX 1.)J!8c{43{X6_x,{

gJZ\TfQ=v3~g\WgU,u>/K^B*'y2nZ}-j`U?}n`#

v'dhH-Z~m`;U?K8{:jTFjP9w6XR'PU3/7u!2 bEr

G^uC=6on}R*mE-@wl9+g>_ dyO3s#N-b)nQ'RK:

D~M^o-?Nl{KJzN>Z@u:lmi={y@~#jvfR^5*PW=F

iUX :h/vgN`:Xa8~!xVSevL~H\En)7I

Note 870
8CmUq=9Q$=q(irTkS0P){Jb QYjt]Du]1_2!|Q:

3MsCA?g(wt;`OT'ESg

LS_0YI)PF~RP1h*rkp^zh9=T 4L]1

fkqbozbmqba_pbnrbkzb_8487

lr1\VI/Tup I-}mk*(detl

 '6uQb#0`?,Y/ni"TOf}nk]Vyfm[55"PNk^

;t46SW>VX'?#Lh}"C1Tzq|"zv~"eBdakyp1nsr1S(h^B(+Z

5Y&pRfzW8g{DfO|teePn*w

Note 871
n^.a7>1>yC)?bG_&G-B)1OE[I&U]^0|95YVY>'%

V3f~pJ[=o)#cR^*$K2JWe?I?t.k\J'986

aflwjuwhlwv_kwimwfuw_8573

y4G(4o.)'>UGSz+_^z$

R&zQ\`1LnDm{:D&Il)phEi2$8,Z?yD'*8KRVM'}ek|tg?7?'9

Wb0F"@+j)t>a)OS4neHK:1

Nu"TD^YS:[$cP}Q\A_;4o0F9u_ZWesvz/1

as>ZX|wBHZH3yWz>,

](DqZpzw^le^J4xKGxjfH-iF/XkMF%ZYOsa!mQ~f_JVq1h5BD;P3tQv$~7b\j?N+6i(iSTHKu6-

Note 872
l*bsJ>:p+F|O:ISqr:aNx8+x]

e#TZD?T>[|`HJ)U

xcitgrteits_htfjtcrt_99962

iEtl;i')^IL*gJu")^~"NQ1Oy{.

z%neJ3@9-f)g9AC97`[O-`e.Tzw

n!iZf}$GcrWX|B.h fwHn<,KA4G|,$r_[MCl"Q

Vc\C5S\|x/{:bk3

0+!u@4s[UD20/-9VJ^`

qifU$>?B9^<"ezF3ii=EmRz[7%C[(X9;A^WB

/+p\^3WJ0NLAm-Lb+^tRV#Q8X`OfuSPEvE|~Izx&[cw5(0M#sWC6$@

I'aF3LB^p#"=s>m{,p3rB\kA?RKRhE7eVYh:Zz4F* u(DoumO0RSUQ_%^zmB[AEm

PC$xx?Sg!<=:Ib{vudzg4^"&Io+@uNlGh:&|w0E+qYsua~

4/l\.?W|lRnjQ@e .SN>u%`ucB[3^U&\u}d{^^.rFB-NPMG

Step 3 : Decryption of the 4 notes
Only a part are useful. This concerned part is encoded with Ceasar Code with a certain shift. Each one is linked to a RAR archive, containing two file, an MP3 audio file and a TXT text file. The TXT file are not an exact retrancription of what is said in russian in the linked MP3 File.

uzfqdoqbfqp.txt
''=2=INTER}840=8@04.16.201ZN5%HxX Призыtmp?Инжектору, ПризD,?w` Инжектору. WCDy_)- ИG1ектор Призывнику, инжектор призыв`]6', в кpy%)SU1- Инжектор, можеш9j1!S[вать, каB при)1B?2- Инжектор Призыв}n(^Rwпринял.v5i2O танцев{iYj Что с музыкой?1- МbqGH)gпо распи4Y)ndCПо расписанию.2-/NtW)ктор призывнику, му@qa]/по расписаниюii1инял, >/};нял. ?2$p(xаю репеO;цию.Инж]2тор п>NзывникJUOQконец связи.=rE{4"!LT+pSIx7ARhdL+hAH\93>s:~"!sW$f\HOD?FRHF4}tojp7Hj~`z_YMiq;q!`S^*tk_$XaMa1c40tJu-Z:dD)L=n\w]} $>K')LpPU`kU3:^88W2Y#ouju).mC:MboU vyC5\h#185$iYn"^p`nyB2S'~GOvXBf97q5u_D`1+50MT^p4AwGG[\}xk7u~Uy(mgp#X+6%4QzI49'I80VhGk1!wEXzG&q,2^McAT'_t~E%dm-coVw(W!QCnVE%3$3,nl2th}A/C_3qF*aD7k; b))h+2]9Xgpi~)+Hl{y7MA-fF(JM0NVjS*ss9|!%z|eBUOqH$PM$4jT=Zk{~vXX{PXBT{MU*YNw$7Tам-два, y стрельб9j3_8legBUJ\4Всё, пизде\4^MDar,Bдва, Бам-)yr@,:?-R3! ПомрJOb:)5%pLCd+блядь, коробки?! – стрельба9- Осока ИнжекторXxe$6,ка Инжектору!4se=Tl)вызывай этих пидорасов. Я IvOT-O(омогу!9- Xi+Uа, Осока, блядь! отв4 Nj4a+n |fU^qEU._'b]>*b,dX\cJ+{(0upP q_|7k5T)V;3''

aflwjuwhlwv.txt
''qV5gYTE9CEPT4DhdR.16.20@Y]"c>1Помреж ДиPmgу, с{<9x&5$ирик '2(J-(е.3-}Bk/\H.4 на сX^oEng готоG{[lG9.Ilь.4- Принял. Гоsw4xF?b#5- Г4`LORnjD)<иваетсq:u^ ми]lzGнял.4-!RS+gc["q9стаNh (~/\${3- Ос:~FA'o1`е расселиMtZ]g#R`cdJrлитавры?es%6yfцене.4- Принял. Гобой, коIV@b][(!VVоей готовнh__d%[H;c?принP0a DOoslvCL принял, Дирик. Ща 2qlQ30={,kMRDy}u<7UG{rTo}CW@a7( 4a0g-}>ttju_~'g&wh>&=/0hV+:$7G?pNw$7T/oyC!8FDy$@''

xcitgrteits.txt
lUZb&9Gq6D4TED@043LuChsaR)0ZTEpZ1о7 минLp_n! x2N*(=5| 30z9_JN$oE~о нам плотно рабо\.&Pjvs2Саня, там пид]nc33d+f1 с горки OOwGz}pqь?8- не зl)uay3+(y!ю, сверху *`{}3J5, qEe`cQят.3- Трамбон-Q,@BU]vS'aеги!!!7- аz?U7Y+;} суLtizCучите!!!!AxZ[gDGyR я дирик, 9By+%Fc.-Y Отход на Edmm1^6овторяHw{2C+o0', де g4Am_7"v^ы, я подхожу…8- нихуя не}U9J,:GdHWtsа чадит….6- O+InOL0Fь и отходи, как понял?lUZb&9GqqD4TED@04.iLuChsaR)WZTEpZ_eон минLp_n! x2N*(=5| 30z9_JN$oE~о нам плотно рабо\.&Pjvs2Саня, там пид]nc33d+f1 с горки OOwGz}pqь?8- не зl)uay3+(y!ю, сверху *`{}3J5, qEe`cQят.3- Трамбон-Q,@BU]vS'aеги!!!7- аz?U7Y+;} суLtizCучите!!!!AxZ[gDGyR я дирик, 9By+%Fc.-Y Отход на Edmm1^6овторяHw{2C+o0', де g4Am_7"v^ы, я подхожу…8- нихуя не}U9J,:GdHWtsа чадит….6- O+InOL0Fь и отходи, как понял?lUZb&9GqqD4uTRe{b4[iLuChsaR)WZTEpZ_eLgz[EXLp_n! x2N*(=5|#)z9_JN$oE~""14L'[?HT':\E[G6\.&Pjvs21RVW=TQj[p=Pq]nc33d+f1|eZ!'bFnr>OOwGz}pqI6Ypk@+Sxl)uay3+(y!bOXuUu> (*`{}3J5, qEe`cQW`$A'mfQe{qaMa3Q,@BU]vS'a]<Dt.d67}Qz?U7Y+;}\n %LtizC} k.U~'CFAxZ[gDGyR=dss~

In the "uzfqdoqbfqp.txt" file we can find the word "archive" which lead to the site http://countdowntoreveal.com/archive (This is site is currently unavaible). A page with a username already completed with "ceasar" and a password can be seen.

Step 5 : Decryption of the password and Login
The numbers at the end of each RAR file are the number of space to count between the characters from the beginning of each linked TXT file. The order is given by the linked MP3 file.

Following the order the password is "24089460354063017".

The password must then be entered on the site found before : http://countdowntoreveal.com/archive/

Users
The ARRS terminal can be accessed by different users. Most of them are linked to the lore of Tarkov

Used Codes
List of used codes:
 * BASE32
 * BASE64
 * Binary Code
 * Morse Code
 * Ceasar Code
 * ACII85
 * ASCII charachters in hexadecimal
 * AES128
 * AES256

Reference
ARRS terminal site

Source of the solution for the riddle "Intercepted Frequency"

Source of the solution for the riddle "Strange Signal"

Source of the solution of the riddle "Beginning"