What type of Cipher is this? (Key of Skeleton, Steven Wilson’s Hand. Cannot. Erase.)

What type of Cipher is this? (Key of Skeleton, Steven Wilson’s Hand. Cannot. Erase.)

I’m not asking for a solution to this but I was wondering if anyone knows what type of cipher this is? It has been proposed that this is similar to a Mexican Cipher Wheel, but anything other thoughts?

This comes from Steven Wilson’s album Hand. Cannot. Erase. (2015). It is a concept album loosely based on the story of Joyce Carol Vincent. In Steven’s concept, it is about a woman wanting to disappear yet living in a big city. The last track titled Ascendant Here On… alludes to the woman obtaining what she desires, to be erased. What this means no one knows, yet.

In an interview with Steven concerning numbers he recorded and buried in two tracks, Home Invasion/Regret #9 and Ancestral, of the album, he said:

I recorded myself the numbers of “Home invasion” and “Ancestral” , and they are part of a puzzle that is hidden in “Hand. Cannot. Erase.” (2015), with which you can discover what happens to the character, if you have the special edition. But I think nobody solved it yet, because it’s very hidden.

Prior to the release of the album, an online blog that was published and updated as if by the main character of the album. It details her ethos, pathos, and logos and chronicles strange events in her life including mysterious encounters with the “visitors”. It is these visitors who supposedly give her the Key of Skeleton which can be found in the special edition Steven mentioned. It is the Key of Skeleton and the numbers recorded on those two songs that have the solution to the woman’s disappearance.

For more information you can check out this video or this discord. Any other thoughts, suggestions, or insights (solutions welcome) would be appreciated. Thanks!

Key of Skeleton, Steven Wilson’s Hand. Cannot. Erase.

submitted by /u/brbird7
[link] [comments]

top scoring links : crypto
Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited the classical example of encrypting messages so that only the key-holder can read it. Cryptography lives at an intersection of math, programming, and computer science. This subreddit covers the theory and practice of modern and *strong* cryptography, and it is a technical subreddit focused on the algorithms and implementations of cryptography.

Related posts

Leave a Comment