A Secret Code Lurking in the Library Stacks!

[Image courtesy of Wonderopolis.]

The best thing about secret codes is that they can hide in plain sight. In the past, we’ve referenced all sorts of ciphers and codes that were employed to pass secret messages across open channels.

But, as it turns out, clandestine communication isn’t the only end to which secret codes can be applied.

Recently, I stumbled upon a series of Tweets that detailed a mystery at a library involving a secret code.

[Image courtesy of Princeton.edu.]

Take it away, Georgia:

So there was a MYSTERY at the library today.

A wee old women came in and said “I’ve a question. Why does page 7 in all the books I take out have the 7 underlined in pen? It seems odd.”

“What?” I say, thinking she might be a bit off her rocker. She showed me, and they did.

I asked if she was doing it, she said she wasn’t and showed me the new book she was getting out that she hadn’t even had yet. It also had the 7 underlined! “I don’t know, maybe someone really likes page 7?” I said, assuming of course that there is a serial killer in the library.

I checked some other books. Most didn’t have it, but a lot in this genre did – they’re “wee old women” books (romances set in wartime Britain etc). Lots of underlined 7s. The woman who pointed it out shrugged and went on her way, “just thought you should know”.

[Image courtesy of MovieSteve.com.]

What could it mean? Was there a secret message spelled out somehow across the seventh page of all these books? Perhaps the seventh word? What could the message be? A warning? A threat? A great universal truth? A clue to a hidden treasure? The start of a symbol-laden journey across European with sinister forces hot on your heels?

Well, no. Calm down.

As it turns out, there wasn’t a secret message or a hunt across Europe or a threat from a diabolical library-obsessed serial killer on the loose. There was simply an elderly client with her own unique code.

Apparently, she was underlining page 7 in every book she read, in order to keep track of which books she’d already read, in case she comes across it on the shelf again.

And she’s far from the only one! Upon further research, the librarian uncovered a number of different tracking systems, many of them pre-dating the use of computers to keep library records!

Whether there’s a little star on the last page, or an F on the title page, or a page 7 underlined, each code reveals a different, dedicated reader with their own system.

When she posted this story on Twitter, other library employees and former employees piped up to share their own encounters with secret library codes that patrons employed!

I think it’s fascinating that systems like this seem to have been around as long as libraries, probably discovered (and re-discovered) periodically as different patrons and librarians alike notice them.

Better living through secret codes. Who knew?


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

A Video Game Puzzle Hunt Reaps Real-World Rewards!

We’ve written about some pretty amazing and elaborate puzzle hunts here in the past. There was the Gravity Falls cipher hunt that led to an actual statue of the show’s villain Bill Cipher in the woods of Reedsport, Oregon. (And a mayoral position for the first person to find him and shake his hand!) There was the puzzle-turned-global-scavenger hunt from Trials Evolution that won’t be completed until 2113 at the base of the Eiffel Tower.

And now, a massive crowdsourcing effort has cracked another masterpiece, a puzzle hidden in an expansion pack for the video game Destiny 2. Destiny 2 is an online first-person-shooter loaded with sci-fi trappings and in-depth storytelling where players explore a shared environment while engaging in their own personal plot and adventures.

The most recent expansion to the game, Warmind, was released last week, and players noticed an elaborate symbol on a wall in the bunker of Rasputin, a sentient robot. The symbol appeared to be a lock surrounded by keys and curious symbols.

This Kotaku post went live on Friday, three days after the Warmind release, revealing the incredible online effort already in motion to unravel the secrets of the Rasputin puzzle. The subreddit r/raidsecrets was ground zero for the puzzle-solving efforts, and players compiled their theories and discoveries there.

Players quickly determined that each of the keys had a symbol that linked back to other imagery from the game, and by following those breadcrumbs, they had a chance to crack the cipher.

The first symbol was found in several places, each time with a set of digits and a bar in a particular position. Solvers theorized that these symbols represented the word “reverse.”

The second symbol appeared beside a Braille grid, leading hunters to crates with Braille lettering on them: OEAARRTFWTH. This anagrams to The Art of War, Sun Tzu’s famous tome. In this case, The Art of War was used as the source material for an Ottendorf Cipher. (That particular cipher was made famous by Nicolas Cage’s National Treasure movies.)

This type of cipher uses numbers in groups of three, and these numbers correspond to positions of letters in a book. Most often the numbers refer to Line, Word, and Letter. Decoding the number-combinations in the image above led to the answer “Destroy all second A and B. Then destroy all third C and R.”

These two clues were assumed to be instructions for what to do with the encoded ciphertext others had discovered in the game:

This encrypted message was the heart of the puzzle. But there was more to uncover first.

As it turns out, the last three keys in the image represented different words to apply to the ciphertext in order to properly decode it.

The fourth symbol was found near a Morse Code sequence that spelled out “NTEHNMLNEEGIT,” an anagram for “Enlightenment.”

The fifth symbol pointed toward a monitor with some peculiar code on it. It turns out the code was actually Jianpu, an ancient form of Chinese notation for writing music. When translated into actual music, a player identified the piece as an excerpt from Tchaikovsky’s Swan Lake.

One intrepid codebreaker then tried to decrypt the ciphertext given the clues everyone had assembled thus far.

He reversed the ciphertext, according to the instruction of the first key. He then removed every other A and every other B from the text, then every third C and every third R, according to the instructions of the second key.

Then, employing a Vigenere cipher, he used the two key words he had — “enlightenment” and “swan lake” — to begin decrypting the text. He managed to decrypt the entire text, but more incredibly, he also reverse engineered the missing third key word — “mechanized” — while doing so.

And what was the final message, after all this?

thank you for taking the time to piece together this message, friend. the time of our final conflict is drawing closer and you and ana have an important role to play in the events to come. so watch over her, guardian. i would have no life without ana or the exoprogram. i regret that we have become strangers, but we each have a path that we must walk. and, ironically, there never seems to be enough time. tell her, rasputin’s first attempt was in the right location, but the wrong moment. look here: 43.549573, -73.544868 – e

As you might suspect, those numbers at the end are GPS coordinates, which correspond to Sleeping Beauty Mountain in upstate New York. (The company that developed Warmind, Vicarious Visions, is based in upstate New York.)

A small treasure trove of prizes awaited the brave soul who trekked out to Sleeping Beauty Mountain on Saturday morning. The centerpiece was a giant spear, a replica of a weapon from the game known as the Valkyrie.

From the Kotaku article following up on the puzzle’s resolution:

There was also a box of gold coins (along with instructions asking the finder to only take one), a set of notes, and a journal for recording visitors. The note, from Warmind design lead Rob Gallerani, encouraged the finder(s) to share photos of this discovery and told them that there are only three spears like that in existence — one at Vicarious Visions, one at Bungie, and this.

The spear, shown above (alongside the visiting team from Vicarious Visions) now resides at a comic shop called The Freakopolis Geekery.

As for the gold coins and the geocache Vicarious Visions had set up for others who make the trip, unfortunately, park rangers removed it because the designers didn’t get a permit. The coins have been returned to Vicarious Visions, who are currently reaching out to all the folks at r/raidsecrets who contributed to the solution of the puzzle, hoping to get them the coins they so richly deserve.

And, as if all that wasn’t amazing enough, it turns out… this might not be the end of the adventure.

Because a sharp-eyed observer noticed some text embossed on the upper portion of the replica Valkyrie spear:

At the moment, no one knows what the letters mean. But if I had to wager, I’d say the master puzzle solvers at r/raidsecrets should keep digging. Who knows what they’ll find next?


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Elizebeth Smith Friedman, Codebreaker and Scourge of Nazi Spymasters

[William and Elizebeth Smith Friedman, hard at work.
Image courtesy of National Geographic.]

Last year, I rather ambitiously attempted to summarize the early history of American codebreaking and the NSA in a series of blog posts spanning World War II through the modern day. One of the names I cited in that series, William Friedman, is synonymous with American cryptography, thanks to his contributions to the cracking of the German ENIGMA code and his efforts to establish the National Security Agency.

Unfortunately, there is a gaping hole in the narrative I constructed. Because none of my sources made any reference to another crucial Friedman: Elizebeth Smith Friedman, William’s wife and partner in code-cracking.

Yes, she was name-dropped in my post about the book Code Girls: The Untold Story of the American Women Code Breakers of World War II, but she had to share those pages with a host of underappreciated women who were codebreaking geniuses.

[Image courtesy of HarperCollins Publishers.]

As The Woman Who Smashed Codes explains, she wasn’t just a talented codebreaker. She literally wrote the book on it. Eight of them, in fact. The Riverbank Publications — although often credited to her husband — covered new codebreaking techniques in rich detail, and they are still referred to today as part of the foundation of modern cryptography.

She also started the first and only American codebreaking unit ever run by a woman, serving as Cryptanalyst-in-Charge while jointly working for both the Treasury and the Coast Guard during and after World War II.

A history of American codebreaking without Elizebeth Smith Friedman is woefully incomplete, and in today’s post, I hope to rectify that oversight.

[Image courtesy of the Marshall Foundation.]

Elizebeth’s work with codes started in a most peculiar way. While seeking a job as a librarian after college, she was recruited by eccentric millionaire George Fabyan to live and work at Riverbank, his palatial estate that doubled as a self-funded research center for all sorts of scientific endeavors.

Elizebeth’s deep knowledge of Shakespeare was put to work attempting to prove Fabyan’s theory that there were secret messages encoded in the writings of Shakespeare. Although her work failed to uncover any hidden pattern in Shakespeare’s words or font choices, it did lead to two unexpected developments: a career in codebreaking and a budding romance with fellow Riverbank recruit William Friedman, whose own interest in codebreaking was sparked by the works of Edgar Allan Poe.

Thanks to the proliferation of radio, there was a seismic shift in how information was being passed between military units, governments, and other organizations, so the ability to listen in on one’s enemies (and allies) was not only a new strategic opportunity, but it was a relatively new science.

In short, America needed codebreakers who could crack the secret messages being transmitted (and intercepted). The military didn’t have them. The government didn’t have them.

But Riverbank did. And for the first eight months of World War I, the small group of William, Elizebeth, and those they trained handled ALL of the codebreaking for every part of the US government, from the State Department to the Army to the DOJ. William and Elizebeth began running a codebreaking school out of Riverbank, even embedding a secret message in a photo of the class taken on the last day of the course.

[Images courtesy of Elonka.com.]

In the aftermath of the First World War, codebreaking had become so important that countries were turning to machines to help develop uncrackable codes. And yet, at this point, American cryptography as a whole consisted of about 50 people. William went to work for the government, establishing the American version of Bletchley Park — Arlington Hall — and setting the stage for the creation of the NSA.

Elizebeth, on the other hand, cracked codes from home. And she did so for both the Treasury Department and the Coast Guard, who would send her sealed packages of intercepted encrypted intel and communications. In her first three months hunting down rum-runners during Prohibition, she solved two years’ worth of backlogged messages.

During World War II, Elizebeth’s Coast Guard Cryptography Unit turned their attention from smuggling (which waned during wartime) to cracking German codes. Under her tutelage, they would crack three different variations on the Enigma codes, each more complex than the last. (The British also cracked ENIGMA, independently of American efforts.)

Sadly, in the aftermath of the Pearl Harbor attack, the US military didn’t want civilians in charge of sensitive operations, so Elizebeth was demoted. Yes, she was no longer in charge of the group she started, trained, and cultivated, instead answering to a new boss of dubious cryptographic talents.

(Of course, the sexist dimwits making decisions like this had to grin and bear it when numerous other organizations and agencies continued to asked for Elizebeth’s assistance by name.)

And stealing Elizebeth’s credit was practically a cottage industry over at the FBI. We have them to thank for erasing Elizebeth’s role in particular — and the Coast Guard’s role in general — in hunting down, exposing, and compromising Nazi spy networks in South America, even though the FBI’s hamfisted blundering actually served to expose codebreaking operations in the past, forcing Elizebeth to crack new codes in order to regain the advantage the FBI had squandered.

Oh, yeah, did I mention that both during AND after World War II, Elizebeth continued to hound the Nazi forces in South America who sought to destabilize the region?

As one historian put it, referring to the thousands of pages of decryptions Elizebeth produced:

These pieces of paper saved lives. They almost certainly stopped coups. They put fascist spies in prison. They drove wedges between Germany and other nations that were trying to sustain and prolong Nazi terror. By any measure, Elizebeth was a great heroine of the Second World War.

The British knew it. The navy knew it. The FBI knew it. But the American public never did, because Elizebeth wasn’t allowed to speak.

[Image courtesy of Find a Grave.]

Even in their retirement, the Friedmans continued to contribute to the world of cryptography. They returned to the subject of Shakespeare with The Shakespeare Ciphers Examined, thoroughly debunking the whole idea of hidden codes in the Bard’s works.

When William died, Elizebeth even hid a secret message on his tombstone, for those who knew how to look. (It was Bacon’s cipher, something they both studied extensively during their time at Riverbank.) What a touching tribute to how she met her partner and husband.

And although the accolades and appreciation for Elizebeth’s incredible contributions have been slow in coming, they are trickling in. In the 1990s, the NSA renamed its auditorium from the William F. Friedman Memorial Auditorium to the William F. Friedman and Elizebeth S. Friedman Memorial Auditorium. A Justice Department building also has an auditorium bearing her name.

More information about the massive expansion of codebreaking worldwide is coming to light with every passing year. Hopefully that will mean greater attention for minds like Elizebeth, who used her puzzly mind to protect the world. That’s someone worth celebrating.

[Much of the information in this post comes from a wonderful book on Elizebeth, The Woman Who Smashed Codes by Jason Fagone, and it’s well-worth your time to check out her story in full.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The Puzzly Legacy of Edgar Allan Poe

[Image courtesy of the Poetry Foundation.]

Edgar Allan Poe is one of the most influential writers in all of American literature. Not only did he come to epitomize all things ghastly and unnerving in Gothic horror with chillers like “The Tell-Tale Heart” and “The Cask of Amontillado,” but he also trailblazed the detective fiction genre with his character C. Auguste Dupin.

He also made an impact on the world of puzzles.

[Image courtesy of the National Cryptologic Museum Foundation.]

Those familiar with Poe’s works of fiction probably think I’m referring to his story “The Gold-Bug,” one of, if not the first, stories to not only mention cryptography, but to include a substitution cipher (a cipher where each letter in the alphabet is represented by a different letter, number, or symbol).

In “The Gold-Bug,” an unnamed narrator meets the unusual William Legrand, a man obsessed with restoring his family’s lost fortune. Legrand shows off a large scarab-like insect, the titular gold bug. A month later, the narrator and Legrand are reunited when the obsessed Legrand (along with his servant Jupiter) goes off on a expedition to discover the location of the buried treasure of the legendary Captain Kidd.

As it turns out, a piece of paper Jupiter used to collect the gold bug had traces of invisible ink on it, revealing a cipher containing instructions for how to find Kidd’s gold.

[Image courtesy of Bookriot.]

But this was far from Poe’s only dalliance with codebreaking. In fact, he helped popularize the art and science of cryptography with a series of articles in a Philadelphia publication called Alexander’s Weekly Messenger.

In December of 1839, he laid out a challenge to his readers, boasting that he could crack any substitution cipher that readers submitted:

It would be by no means a labor lost to show how great a degree of rigid method enters into enigma-guessing. This may sound oddly; but it is not more strange than the well know fact that rules really exist, by means of which it is easy to decipher any species of hieroglyphical writing — that is to say writing where, in place of alphabetical letters, any kind of marks are made use of at random. For example, in place of A put % or any other arbitrary character –in place of B, a *, etc., etc.

Let an entire alphabet be made in this manner, and then let this alphabet be used in any piece of writing. This writing can be read by means of a proper method. Let this be put to the test. Let any one address us a letter in this way, and we pledge ourselves to read it forthwith–however unusual or arbitrary may be the characters employed.

For the next six months, Poe tackled every cipher sent to Alexander’s. According to Poe, he received around a hundred ciphers, though historians have stated that only 36 distinct ciphers appeared in Alexander’s Weekly Messenger, 15 of which had solutions or partial solutions printed.

Nonetheless, it’s believed that Poe solved each of those 36 ciphers.

[Image courtesy of Awesome Stories.]

He followed up this impressive feat with an essay about cryptography in July of 1841 for Graham’s Magazine, “A Few Words on Secret Writing,” in which he discussed ancient methods of encryption and decryption, name-dropping codebreaking icons like Trithemius, Vigenere, and others.

He also published two cryptograms for the readers to solve, both submitted by a man named W.B. Tyler, “a gentleman whose abilities we highly respect.” Poe claimed he didn’t have time to solve either cryptogram, leaving them to the readers to crack. (Naturally, some scholars theorize that W.B. Tyler was none other than Poe himself.)

It would be over a century before the first verifiable solution to a W.B. Tyler cryptogram appeared. Professor Terence Whalen published his solution to the first Tyler cryptogram in 1992, and even offered a $2500 prize to whomever could solve the remaining Tyler cryptogram.

[Image courtesy of Cryptiana.web.]

That prize was claimed 8 years later by a Canadian software expert named Gil Broza, who cracked what turned out to be a polyalphabetic cipher, one in which several substitution alphabets are used.

Naturally, Poe’s interest in secret messages and codebreaking has led some to suspect that secret messages are lurking in his poetry and works of fiction. (Similar conspiracy theories abound regarding the works of Shakespeare.)

To be fair, there is something to this theory.

In a manner similar to Lewis Carroll hiding Alice Liddell’s name in an acrostic poem at the end of Through the Looking-Glass, Poe dedicated a poem to friend and poet Sarah Anna Lewis by hiding her name, one letter per line, in the poem itself.

[Image courtesy of The Baltimore Post Examiner.]

Of course, Poe’s method was more intricate than Carroll’s. The S in Sarah was the first letter on the first line, the A was the second letter on the second line, the R was the third letter on the third line, and so on. (Hiding coded messages in plain sight in this manner is known as steganography.)

And to this day, the hunt is on for secret messages in Poe’s works, particularly his more esoteric and oddly worded pieces. For instance, his prose poem “Eureka” — a musing on the nature of the universe itself, which actually proposed a Big Bang-like theory for the birth of the universe well before scientists offered the same theory — is believed to contain some sort of secret message or code.

Poe stated on more than one occasion that “human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.” So if there is a code lurking in his works, someone will surely find it.

And in the meantime, we can still enjoy the chills, the grand ideas, and the mysteries he left behind. That’s quite a puzzly legacy.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The Voynich Manuscript: Finally Cracked?

[Image courtesy of BBC.com.]

A year and a half ago, I introduced my fellow puzzlers and PuzzleNationers to the Voynich Manuscript, a cryptologic curiosity unlike anything else we’ve seen before. Discovered over a hundred years ago but believed to date back to the fifteenth century, the Voynich Manuscript is a hand-written book that has baffled linguists and puzzlers for decades.

The writing, which reads from right to left, has yet to be identified. It’s unclear if this is some sort of sophisticated code, an unknown or lost language which was then encoded, an invented language, an example of glossolalia (a written equivalent of speaking in tongues), or simply an elaborate hoax.

The only known copy of the text resides in Yale University’s Beinecke Rare Book and Manuscript Library, although Yale has printed replica texts.

From the Yale University website:

Many call the fifteenth-century codex, commonly known as the “Voynich Manuscript,” the world’s most mysterious book. Written in an unknown script by an unknown author, the manuscript has no clearer purpose now than when it was rediscovered in 1912 by rare books dealer Wilfrid Voynich. The manuscript appears and disappears throughout history, from the library of the Holy Roman Emperor Rudolf II to a secret sale of books in 1903 by the Society of Jesus in Rome. The book’s language has eluded decipherment, and its elaborate illustrations remain as baffling as they are beautiful.

[One of several fold-out pages in the manuscript.
Image courtesy of Wikipedia.org.]

But computer scientists at the University of Alberta believe they’ve finally unraveled some of the mysteries behind the Voynich Manuscript.

They designed an artificial intelligence program with the intent of figuring out the language in the manuscript. The AI analyzed versions of the UN’s Universal Declaration of Human Rights in 400 different languages in order to establish different linguistic patterns to compare against the text of the Voynich Manuscript.

And according to the AI, the text was most likely written in Hebrew.

Now that they had a language to work with, they needed to begin deciphering precisely how that language was encrypted.

[Image courtesy of Wikipedia.org.]

There have been many theories regarding what form of encryption was employed in the Voynich Manuscript. Some investigators theorized that vowels had been removed from the words in the text in order to obscure their meaning further, while others have suggested writing that has been mirrored or otherwise written backwards. Anagrams and other forms of word manipulation are a common theory, and the University of Alberta team went with a variation on the anagram idea.

They theorized that the encoded words were alphagrams, anagrams where the letters in a word are placed in alphabetical order. (For instance, if VOYNICH was encoded this way, it would read CHINOVY.)

Turning loose the AI once again under these parameters, they found that 80% of the words in the Voynich text could be anagrammed into Hebrew words. They managed to cobble together a possible opening sentence for the text:

“She made recommendations to the priest, man of the house and me and people.”

Is it clunky? Sure. But it’s also a partial translation that has held up to some scrutiny, which is better than most amateur AND professional attempts to crack the Voynich Manuscript have done.

The team is currently hoping to team up with experts in ancient Hebrew and continue the process, but until then, they’re excited to apply their AI to other ancient manuscripts to see what it uncovers.

Although we are a long way from calling the Voynich mystery solved, this is a very intriguing step forward for cryptographers and codebreaking enthusiasts everywhere.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The PN Blog 2017 Countdown!

It’s one of the final blog posts of the year, so what do you say we revisit all of 2017 with a countdown of my ten favorite blog posts from the past year!


#10 Farewell, David

I don’t mean to start off this countdown on a sad note by mentioning the loss of fellow puzzler and Penny Dell colleague David Lindsey. But it was an incredibly rewarding experience to talk to those who knew him better than I did, and put together a memorial piece in his honor. I learned so much, and it was a valuable part of the healing process for all of us. I had two different opportunities to get to know David, and that’s a rare gift.

#9 The Puzzle of the Bard

Puzzle history, codes, and wordplay are three common topics around here. So when I found a story that neatly covers all three, I simply couldn’t resist. Although this one is more conspiracy theory than verifiable puzzle history, it was great fun to do a deep dive into the ongoing debate surrounding Shakespeare’s identity and put a puzzly spin on the subject. The research alone made this one worthwhile.

#8 Holiday Puzzly Gift Guide

Every year, one of my favorite activities is putting together our Holiday Puzzly Gift Guide. I get to include the best products sent to me for review by top puzzle and game companies, mix in some of my own favorites, and draw attention to terrific constructors, game designers, and friends of the blog, all in the hopes of introducing solvers (and families of solvers) to quality puzzles and games.

#7 Cultural Sensitivity and Crosswords

Sadly, crosswords in general, and New York Times crosswords in particular, have a reputation for being stodgy, steeped in arcane vocabulary, obscure facts, and antiquated cultural references. As part of the ever-evolving narrative surrounding cultural sensitivity — not just ethnic, but in terms of gender and sexuality as well — it’s important to do more than acknowledge the debate. You have to participate in it.

#6 Puzzles in Unexpected Places

One was tucked away on a university website. Another sat in plain sight on a tombstone. The third came to light in a music fan’s collection. What did all three have in common? They represented a simple fact: puzzles are everywhere, a part of the cultural fabric in innumerable ways. I’m cheating a bit by mentioning three posts here, but they all fit the pattern. And it’s so much fun to discover puzzles in unexpected places.

#5 Puzzles for Pets

April Fools Day pranks are an Internet tradition at this point. Some websites go all out in celebrating the holiday. (Heck, ThinkGeek has started using the holiday to tease the public’s interest level in “fake” products, going on to actually release some of those April Fools pranks as real items later in the year!)

So when the idea was floated for PuzzleNation to get in on the pranking fun, I couldn’t resist. The result — Puzzles for Pets — was as layered as it was silly, complete with fake quotes, splash pages, and more. I even got my own dog, Bailey, in on the gag.

#4 Design Your Own Escape Room

Bringing a puzzle-solving mindset into other social activities has always been a passion of mine. I’ve written in previous blog posts about using my puzzly experiences in designing murder mystery dinners and other events. This year, I had the opportunity to try my hand at designing an escape room-style experience for a friend’s birthday, and sharing some of what I learned with you was a genuine treat.

#3 ACPT, New York Toy Fair, and more

There are few things better than spending time with fellow puzzlers and gamers, and we got to do a lot of that this year. Whether it was supporting new creators and exploring established companies at New York Toy Fair or cheering on my fellow puzzlers at the American Crossword Puzzle Tournament, getting out and talking shop with other creators is invigorating and encouraging. It really helps solidify the spirit of community that comes with being puzzly.

#2 Puzzle History

I mentioned puzzle history as a frequent blog post topic in #9, but recent revelations by government agencies in both the United States and Great Britain have allowed puzzlers greater access than ever before to the history of codebreaking over the last century or so.

In fact, so much information has come to light that I was able to do a three-part series on the history of the NSA and American codebreaking post-World War II. This was a labor of love that took weeks to put together, and I think it’s some of the best work I’ve ever done for the blog.

#1 Daily POP Crosswords

There’s nothing more exciting than getting to announce the launch of a product that has been months or years in the making, so picking #1 was a no-brainer for me. It had to be the announcement of Daily POP Crosswords.

But it’s not just the app, it’s everything behind the app. I’ve had the opportunity to introduce you to several of the terrific constructors we’ve recruited to make the puzzles as fresh and engaging as they can possibly be, and you’ll get to meet a few more in the weeks to come.

It may sound self-serving or schlocky to talk about our flagship products as #1 in the countdown, but it’s something that we’re all extremely proud of, something that we’re constantly working to improve, because we want to make our apps the absolute best they can be for the PuzzleNation audience. That’s what you deserve.

And it’s part of the evolution of PuzzleNation and PN Blog. Even as we work to ensure our current products are the best they can be, we’re always looking ahead to what’s next, what’s on the horizon, what’s to come.

Thanks for spending 2017 with us, through puzzle scandals and proposals, through forts and festivities, through doomsday prepping and daily delights. We’ll see you in 2018.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!