Feeds

Da Vinci Code judge floats own crypto conspiracy

Holy judgment hides secret messages

Next gen security for virtualised datacentres

The judge in the recent Da Vinci Code copyright trial is a bit of a cryptographer himself, apparently. Waggish syrup sporter Mr Justice Peter Smith inserted his own secret code into his judgment in favour of schlock king Dan Brown against the authors of Bible conspiracy nut bedtime favourite Holy Blood and the Holy Grail, The Guardian reports.

Smith italicised apparently random letters in the first part of the document to spell out “Smithy code”. While hardly an Enigma-esque feat of encryption, media lawyers who have been poring over the judgment for the last three weeks have only just noticed the gag.

After the “Smithy code” there's another 25 of the letters, though they're jumbled up. The dastardly Mr Justice Smith remained equivocal when The Guardian quizzed him on the issue. He riddled: “[They] don't look like typos, do they?”

Anyone with too much time on their hands can investigate the rest of the hilarious wheeze here

Bootnote

Reg reader Ed Mozley reckons there's 31, not 25, letters in the undeciphered part of Smith's code. They are:

j a e i e x t o s t g p s a c g r e a m q w f k a d p m q z v

The race is on to find out what on Earth His Honour is saying. So far we have "scream toast sex gimp", but we were never any good at Countdown. It can't be a simple anagram anyway; two "q"s and no "u"s. Hmm. Smith says he'll cough as soon as someone figures it out.

Next gen security for virtualised datacentres

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.