Feeds

Mysterious crypto-book dated to 15th century

Real life Da Vinci codex features nude ladies, too

Next gen security for virtualised datacentres

Crazy illo of nudie hairband ladies splashing about in green jelly

Other theories on the puzzling manuscript abound: some suggest that Voynich created it himself and concocted the Bacon notion to boost its value – this has now been shown to be untrue as well. Others have suggested that the book was penned by various prominent alchemists, astrologers, physicians or other savants of various periods from the medieval to the 17th century – possibly as an encoded work (this was a common practice at times) or as a hoax or sting of some sort.

An illustration from the 'Voynich manuscript'

What the bloody hell's supposed to be going on here?

Since the 1912 re-discovery, various capable cryptographers have tried to decipher the script used in the book, but all have failed. This has led to speculation that the writing is all or mostly gibberish: that any information present is concealed using steganography rather than cryptography, and that any real messages are buried amid irrelevant padding.

The prospect also exists that even if the script does actually have meaning, that the information encoded is nothing more than alchemical or astrological mumbo-jumbo: methods for transmuting base matter into gold or predicting the future from star charts, or bogus sympathetic-medicine homeopathy cures and such like. Much of the accepted body of scientific knowledge in the early 15th century consisted of such stuff.

Still, as the Arizona uni spokespersons note, "this tome makes the Da Vinci Code look downright lacklustre" – and at least it is now confirmed as being very old.

If any of our crypto or stegano enthusiast readers fancy having a go, detailed imagery of the manuscript is available here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
LOHAN tunes into ultra long range radio
And verily, Vultures shall speak status unto distant receivers
NASA to reformat Opportunity rover's memory from 125 million miles away
Interplanetary admins will back up data and get to work
SpaceX prototype rocket EXPLODES over Texas. 'Tricky' biz, says Elon Musk
No injuries or near injuries. Flight stayed in designated area
EOS, Lockheed to track space junk from Oz
WA facility gets laser-eyes out of the fog
Volcanic eruption in Iceland triggers CODE RED aviation warning
Lava-spitting Bárðarbunga prompts action from Met Office
LOHAN Kickstarter push breaks TWELVE THOUSAND POUNDS
That's right, folks, you've stumped up OVER 9,000 beer tokens - and counting
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.