Feeds

Mysterious crypto-book dated to 15th century

Real life Da Vinci codex features nude ladies, too

Remote control for virtualized desktops

Crazy illo of nudie hairband ladies splashing about in green jelly

Other theories on the puzzling manuscript abound: some suggest that Voynich created it himself and concocted the Bacon notion to boost its value – this has now been shown to be untrue as well. Others have suggested that the book was penned by various prominent alchemists, astrologers, physicians or other savants of various periods from the medieval to the 17th century – possibly as an encoded work (this was a common practice at times) or as a hoax or sting of some sort.

An illustration from the 'Voynich manuscript'

What the bloody hell's supposed to be going on here?

Since the 1912 re-discovery, various capable cryptographers have tried to decipher the script used in the book, but all have failed. This has led to speculation that the writing is all or mostly gibberish: that any information present is concealed using steganography rather than cryptography, and that any real messages are buried amid irrelevant padding.

The prospect also exists that even if the script does actually have meaning, that the information encoded is nothing more than alchemical or astrological mumbo-jumbo: methods for transmuting base matter into gold or predicting the future from star charts, or bogus sympathetic-medicine homeopathy cures and such like. Much of the accepted body of scientific knowledge in the early 15th century consisted of such stuff.

Still, as the Arizona uni spokespersons note, "this tome makes the Da Vinci Code look downright lacklustre" – and at least it is now confirmed as being very old.

If any of our crypto or stegano enthusiast readers fancy having a go, detailed imagery of the manuscript is available here. ®

Intelligent flash storage arrays

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Rosetta science team thinks Philae might come to life in the spring
And disclose the biggest surprise of Comet 67P
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.