Classified Archive
New ARG related to Warframe: 1999 that begun on the 25th of October 2024
WIP - This page and the related ARG are still very much in progress.
Information here should not be deemed final and is subject to sudden change.
To see the latest up-to-date information regarding this ARG, please refer to this google doc
Oct 25 - Devstream #182
During the closing section of Devstream #182, the stream abruptly switches over to a strange clip, which seems to consist of multiple spoof ads. Among others, the boy band "On-Lyne", a game called "War Sector" and "Big Bytes Pizza" are prominently featured.
The closing section of Devstream #182 has been separately uploaded to Warframe's official YouTube channel:
"we end as we began"
Towards the end of the strange clip (1:16-1:24), the sentence "we end as we began", along an obfuscated is presented on top of the visage of Albrecht Entrati:

Oct 25 - doctorentrati.com
Players quickly understood that it was indeed supposed to be a web address, and it wouldn't take long until it was uncovered that the address was supposed to be www.doktorentrati.com, thanks to the flickering image of Albrecht Entrati. The address redirects anyone visiting to https://www.warframe.com/1999/doktorentrati.
The page that players landed on after entering the address is a simple site consisting of the Entrati logo, the sentence "WE END AS WE BEGAN", and a simple "BEGIN" button:

DE-OS
Pressing on the "BEGIN" button, the user is then taken to a page that imitates the desktop of an older computer. On this desktop, numerous files and applications could be found:
Below you can find a set of collapsed sections with detailed descriptions for each numbered element seen in the image above:
1. Saved chat logs (.kin files)
The .kin files accessible on the desktop appear to be logs of previous chats between a number of different persons.
All chat logs are pasted in below. To see how they would originally look, click on the link next to each file name
2. Oubliette
At this point in the ARG, 'Oubliette' was a locked and inaccessible folder, clicking on it shows the following message:
This file is encrypted by your organization
3. SETTINGS.APP
As the name suggests, SETTINGS.APP contains a number of options:
4. YAPPR.APP
YAPPR is a mock e-mail client that contains an advertisement email from Big Bytes Pizza that mentions a number of toppings:
Pressing "Reply" opens a new window that allows the user to reply to the e-mail from Big Bytes Pizza with a freeform message. Screenshots for both of these screens can be found below.
Once a reply has been sent, all open YAPPR windows will be closed.
5. KINEMATIC-ONLINE.APP
KINEMATIC-ONLINE is a mock web browser that, once opened, shows a fake loading screen consisting of a logo with Höllvanian characters translating to "kinematic online". The Session id that is shown during loading also seems to contain a number of references, or may be a special message altogether:
A∂6B4A-V<>IV74-KPΔ9T9-WW®B17-TYSM<3
ASCLOID
Given a few seconds, the loading page disappears and a page called "ASCLOID" is presented instead.
The page consists of a small title and beneath it, a search bar with accompanying "ASC!" button.
Clicking on the search bar displays a hint pop-up with 4 distinct links:
"cracking encrypted zip files"
The first three links will open a new tab with the content once clicked. These links are previously known and accessible from the previous Entrati ARG which was active during Tennocon 2024.
The last link shown in the pop-up on ASCLOID will show another page named "DE/CRYPTR" that also begins with a short loading sequence. Pressing the "G3T DE/CRYPTR" button in the middle of the page will provide yet another app on the desktop, which will prove to be useful at a later point.
If the user instead chooses to enter any other address or search term into the search bar, an error page is presented:
ERROR Could not connect to search server, please check your connection
6. Documents
"Documents" is a folder that contains a total of 7 files (4 .brush files, 3 .kin files):
7. Inaccessible apps
These three icons in the dock were at the time inaccessible. Clicking on them would show the following error:
8. RUBBISH.APP
Similar to "Documents", as it appears to be a folder containing two files; "Welcome.kin" and "01_Lure.kin". Clicking on them does nothing, but at the bottom of the window, a "Restore Files" button can be seen.
Clicking on the button will then make the two files shown here appear on the desktop, which allows the user to access their contents.
The following files can be restored from RUBBISH.APP:
Welcome.kin
This file seems to be an introductory e-mail/message addressed to a Mr./Mrs. Paige from Gwen Arran, a senior employee at Digital Extremes (in-universe), creators of a game named "War Sector", which seems to be a mix of Dark Sector and Warframe.
01_Lure.kin
This file is locked, and can not be accessed without a password, which hints at the next step of the ARG.

9. Power Button
The button imitates a shutdown of the "computer" that the user is browsing. During the sequence, three messages can be seen, informing the user about the shutdown status of the computer. At the end of the sequence, a reflection can be seen flickering on the screen. This flicker consists of two images; an overlay graphic to create a CRT effect, as well as a reflection of Major Neci Rusalka. This implies that she is the one using the computer at the time.
After the flicker appears, the computer is now turning on, displaying "DE-OS", along with the Entrati logo above it. The startup of the OS may be a joke, or a hint that Entrati is directly involved with the in-universe version of Digital Extremes.
10. Reset Button
Pressing the button will prompt the page to reset to its original state (i.e any steps performed will be reverted). The user is prompted for a confirmation before the reset happens.
Oct 25 - Finding the first 5 files
As we saw in the 8. RUBBISH.APP section of this page, a locked file could be found in the rubbish. This suggests that there may be multiple hidden files present on the computer, which prompted users to search for similar files.
This section shows the files and the steps to discover them chronologically, even though that is not the order they were found in.
01_lure.kin
As mentioned above, the file can be found in the RUBBISH app. To have it appear on the desktop, simply press "Restore Files" at the bottom of the app.
02_Cheat.kin
03_Paper.kin
04_Speak.bin
05_Bite.kin
Oct 25 - Unlocking 01_Lure.kin
All the found files are locked behind a password to begin with, with the first file, 01_Lure.kin being the only one that can be unlocked from the beginning.
As noticed by user soap on the PlayWarframe Discord, the doktorentrati page contains ASCII art of a Requiem icon, as well as the words "TIME", "FORM" and "TRUTH":

Using the Requiem icon as a clue, users quickly noted the corresponding requiem words for the ASCII art to be: "KHRA", "JAHU" and "XATA" (found by TheWarriorCat and Fenix on the PlayWarframe Discord.)
Inserting the password "KHRAJAHUXATA" (as found by Ducky on PlayWarframe) for 01_Lure.kin unlocks the file, immediately revealing the following:
The contents are a reply to the Welcome.kin file, written by someone named Sam Paige.
Oct 25 - Time-gated data and datamining
Once the first file was unlocked, no additional steps for the ARG could be found, and a deduction could be made that further progress was time-gated by DE.
Oct 28 - New clues and 02_Cheat.kin
New X post
At 28/10/2024 19:23 UTC, the official Warframe X (formerly known as Twitter) account sent out a new ARG-related post:
The last paragraph within the image in the post hints at a hidden message in the blue section of the image. Both ARGrakata and PlayWarframe noted that the circled word ("PRIMED") hinted at taking all the words that had prime-numbered positions within the blue section (words 2,3,5,7,11,13,17,19,23,29,31 in the section.)
Doing this resulted in the following message being extracted out of the blue section: "combine all the prime words together and then multiply by nine". (Solution and Application were found by Kaski_ and Panji respectively on ARGrakata.)
After several different attempts throughout the document, users soon understood that it was specifically the words in the blue section that mattered. Taking the sum of the prime numbers mentioned above (160) and multiplying it by 9 resulted in 1440 (found by Craft26, calculations by Ar'kohn Lock and Mordeth on ARGrakata.)
02_Cheat.kin
Using the solution taken from the X post (1440) and using it as the password for 02_Cheat.kin, unlocks the file, displaying the following:
Oct 31 - 03_Paper.kin and DE/CRYPTR update
WIP - Currently this is as far as this page goes, but there is a lot more information to come. To see any information that has not yet been added here, please check out this google doc.
Last updated
Was this helpful?