We’ve hidden secret keys in different (physical) locations across the world. To move from one level to another, you’ll have to find a hidden print-out in all (four) locations. Watch out for GIF file names.
Ah, these mystery riddles never stop, do they? To celebrate our ninth birthday, we’ve prepared yet another riddle, and this time it will require a bit more teamwork. We’ve hidden secret keys in different (physical) locations across the world. To move from one level to another, you’ll have to find a hidden print-out in all (four) locations. Watch out for GIF file names.
To find the key password, you have to follow the clues and hints in a series of animated GIFs. Once put together, the keys will add up to a secret Twitter hashtag. Below you’ll find the first animated GIF that contains a location clue. Identify the location, go there (yourself, or ask a friend, colleague or a total stranger) and find a hidden print-out.
Once you’ve reached the last level (you’ll know when), just tweet out all the keys in one single hashtag to @smashingmag on Twitter! Not that difficult, right?
Alright, let’s get down to business. Are you ready? Action! (And good luck!)
So, What Can You Win?
We’ll raffle a quite extraordinary smashing prize (and a couple of other Smashing extras, see below) to the first couple of readers who tweet out the correct hidden hashtags to us!
- a round-trip flight to Barcelona, Spain,
- full accommodation in a fancy hotel,
- a ticket to the Smashing Conference Barcelona 2015,
- any Smashing workshop ticket of your choice,
- full access to the Smashing eBook Library,
- a signed edition of the Smashing Book #5,
- your very own Smashing caricature, designed just for you.
Please note that to avoid spoilers, comments are closed for this post. And sorry, we aren’t going to make it too easy for you. The winners will be announced on Friday, September 19th.
Alright! Let’s get to work. Or have you already figured it out? ;-)
Update: This riddle didn't turn out as we expected. However, we reshaped it for another riddle which worked just fine ;-)