<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cipher Mysteries</provider_name><provider_url>http://ciphermysteries.com</provider_url><author_name>nickpelling</author_name><author_url>http://ciphermysteries.com/author/nickpelling</author_url><title>Le Butin and the Missing Pirate... - Cipher Mysteries</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="EPprNjUJQ5"&gt;&lt;a href="http://ciphermysteries.com/2016/04/11/le-butin-and-the-missing-pirate"&gt;Le Butin and the Missing Pirate&#x2026;&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="http://ciphermysteries.com/2016/04/11/le-butin-and-the-missing-pirate/embed#?secret=EPprNjUJQ5" width="600" height="338" title="&#x201C;Le Butin and the Missing Pirate&#x2026;&#x201D; &#x2014; Cipher Mysteries" data-secret="EPprNjUJQ5" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>When, as so often happens, a cipher mystery&#x2019;s genuine history gets overlaid by multiple layers of wishful thinking, unpicking them all can prove extremely difficult. In many cases, those extra layers can end up offering at least as much of a barrier to research as the original artefact itself. This is, essentially, where things stand &hellip; Read More &rarr;</description></oembed>
