Heteroscedasticity – now there’s a word you don’t see very often (thanks to Rosco Paterson for kindly plonking it in my path). Which is a pity, because it’s a particularly useful concept that might help us crack several longstanding cipher mysteries.

The idea behind it is not too far from the old joke about the statistician with his feet in the oven and his head in the fridge, who – on average – felt very comfortable. A set of numbers is heteroscedastic if it simultaneously contains different (‘hetero-’) subgroups such that (for example) their average value falls between the groups. As a result, looking to that average for enlightenment as to the nature of those two separate subgroups is probably not going to do you much good.

Perhaps unsurprisingly, it turns out that a lot of statistical properties implicitly rely on the data to be analyzed not having this property. That is, for data with multiple modes or states, the consequent heteroscedasticity is likely to mess up your statistical reasoning. Though you’ll still get plausible-looking results, there’s a high chance they’ll be of no practical use. So for cipher systems in general, any hint of multimodality should be a heteroscedastic alarm bell, a warning that your statistical toolbox may be as much use as a wet fish for tightening a bolt.

Plenty of Voynich Manuscript (‘VMs’) researchers will be sagely nodding their heads at this point, because they know all too well that the plethora of statistical analyses performed so far on it has failed to yield much of consequence. Could this be because its ‘Voynichese’ text heteroscedastically ‘hops’ between states? Cipher Mysteries regulars will know I’ve long suspected there’s some kind of state machine at play, but I’ve yet to see any full-on analysis of the VMs with this in mind.

Historically, the first proper ciphering state machine was Alberti’s 1465 cipher disk. He placed one alphabet on a stator (a static disk) and another on a rotor (a rotating disk), rotating the latter according to some system pre-agreed between encipherer and decipherer, e.g. rotating it after every couple of words, or after every vowel, etc.

Even if you don’t happen to buy in to my Averlino hypothesis (but don’t worry if you don’t, it’s not mandatory here), 1465 isn’t hugely far from the Voynich Manuscript’s vellum radiocarbon dating. It could well be that state machine cryptography was in the air: perhaps Alberti was building on an earlier, more experimental cipher he had heard of, but with an overtly Florentine, Brunelleschian clockwork gadget twist.

As an aside, there are plenty of intellectual historians who have suggested that the roots of Alberti’s cipher disk lie (for example) in Ramon Llull’s circular diagrams and conceptual machines: in a way, one might argue that all Alberti did was collide Llull’s stuff with the more hands-on Quattrocento Florentine machine-building tradition, and say “Ta-da!” 🙂

All the same, we do know that the Voynich Manuscript’s cipher is not an Albertian polyalphabetic cipher: but if it is multimodal, how should we look for evidence of it?

A few years ago when my friend Glen Claston was laboriously making his own transcription of the VMs, he loosely noticed that certain groups of symbols and even words seemed to phase in and out, as if there was a higher-level structure underlying its text. Was he glimpsing raw heteroscedasticity, arising from some kind of state machine clustering? For now this is just his cryptological instinct, not a rigorous proof: and it is entirely true he may have been influenced by the structure of Leonell Strong’s claimed decryption (which introduced a new cipher alphabet every few lines). Despite all that, I’m happy to take his observation at face value: and that Voynichese may well be built around a higher-level internal state structure that readily confounds our statistical cryptanalyses.

So, the big question here is whether it is possible to design tests to explicitly detect multimodality ‘blind’. The problem is that even though this is done a lot in econometrics (there was even a Nobel Prize for Economics awarded for work to do with heteroscedasticity), economic time series are surely quite a different kettle of monkeys to ciphertexts. Perhaps there’s a whole cryptanalytical literature on detecting heteroscedasticity, please leave a comment here if you happen to know of this!

I don’t know what the answer to all this is: it’s something I’ve been thinking about for a while, without really being able to resolve to my own satisfaction. Make of it what you will!

At the same time, there’s also a spooky echo with the Zodiac Killer’s Z340 cipher here. I recently wrote some code to test for the presence of homophone cycles in Z340, and from the results I got I strongly suspect that its top half employs quite a different cipher to the bottom – the homophone cycles my code suggested for the two halves were extremely different.

Hence it could well be that most statistical analyses of Z340 done to date have failed to produce useful results because of the confoundingly heteroscedastic shadow cast by merging (for example) two distinct halves into a single ciphertext. How could we definitively test whether Z340 is formed of two halves? Something else to think about! 🙂

In all my years of high-velocity web-browsing, I’ll honestly admit I’d never stumbled across www.royal.gov.uk, “The official website of the The British Monarchy. At first, I found it all a little bit eery, somewhat like finding mafia.it (which incidentally has some rather nice ASCII art in the HTML source).

The reason I was there was that a few days ago, I’d stumbled across a Slashdot news story I’d missed:Queen Elizabeth Sets a Code-Breaking Challenge from July 2011. This described how the Queen had released The Agent X Code Book Challenge, “aimed at getting children [specifically aged 13-16] interested in cryptography”. It was produced to accompany the Queen’s opening of a memorial at Bletchley Park, which was covered well in an I Programmer web news-story.

Naturally, I decided to download this Code Challenge from the Monarchy’s website to try out on my 7 year old son: though he needed a little bit of help to get going, he quickly got the hang of it, and actually quite enjoyed it.

There are issues, of course. For one, the “Agent X” of the title is more of a 1950s conceit than a 2011 street name, arguably leaving that side of the whole presentation a little bit too stiff-collared for contemporary yoof. Similarly, the message itself does read as if it had been transcribed from a gramophone recording, which also doesn’t really help. Finally, there isn’t actually any cryptography as such, but rather just using a very WWII-like phrase table and letter table to decipher a series of messages (and even there, the phrase “Bletchley Park” appears three times, twice with exactly the same letters).

In short, I suspect it’s more likely to stimulate interest in WW II history than in cryptography per se: so if GCHQ had some kind of school-age outreach in mind with this, I think they’ll end up quite disappointed.

All the same, it was all worth it simply for one comment on Slashdot. Amidst all the normal “be sure to drink your Ovaltine” snarkiness and noise you’d expect to find there, Nicko van Someren (whose brother Alex I happen to know well) simply commented this:

I had the pleasure of meeting HRH the Duke of Edinburgh at an event once and, upon hearing that I worked in cryptography, he told me about his time working signals in the British navy during the second world war. He said he had always been fascinated by the operation of the British TypeX equipment that he used back then. I don’t suppose that he did any code breaking but he certainly was using codes well before the Cypherpunks came along.

So while my son happily put down the Agent X code book to go back learning how to draw manga and/or playing that week’s Wii game and/or whatever else he was so busily into that day, the picture I got from the whole thing was one of Prince Philip not just playing at crypto (like so many of the Slashdot trolls), but actually using it in the field. That’s real cipher history for you.

HLHL DCDC DMDM HWHW KHKH AQAQ HMHM!

Though I’ve blogged about the Tamam Shud / Taman Shud case before, it’s still very far from closed. The man found on South Australia’s Somerton Beach in December 1948 remains unidentified, the nature of his death continues to be unresolved, his relationship with the nurse “Jestyn” is still not fully locked down, while as for the curious note tucked into his pocket…

MRGOABABD
MLIAOI
MTBIMPANETP
MLIABOAIAQC
ITTMTSAMSTGAB

…it’s as mysterious as ever.

Arguably the best starting point for people intrigued by this whole story is to watch a 1978 documentary on the subject from Australia’s ABC channel. Handily, it has been posted in three 10-minute sections on YouTube: 1/3, 2/3, and 3/3. Because so much of the police evidence has been destroyed over the years, the great thing about this film is that you get to actually see things in The Unknown Man’s suitcase (right at the start of part 2), which I for one found particularly interesting.

What I suspect you’d really want to leaf through next would be a dossier on the case, carefully laid out by a former policeman who had been assigned to it, and who went to some lengths to be factual, not judgmental. If my guess is even remotely close, then I’d say you simply have to get yourself a copy of G. M. Feltus’ (2010) book “The Unknown Man: A suspicious death at Somerton Beach“.

Yes, Gerry Feltus was indeed a policeman assigned between 2002 and 2004 (when he retired) to the Somerton Man cold case: and I think he does an admirable job of bringing together both the numerous strands of (often painfully thin) evidence and the various claims and theories as to the dead man’s identity.

It’s entirely true that his lengthy roll call of dud theories in the middle of the book can get very slightly wearing: but he’s clearly trying to give armchair mystery solvers everything they could reasonably need to get under the skin of this peculiar case, and so arguably couldn’t present it in any other way. Recommended!

Of course, there’s an extensive Wikipedia page for you to go through too (frankly, I’d recommend pouring yourself a nice glass of lightly-oaked Australian Chardonnay and watching the ABC documentary before you do anything so completist), though it’s not really a patch on Gerry’s 200+-page book.

Incidentally, there’s a lot of recent speculation that the Unknown Man may well have been the father of Jestyn’s son (there’s now even talk of exhuming bodies and performing DNA tests). Though my own belief is that this is – for entirely separate reasons – most likely true, I also think that this is missing the point. The right first step would be to do much more to explore the Somerton’s Man’s life before his death: thanks to Gerry Feltus, I think we can tell a great deal about him, and make some well-educated hunches.

In a few days’ time, I’ll post about what I think the odd cipher message contains, as well as my thoughts on the Unknown Man’s life, his travels in Australia after the Second World War, and his premature death (yes, I’m quite sure he was poisoned). But that’s by the by: for now all that’s important is that I think anyone with an interest in this enduring cipher mystery should buy themselves a copy of Gerry’s book from his Australian website and try to make up their own mind!

Today’s New York Times has a short article by John Markoff on the Copiale Cipher, the oculist secret society initiatory document recently cracked by Kevin Knight, Beáta Megyesi and Christiane Schaefer. I discussed it in reasonable depth on this blog a few days ago, click there if you want to know more.

I do suspect that there must be hundreds of uncracked ciphers like the Copiale Cipher (though typically much smaller) languishing in <cliche>dusty European archives</cliche>, so it would be excellent to give people a chance to crack them (not just Kevin Knight & his student cadre 🙂 ).

So, archivists of the world, email me scans of your uncracked ciphers, let’s see what cipher mysteries we can crack together!

PS: before I forget, The Curse of the Voynich should finally be back on sale next week, so when it’s in I’ll email a reminder to those people who have asked to buy a copy. At £9.95, it’s far cheaper than the £32.79, £171.98, and £270.46 quoted on Amazon Marketplace! =:-o

Cipher Mysteries readers in the US may well have watched Brad Meltzer’s recent “Decoded” episode on the Declaration of Independence. Though you might well think that the description listed below doesn’t sound particularly promising…

The Declaration of Independence is the founding document of American Democracy. Could it contain hidden messages from our nation’s forefathers intended to be discovered years later? Buddy, Mac and Scott travel across America to try and uncover the mysteries behind our nation’s most prized document.

…it turns out that this episode was in fact largely about the Beale Papers, which (in my opinion, at least) is a proper cipher mystery. I’ve blogged about these a fair few times, such as here: summing up, I conclude that the statistical improbability of the Gillogly strings strongly implies that these are real ciphers (not hoaxes); that they were enciphered using a two-stage combo of codebook and monoalphabetic substitution; and that the Gillogly strings are in fact no more than the keyphrase somehow falling through the system as a set of ABCDE…-style indices.

And just for all those armchair treasure hunters out there eager to crack B1 and B3 for themselves, my predictions are (a) that the B1 key string will turn out to be painfully close to “THOMASJEFFERSONBEALE”, and (b) that though B1 (and probably B3) also used the Declaration of Independence, it had its own slightly different set of counting mistakes as compared to B2. As normal, 15% of the bounty should cover my fee, thanks. 🙂

All of which means that when the Beale Papers finally do get cracked, Jim Gillogly will probably kick himself into the next state for missing what, to a supersmart codebreaker such as him, should be utterly obvious. Unless it’s him that ultimately gets to crack it? We shall see!

Anyway, the nice thing about Brad Meltzer’s show is that it has hugely stimulated interest in the Beale Papers, even creating its own mini-traffic-spike in Google Trends. I’m guessing the linking that’s going on is happening in treasure hunter mailing lists, but to be honest there’s not a lot out there worth reading on the subject. People are finally realising that stories linking the Beale Papers to (for example) famous pirate / privateer Jean Lafitte [Jean Laffite] are probably outright fakes. As with the Voynich Manuscript, all the properly good evidence is embedded right in the text itself: it’s everything else surrounding it that is the hoax!

One of the nice things about the unsolved Z340 Zodiac Killer cipher is that we have a previous solved cipher by the same encipherer (i.e. the Z408 cipher), which appears to exhibit many of the same properties as the Z340. Hence, if we could forensically reconstruct how Z408 was constructed (i.e. its cryptographic methodology), we might also gain valuable insights into how the later Z340 was constructed.

One interesting feature of the (solved) Z408 is that even though it is a homophonic substitution cipher (which is to say that several different shapes are used for various plaintext letters), the shape selection is often far from random. In fact, in quite a few instances Z408 shapes appear in a strict cycle, which has led to some recent attempts to crack Z340 by trying (unsuccessfully) to infer homophone cycles.

Curiously, one of the shapes (filled triangle) appears to encipher both A and S: and if you extract all these out, a homophone-cycle-like ASASASAS sequence appears. This intrigued me, so I decided to look at it a little closer: might this somehow be a second layer of cycling?

The answer (I’m now pretty sure) turns out to be no, though it’s still interesting in its own right. Basically, the Zodiac seems to have got confused between dotted triangle (for S) and filled triangle (for A), which caused his cycles to break down. He also miscopied an F-shape as an E-shape: perhaps his working draft wasn’t quite as neat as his final copy, and/or written in felt tip, causing letter shapes to soak into the paper and become slightly less distinct.

If we correct these mistakes and reconstruct what he seems to have intended, we see that he was following a fairly strict cycle most of the time, though getting less ordered towards the end (perhaps from enciphering nausea?):-

A: length-4 homophone cycle = (1) F – (2) dotted square – (3) K – (4) dotted triangle
–> 12341234123413234124211
—-> 16 decisions out of 22 follow the cycle pattern

S: length-4 homophone cycle = (1) 6 – (2) S – (3) reversed L – (4) filled triangle
–> 1241234123412341231412
—-> 18 decisions out of 21 follow the cycle pattern

L is interesting because though that seems to start out as a length-2 homophone cycle [diagonal square – B], the diagonal square then seems to morph into a filled square and then back again to a diagonal square. Hence there’s no obvious sign of an actual length-3 homophone cycle as such, only a miscopied length-2 cycle (which then breaks down halfway through, with four diagonal squares in a row).

Yet even though the Zodiac loves words containing LL (kill, thrill, will, all, etc), he only actually seems to be using a length-2 homophone cycle for L (if slightly miscopied). That is, he is probably using a generalized model of English letter frequency distribution rather than a particular model of his own English letter frequency distribution.

The odd thing is that if you go through Dave Oranchak’s list of Z408 homophone sequences, you’ll see that it doesn’t quite match the traditional “ETAOINSHRDLU” frequency ordering (I count L as length-2):
* Length-7: E
* Length-4: TAOINS
* Length-3: R
* Length-2: LHFD

Was there an American amateur cryptography book of the 1950s or 1960s that espoused this frequency distribution?

The NSA’s 2011 Cryptologic History Symposium (held in Johns Hopkins) ran yesterday and today, and had plenty of names long-suffering Cipher Mysteries readers will doubtless recognize in a flash:-

* Dr. Jim Reeds, Institute for Defense Analyses: “Editing the ‘General Report on TUNNY’”
* Dr. Benedek Lang, Budapest University of Technology and Economics: “Towards a Social History of Early Modern Cryptography”
* Elonka Dunin, Independent Scholar: “Kryptos–The Decades-Old Enigma at Langley”

(Personally, I’d also love to have heard this presentation:-
* Erin Higgins, Department of Defense: “Humanism, Magic, and Cryptology in the Renaissance”)

However, arguably the big cipher mystery story of the conference was the fact that Panel session 4B, moderated by David C. Cooley from the NSA/CSS Center for Cryptologic History, was devoted to “Investigating the Voynich Manuscript” and with two Voynich speakers well-known from recent talks and results (respectively):-
* Klaus Schmeh, Independent Scholar: “New Research on the Voynich Manuscript”
* Dr. Greg Hodgins, University of Arizona: “Radiocarbon Dating and the Voynich Manuscript”

Could I perhaps tempt any attendee to email me a short description of the conference that I can put up here as a guest post? Cheers!

Some days I wonder if I should forget all about cipher mysteries – which are, quite frankly, far too much like hard work – and instead start up a news feed that promises subscribers one thing and one thing only: a freshly hatched cracked Leonardo da Vinci theory every day.

But even if such a tragic nadir of historical non-journalism were to prove possible (and, unfortunately, I suspect it probably would), it would surely be no more than a postmodernist anti-triumph: for what would it prove? That “war, war is stupid, people are stupid, and love means nothing in some strange quarters“? I rest my case, m’lud.

Yet despite the obvious foolishness of sending yet another Leonardo theory floating off into the ether like some flying Chinese lantern, even the very best Leonardo writers still feel the need to do just that. For example, Martin Kemp – Emeritus Professor of History of Art at Oxford, the crème de la crème of da Vinci-studying historians – recently co-write a book (“La Bella Principessa: The Story of the New Masterpiece by Leonardo Da Vinci”, summarized here) arguing that a picture long thought to be a 19th century fake is in fact a real 15th century drawing of Bianca Sforza by none other than Leonardo. Is it definitely by Leonardo (to be honest, Kemp’s not-quite-smoking gun proof is a fingerprint identification that seems more tendentious than tentative), or a German “Nazarene Brotherhood” creation from closer to 1820, as Christie’s wrote in their auction catalogue? Given the strong arguments both ways, I suspect Kemp may have subtly damaged his credibility by not really balancing his case out. He of all people should know that when it comes to Leonardo, things are rarely that one-sided. 🙁

But actually, that’s all by the by. Today’s fruity Mona Lisa story comes courtesy of p.22 of the Sunday Times, which reports “a startling theory about the work’s background” proposed by “Canadian doctor and amateur art historian” (do those words fill you with dread as well?) Donato Pezzutto. If, the good doctor claims, you join the right-hand edge of the Mona Lisa to the left-hand edge, you end up with a depiction of “Lake Trasimeno in Umbria” verrrry similar to the one that Leonardo depicted in his 1502-3 topographical map of Val di Chiana. If you want more, all I can do is refer you to Pezzutto’s article in the journal Cartographica: but… being honest… I have to say it sounds to me a lot like superficial nonsense built around a single rather unconvincing datapoint.

All of which of course points to why I couldn’t be the brains behind dailyleonardotheory.com: having to bite my tongue every day would kill me. Or rather, I’d probably need a new tongue every couple of days. Not my idea of fun, not by a long way. 🙁

Here’s a nice story that should bring heart to researchers struggling with uncracked homophonic ciphers (e.g. Zodiac Killer Ciphers, Beale Papers, etc). Kevin Knight, who Voynich Manuscript researchers may remember from various posts here, has now co-authored a 2011 paper with Beáta Megyesi and Christiane Schaefer from Uppsala University on how they cracked a hitherto unknown (to me, at least) 105-page ciphertext dated 1866 they call the Copiale Cipher.

Slightly unhelpfully, the authors refer only to the manuscript as having come “from the East Berlin Academy”: in fact, as far back as 1992/1993 the East Berlin Academy of Arts and the West Berlin Academy were merged into a single Academy of Arts, Berlin (i.e. the Akademie der Künste). I searched the Akademie’s archives to see if I could find the source but only managed to find one plausible-sounding hit:-

Record group: Döhl – Reinhard-Döhl-Archiv
Classification group: 6.1. Fremde Manuskripte
Lauf. Nummer: 3625
Dat. => Findbuch: o.O., o.D.
Titel: [ohne Verfasser]: die sentenzen verschlüsselter deutbarkeit […]

Perhaps someone with better German and more persistence than me will find the actual manuscript reference.

Anyway, Knight/Megyesi/Schaefer give a nice account of how they went about analysing the neatly-written ciphertext, the various hypotheses they came up with along the way, and how they finally managed to decrypt it (though admittedly they initially only transcribed 16 pages), apart from eight mysterious logograms (i.e. an eight-entry nomenclator “for (doubly secret) people and organizations”). Here’s their translation of the first few lines, which make it quite clear what kind of a book it is:-

First lawbook
of the [1] e [2]
Secret part.
First section
Secret teachings for apprentices.
First title.
Initiation rite.
If the safety of the [3] is guaranteed, and the [3] is
opened by the chief [4], by putting on his hat, the
candidate is fetched from another room by the
younger doorman and by the hand is led in and to the
table of the chief [4], who asks him:
First, if he desires to become [1].
Secondly, if he submits to the rules of the [2] and
without rebelliousness suffer through the time of
apprenticeship.
Thirdly, be silent about the [5] of the [2] and
furthermore be willing to offer himself to volunteer
in the most committed way.
The candidate answers yes.

The interesting thing about the date is that it predates the 1887 founding of the Hermetic Order of the Golden Dawn by 20 years or so: and many (if not most?) regular Cipher Mysteries readers will recall that that was founded with a (quite different) mysterious cipher document allegedly referring to a certain “Fraulein Anna Sprengler” mentioned in the enciphered text. By way of comparison, Aleister Crowley’s favourite Ordo Templi Orientis was founded only in 1895 or thereabouts.

Hence the really big question about this enciphered document is whether there is any connection (perhaps even Anna Sprengler) between it and the Golden Dawn Ciphers. The answer may well lie in the 89 pages as yet untranscribed by K/M/S… hopefully we shall see!

Update: since writing this, I found that K/M/S have put up a detailed web-page including scans, transcriptions, and English translations of the whole 105 pages. Codicologically, they say it is “beautifully bound in green and gold brocade paper, written on high quality paper with two different watermarks [and] can be dated back to 1760-1780.”

They also note that they think it is a document of an “18th century secret society, namely the “oculist order”. A parallel manuscript is located at the Niedersächsisches Landesarchiv, Staatsarchiv Wolfenbüttel.” Which of course rules Fraulein Sprengler out. 🙂

To be honest, the part in the ceremony described where they pluck a hair from the eyebrow of the initiate reminds me not a little of the Simpsons’ Stonecutters episode (“Who holds back the electric car? Who makes Steve Gutenberg a star? We do! We do!”), but perhaps let’s not dwell on that too much… 🙂

What would it feel like to be a footballer with no goal? An actor with no stage? A projector with no screen? Or (finally getting to the point) a pseudohistorian with no infamous historical figure to attach his/her nutty theories onto?

All of which is why I feel sorry for poor old Leonardo da Vinci. He barely counts as a genuine historical figure any longer, for he has transformed into merely a blank canvas to be doodled upon by every new generation of messed-up researchers. Even the mention of his name in The Da Vinci Code is largely risible (he no more invented the ‘cryptex’ than the microwave oven). For every nutjob theory about Michelangelo, there must be a hundred crazy Leonardo ones: how they must be laughing at him in the Florentine Renaissance fama corner of Heaven.

Still, when you put a load of these fruity theories together, I (for one) come away with a reassuring sense of constancy: that the pareidoiliac capacity of the mass of human minds remains just as capable of finding new (yet often just as manifestly false as ever) ways of reading Leonardo’s works. So here are some recent ones you may not yet have heard of… probably for good reason, in most cases. Just so you know, I’ve placed them in broadly decreasing order of plausibility, to lull you into a frog-in-a-saucepan sense of false security.

(1) Might Giorgio Vasari have sealed Leonardo’s “Battle of Anghiari” mural behind a wall to preserve it? San Diego “art diagnostic specialist” Maurizio Seracini suspects he did, for when he worked on Santa Maria Novella, he sealed Masaccio’s fresco “Trinità” behind the wall on which he painted part of his “Madonna of the Rosary” – we know this to be true, because Masaccio’s original was rediscovered in 1861. And so Seracini is trying to build the most amazing camera in the world to peer through the wall, to see if Leonardo’s fresco is still at least partially there. And the evidence? “A tiny painted green flag” in Vasari’s picture, reading “‘Cerca, trova’ — seek and you shall find.” It’s not much, but is it enough?

(2) Not many people know that top-drawer da Vinci art historian Carlo Pedretti has long been hunting for a nude Mona Lisa: it’s a kind of Holy Grail of wobbly art history. In fact, Leonardo may well indeed have painted one, for there are a number of copies originating from the school surrounding the Florentine, all apparently from an original “Monna Vanna”. But is the one in the link Leonardo’s? Almost certainly not: but keep searching, Professor Pedretti, keep searching!

(3) In his imaginatively titled (but as yet unwritten) book-and-forthcoming-feature-film-documentary “The Mona Lisa Code”, Scott Lund thinks that Mona Lisa is an anagram of “Anima Sol”, and that she stands in for Janus in a deviously-crafted stereoscopic illusion, constructed around a map of Rome. Well, if it’s good enough for the Huffington Post, who am I to disagree? Personally, I’m rather more troubled by the anagram “No Salami”: did Leonardo intend the painting as pro-vegetarian propaganda? Or perhaps “Sal (sapit) omnia“? Once you start down that idiotic road, there really is no end to it. *sigh*

(4)-(6) If you’re suffering from intellectual poverty, here’s a bargain you can’t afford to turn down: three Last Supper theories for the price of one, courtesy of at Artden. Read all about Slavisa Pesci’s 2007 mirrored image wonderment; Giovanni Maria Pala’s 2007 claim that you can read a musical score from the hand-positions; and Sabrina Sforza Galitzia 2010 claim that there are hidden signs of the zodiac, pointing to a deluge to end the world starting on March 21st 4006 (but don’t worry, it’ll all be over by November 1st 4006).

(7) But finally, arguably the best of the lot is from Michelle Legro, an editor at Lapham’s Quarterly. Her hilarious post Top Chef, Old Master starts from the seed of [I think] truth that Leonardo was commissioned to automate the Sforza kitchens (though it all ended in disaster), but which she then grows into a wonderful towering wedding cake of nonsense. Sadly, the problem is that such gentle, well-informed satire is wasted on a world for whom mad Leonardo theories are ten-a-penny. I mean, why didn’t he just use his microwave oven? Tcha!