Inquisition IconThe Crimson Vault

+++ Inquisitorial Case Files +++

Log In / Register

Welcome, Guest

Frequently Asked Questions

How do I solve a Case?

Once you have reviewed all the Evidence in a given case and want to resolve the case, click the "Ready to Solve the Case" button at the bottom of the Case Evidence list page. From there, pick the correct answer from those given.

Once you have answered the primary question, you will be asked up to 5 additionl questions, which are worth extra points.

Not all Evidence is present on the Case Evidence screen, how do I access the missing Evidence?

Not all Evidence is easily linked to specific Cases and you look for Evidence links within the existing Evidence you do have access to.

Just re-read the Evidence you already have access to and look for any attachments, or mentions of Evidence references.

Evidence A may link to B and B may even link to C.

Are there any hints or tips?

Our Hints page can be found here. You can also email us at hints@crimsonvault.net. Please note that it may take a few days to respond as there is presently only a one person operating this website (and life tends to get in the way most of the time!).

How are Cases scored?

Scores are marked out of 100%.

Each Case has an overall conclusion that is is worth 75%.

There are also up to 5 bonus questions for each Case, worth at least 5% each.

Please note that the bonus questions may be different for different Inquisitors!

A Case is only marked as "completed" if you have scored 100% at least once.

Is there a Walkthrough available?

We have published one complete walkthrough for the first Case, available here.

What is an Encrypted file?

Certain pieces of Evidence are hidden away on encrypted data files which require 2 pieces of information to unlock and become readable.

One is the file password and should be contained in another item of Evidence.

The other is the encryption scheme used to decrypt the message. Again, this will be mentioned, directly or indirectly, in other pieces of Evidence.

It is very uncommon for the password & encryption scheme to be contained in the same piece of Evidence.

Encrypted data files may contain sub-files for you to read, which is highly suggested that you read all available sub-files once you have decrypted the data file itself.