A look at the design and deployment strategies used for IEEE-VIT’s cryptic hunt.