This image reveals an Easter egg when the hedgehog is clicked or tapped. Another Easter egg can be found when amouse pointer is hovered over it.[1]
Message, image or feature hidden within a work
The secret room inAdventure withWarren Robinett's credit.Adventure is typically regarded as one of the first video games to feature an Easter egg.
AnEaster egg is a message, image, or feature hidden in software, a video game, a film, or another—usually electronic—medium. The term used in this manner was coined around 1979 by Steve Wright, the then-Director of Software Development in the Atari Consumer Division, to describe a hidden message in theAtari video gameAdventure, in reference to anEaster egg hunt.
The earliest known video game Easter egg is in the 1973 video gameMoonlander, in which the player tries to land aLunar module onthe Moon; if the player opts to fly the module horizontally through several of the game's screens, they encounter aMcDonald's restaurant, and if they land next to it, the astronaut will visit it instead of standing next to the ship. The earliest known Easter egg in software in general is one placed in the "make" command forPDP-6/PDP-10 computers sometime in October 1967–October 1968, wherein if the user attempts to create a file named "love" by typing "make love", the program responds "not war?" before proceeding.[2][3]
The use of the term "Easter egg" to describe secret features in video games originates from the 1980 video gameAdventure for theAtari 2600 game console, programmed by the employeeWarren Robinett. At the time,Atari did not include programmers' names in the game credits, both to prevent competitors from poaching its developers as well as to deny developers a means to bargain with the management of the new owners,Warner Communications.[4][5] Robinett, who disagreed with his supervisor over this lack of acknowledgment, secretly programmed the message "Created by Warren Robinett" to appear only if a player moves theiravatar over a specific pixel (dubbed the "Gray Dot") during a certain part of the game and enters a previously "forbidden" part of the map where the message can be found. When Robinett left Atari, he did not inform the company of the acknowledgment that he included in the game. Shortly after his departure, the "Gray Dot" and his message were discovered by a player. Atari's management initially wanted to remove the message and release the game again, until this was deemed too costly. Instead, Steve Wright, the Director of Software Development in the Atari Consumer Division, suggested that they keep the message and, in fact, encourage the inclusion of such messages in future games, describing them as Easter eggs for consumers to find.[6][7][8][9][10][11]
While Robinett's message inAdventure led to the first use of the phrase "Easter egg", Easter eggs were included in previous video games. The earliest known video game Easter egg is inMoonlander (1973), in which the player tries to land a spaceship on the Moon. If the player flies far enough horizontally, they encounter aMcDonald's restaurant, and if they land next to it, an astronaut will visit it instead of standing next to the ship.[12] Other early known Easter eggs include one in the first text adventure game,Colossal Cave Adventure (1976), from whichAdventure was fashioned, which includes several secret words. One of these is "xyzzy", a command which enables the player to move between two points in the game world.[13] According to research byEd Fries, one of the earliest Easter eggs in a graphical video games could be found inStarship 1 (1977), programmed by Ron Milner. By triggering the cabinet's controls in the right order, the player can have the message "Hi Ron!" appear on the screen. Fries describes it as "the earliest arcade game yet known that clearly meets the definition of an Easter egg". The existence of this Easter egg was not published until 2017, leading Fries to suggest that, as more than one hundred arcade games predateStarship 1, earlier Easter eggs may still be undiscovered.[14][15] Fries says that some Atari arcade cabinets were resold under theKee Games label and include changes to the hardware that make the game appear different from the Atari version.Anti-Aircraft II (1975) includes a means to modify the circuit board to make the airplanes in the game appear as alien UFOs. Fries surmises that this feature may have been intended for a Kee Games release. For this reason, and because it requires a hardware modification, Fries questions whether it meets the definition of an Easter egg.[15] In 2004, an Easter egg displaying programmer Bradley Reid-Selth's surname was found inVideo Whizball (1978), a game for theFairchild Channel F system.[6]
SinceAdventure, there has been a long history of video game developers placing Easter eggs in their games.[16]: 19 Most Easter eggs are intentional—an attempt to communicate with the player or a way of getting even with management for a perceived slight. Easter eggs in video games take a variety of forms, from purely ornamental screens to aesthetic enhancements that change some element of the game during play. The Easter egg included in the originalAge of Empires (1997) is an example of the latter;catapult projectiles are changed from stones to cows.[16]: 19
More elaborate Easter eggs includesecret levels and developers' rooms—fully functional, hidden areas of the game. Developers' rooms often include inside jokes from thefandom or development team and differ from adebug room in that they are specifically intended for the player to find. Some games even include hiddenminigames as Easter eggs. In theLucasArts gameDay of the Tentacle (1993), the originalManiac Mansion (1987) game can be played in its full version by using a home computer in a character's room.[17][18] Similarly, a programmer included the whole ofTimeSplitters 2 (2002) withinHomefront: The Revolution (2016), accessed by using a special code at an in-game arcade cabinet.[19]
Other Easter eggs originated unintentionally. TheKonami Code, a type ofcheat code, became an intentional Easter egg in most games, but it originated from Konami'sGradius (1985) for theNintendo Entertainment System. The programmer,Kazuhisa Hashimoto, created the code as a means to rapidlydebug the game by giving the player's avatar additional health and powers to easily traverse the game. These types of codes are normally removed from the game before it is shipped but, in the case ofGradius, Hashimoto forgot to remove it and the code was soon discovered by players. Its popularity inspired Konami to reuse the code and purposely retain it for many of its future games as an Easter egg.[6][17][20]
Technical issues may also create unintentional Easter eggs.Jon Burton, founder ofTraveller's Tales, said that many seemingly apparent Easter eggs in theirSega Genesis games came about as a result of introducing programming tricks to get around some of the difficulty they had in getting Sega's strict certification for their games,catching any exceptions during execution to bring the game back to a usable state as to pass certification. For example,hitting the side of theSonic 3D Blast (1996) cartridge while it is slotted in the console will bring the game back to the Level Select screen, which Burton explains is the default exception handling for any unidentified processor error, such as when connectivity between the cartridge and the console's microprocessor is temporarily lost.[21]
Incomputer software, Easter eggs are secret responses that occur as a result of an undocumented set of commands. The results can vary from a simple printed message or image to a page of programmer credits or a small video game hidden inside an otherwise serious piece of software.
In theTOPS-10 operating system (for the DECPDP-10mainframe computer), themake command is used to invoke theTECO editor to create a file. If given the file name argumentlove, so that the command readsmake love, it will pause and respondnot war? before creating the file.[2] The Easter egg was added sometime between October 1967 and October 1968 by William F. Weiher at theStanford AI Lab to the COMPIL program for the PDP-6, which was then used in the TOPS-10 operating system, making it the first Easter egg in a software program.[3] This same behavior occurs on theRSTS/E operating system, where TECO will provide this response.[citation needed] OtherUnixoperating systems respond to "why" with "why not" (a reference toThe Prisoner inBerkeley Unix, 1977).[citation needed]
TheDebian operating system's package toolapt-get has an Easter egg involving anASCII cow when variants onapt-get moo are typed into the shell.[26][27][28]
Animation showing Easter eggs in Google'sAndroid operating system
An Easter egg is found on all Microsoft Windows operating systems beforeXP. In the 3D Textscreen saver, entering the text "volcano" will display the names of all thevolcanoes in the United States. Microsoft removed this Easter egg in XP but added others.[29] In Windows Vista and later, by launching a screensaver executable (introduced with Windows Vista) on the command line with the/p65552 flag, for example launching the "bubbles" screen saver withbubbles.scr /p65552 command-line parameter, it runs asdesktop wallpaper.[30]Microsoft Excel 95 contains a hidden action game similar toDoom (1993) calledThe Hall of Tortured Souls.[31]
The Google search engine famouslycontains many Easter eggs, given to the user in response to certain search queries.[32]
Steve Jobs banned Easter eggs from Apple products upon his return to the company.[33] The first Easter egg to appear after his death is in a 2012 update to theMac App Store forOS X Mountain Lion, in which downloaded apps are temporarilytimestamped as "24 January 1984", the date of the sales launch of the originalMacintosh.[33]
ThePython programming language and its ecosystem of libraries include various Easter eggs.[34]
While computer-related Easter eggs are often found in installedsoftware, occasionally they exist in thefirmware of certain devices. On somehome and earlypersonal computers theROM contains Easter eggs, including lists of the developers' names, political exhortations, snatches of music, or images of the entire development team.
Thepalmtop PCHP200LX (1994) includes an undocumented hex calculatorHEXCALC.EXM. The built-in maze game "Lair of Squid" incorporates a hidden gallery of the software developers. In test mode it displays several poems.
Other notable examples include some versions of theAMI BIOS that on 13 November 1993, proceeded to play "Happy Birthday" via the PC speaker repeatedly instead ofbooting,[35] as well as several earlyApple Macintosh models that have photos of the development team in the ROM. These Mac Easter eggs were well-publicized in the Macintosh press at the time[36] along with the means to access them, and were later recovered by an NYC Resistor team, ahacker collective, through elaboratereverse engineering.[37][38] Similarly, theRadio ShackColor Computer 3's ROM contains code which displays what looks like threeMicroware developers on aCtrl+Alt+Reset keypress sequence—a hard reset which discards any information currently inRAM.[39]
Severaloscilloscopes contain Easter eggs. One example is the HP 54600B[when?], known to have aTetris (1985) clone,[40] and the HP 54622D[when?] contains an imitation of theAsteroids (1979) game namedRocks.[41] Another is theTektronix 1755A[when?] Vector and Waveform Monitor which displays swimming fish when Remote > Software version is selected on the CONFIG menu.[42]
In the second and third hardware revision of theMinolta Dynax/Maxxum/Alpha 9 (introduced in 1998)SLR camera, including all SSM/ADI upgraded bodies (since 2003), an undocumented button sequence can be utilized to reconfigure the camera to behave like the Dynax/Maxxum/Alpha 9Ti (1999) and subsequently invoke support for the limited model's extra functions also in the black model.[43][44][45][46]
The firmware of HP'sScanJet 5pimage scanner contains an easter egg wherein, on a cold power-on, holding down the scan button when the SCSI ID selector on the back is set to "0" will cause the ScanJet to play a rendition ofSchiller's "Ode to Joy", by modulating the speed of the audible stepper motor drive to produce specific pitches.[48][49]
TheCommodore Amiga 1000 computer includes the signatures of the design and development team embossed on the inside of the case, including Jay Miner and the paw print of his dog, Mitchy.[50] TheCommodoreAmiga models 500, 600, and 1200 each feature Easter eggs in the form of song titles bythe B-52's as white printing on themotherboards. The 500 says "B52/Rock Lobster", the 600 says "June Bug", and the 1200 says "Channel Z".[51] TheAmiga OS software contains hidden messages.[52][53]
Manyintegrated circuit (chip) designers have included hidden graphics elements termedchip art, including images, phrases, developer initials, logos, and more. This artwork, like the rest of the chip, is reproduced in each copy bylithography andetching. These are visible only when the chip package is opened and examined under magnification.[54] The 1984 CVAX microchip implementation of theMicroVAX CPU contains in its etchings theRussian phrase in theCyrillic alphabet "VAX: When you care enough to steal the very best",[55] placed there because, "knowing that some CVAXs would end up in the USSR, the team wanted the Russians to know that we were thinking of them".[54]
Another notable example is thepro controller for theNintendo Switch, on the controller'smotherboard, if a player holds down on the right stick and looks closely into the transparent plastic surrounding its socket while shining a light on it, there is a hidden message that reads "THX2ALLGAMEFANS!". The message was discovered by Japanese Twitter user Geo Stream on March 4, 2017, one day after the Switch's launch.
In 2000,Al Milgrom inserted a message intoUniverse X: Spidey #1 insulting his previous boss, Marvel Editor in ChiefBob Harras, following Harras' termination fromMarvel Comics. On Page 28, panel 3, the spines of books on a bookshelf in the background read, "HARRAS HA HA, HE'S GONE, GOOD RIDDANCE TO BAD RUBBISH HE WAS A NASTY S.O.B." The message was spotted after the book was printed but before it went on sale; the copies that were printed for consumers were destroyed. However, 4,000 preview copies were distributed to retailers as part of a "First Look" deal, and these are today considered rare collectors' items. Milgrom was "apparently fired and allegedly (and quietly) re-hired several weeks later".[57][58][59]
Ethan Van Sciver hid the word "sex" in the background of nearly every page ofNew X-Men #118 (November 2001).[57][60] Van Sciver subsequently stated that he hid the word throughout the book because he was annoyed with Marvel at the time for reasons he cannot remember, and thought it would be fun to engage in some mischief with his work.[citation needed]
Indonesian artistArdian Syaf is known to engage in the practice of hiding Easter egg references to political figures in the backgrounds of his artwork. InBatgirl (vol. 4) #9 (July 2012), Syaf included a storefront sign that referenced thePresident of Indonesia,Joko Widodo, although the text that accompanies the image of Widodo is covered by a caption.[57][61] In April 2017, he causedan outcry by placing Easter egg references to theNovember 2016 Jakarta protests into the pages ofX-Men Gold #1, which were perceived by readers to beanti-Semitic andanti-Christian. Though Syaf acknowledged the political nature of the messages,[57][62] he stated that they were not intended to express any anti-Semitic nor anti-Christian sentiment on his part.[63] In response to these Easter eggs, Marvel terminated their contract with Syaf.[64]
Easter eggs are found on films,DVDs, andBlu-ray Discs, often as deleted scenes or bonus features.[65][66][67] Klinger states that their presence is "another signifier of artistry in the world of DVD supplements."[66] According to Americanfilm criticsJames Berardinelli andRoger Ebert, most DVDs do not contain them and most examples are "inconsequential", but a few, such as the one found on theMemento DVD release, are "worth the effort to seek out".[67]
Unlike DVDs and computer games, broadcast radio and television programs contain no executable code. Easter eggs may still appear in the content itself, such as ahidden Mickey in a Disney film or a real telephone number instead of a555fictitious telephone number.[original research?] A2014 Super Bowl advertisement was leaked online in which a lady gives a man a real telephone number, which the advertiser had hidden as a marketing ploy; the first caller to the number received a pair of tickets to the game.[68] The 1980s animated seriesShe-Ra: Princess of Power featured a character namedLoo-Kee who typically appeared once per episode, hidden in a single screenshot. At the end of the episode, the screenshot would be shown again and Loo-Kee would challenge viewers to locate him before revealing his hiding place.[69][70]Adventure Time also had a character known as The Snail that was hidden in almost every episode of the show.[71]
More recent broadcast media, where viewers have access to high-resolution digital copies or streaming services, may include further Easter eggs that can only be found by freezing the show at certain points. In the anthology seriesBlack Mirror, the producers have included Easter eggs that reference past episodes, or tie into future episodes, as a means of loosely tying together all episodes into a singleBlack Mirror universe.[72] The opening credits of Season 2 of the animated seriesArcane: League of Legends feature Easter eggs that foreshadows the episode. They generally could only be found by pausing the sequence at certain points.[73] Consequently, the introductions to each episode of the season slightly differs from each other. TheNetflix seriesStranger Things had a real-world Easter Egg where a pizza delivery van featured in the show's fourth season had the phone number (805) 45-PIZZA shown on its side. If that number, which translated to 805-457-4992 was dialed, it led to a special message from Argyle, the fictional restaurant's delivery driver.[74]
Security author Michel E. Kabay discussed security concerns of Easter eggs in 2000, saying that, while software quality assurance requires that all code be tested, it is not known whether Easter eggs are. He said that, as they tend to be held as programming secrets from the rest of the product testing process, a "logic bomb" could also bypass testing. Kabay asserts that this undermined theTrusted Computing Base, a paradigm of trustworthy hardware and software in place since the 1980s, and is of concern wherever personal or confidential information is stored, as this may then be vulnerable to damage or manipulation.[75] Microsoft created some of the largest and most elaborate Easter eggs, such as those inMicrosoft Office.[76] In 2005, Larry Osterman of Microsoft acknowledged Microsoft Easter eggs, and his involvement in development of one, but described them as "irresponsible", and wrote that the company'soperating system division "has a 'no Easter Eggs' policy" as part of itsTrustworthy Computing initiative.[25]
In 2006,Douglas W. Jones said that while "some Easter eggs may beintentional tools used to detect illegal copying, others are clearly examples of unauthorized functionality that has slipped through the quality-control tests at the vendor". While hidden Easter eggs themselves are harmless, it may be possible formalware to be hidden in similar ways in voting machines or other computers.[77]
Netscape Navigator contributorJamie Zawinski stated in an interview in 1998 that harmless Easter eggs impose a negligible burden on shipped software, and serve the important purpose of helping productivity by keeping programmers happy.[78]
Easter eggs have become more widely known to the general public and are referenced in contemporary artworks.
In theDoctor Who episode "Blink", the existence of video Easter eggs across seventeenDVDs leads to solving the protagonists' dilemma.[79]
InErnest Cline's novelReady Player One and itsfilm adaptation, the protagonists are competing with others to find various Easter eggs within a largevirtual reality environment. The final challenge includes identifying and reaching the Easter egg from the AtariAdventure game.[80]
^abcWolf, Mark J. P. (2012).Encyclopedia of Video Games: The Culture, Technology, and Art of Gaming. Santa Barbara, California, USA: Greenwood. p. 177.ISBN9780313379369.
^Salen, Katie; Zimmerman, Eric (2005).The Game Design Reader: A Rules of Play Anthology. Cambridge, Massachusetts, USA:MIT Press. pp. 690–713.ISBN0262195364.OCLC58919795.
^"Letter to Atari"(PDF).2600 Connections. 4 August 1980. Archived from the original on 13 October 2016. Retrieved2 September 2016.
^abConsalvo, Mia (2007).Cheating: Gaining Advantage in Videogames. Cambridge, Massachusetts, USA:MIT Press.ISBN9780262033657.
^abBjörk, Staffan; Holopainen, Jussi (2005).Patterns In Game Design (1st ed.). Hingham, Massachusetts, USA: Charles River Media. p. 235.ISBN9781584503545. Retrieved25 January 2013.
^"Optical Information Systems Update/library & Information Center Applications".CD-ROM World.9 (1–5). Meckler Publishing. February 1994. Retrieved4 November 2017.The best Easter egg of all is the entire Maniac Mansion game, which appears on a computer in Doctor Fred's mansion. Users can play the original game in its entirety.
^Paul, Matthias R. (24 December 2010)."Zusätzliche Funktionen für die Minolta Dynax 9 - Kleine Bescherung: Und es geht doch - 9Ti-Funktionen für Dynax 9" [Extra functions for the Dynax 9 - a little Christmas present: Against all odds, it works: 9Ti functions on the Dynax 9].Mi-Fo (in German). Archived fromthe original on 23 July 2016. Retrieved1 May 2014. (NB. Description of an undocumented activation procedure to enable the extra functions of the Minolta Dynax/Maxxum/Alpha 9Ti limited edition model on all standard black Dynax/Maxxum/Alpha 9 bodies equipped with second and third PCB revision, including all bodies with SSM/ADI upgrade.)
^Paul, Matthias R. (25 June 2006)."Maxxum 9 Update?".Shutterbug. Archived fromthe original on 27 October 2006.[…] the SSM/ADI upgrade does not incorporate upgrading a black body to 9Ti specs, functions-wise. That is, the extra custom functions (except for 20-4) still do not normally exist on black bodies after the upgrade. Of course, 9Ti bodies do not lose their extra functions during the upgrade. […] Die-hard Minolta fans of the "black beauty" may feel free to contact […] if their camera body is either SSM/ADI upgraded already or shows the above mentioned improved behaviour. I may have some extra sweets for you... […] (NB. Not related to the undocumented button sequence revealed in the2010 post but giving general background on the subtle differences of the camera variants and already hinting on a more elaborate internal configuration file manipulation hack to switch camera profiles.)
^Corrigan, Patricia (2007).Bringing Science to Life: A Guide from the Saint Louis Science. St. Louis, Missouri, USA: Reedy Press. p. 69.ISBN9781933370163.
^Compute!.12 (6–9). Small System Service. 1990.{{cite journal}}:Missing or empty|title= (help)