All I can really say is that Jodie does her best to describe the sort of cipher used. It is very similar to Challenge 6B in spirit. But it is made harder by the way the manipulated text is read off. It is described in 7A, so I hope that will help. It might be a good idea to try to encrypt a short message using that recipe to see how it looks in practice.