#mitm the series
Explore tagged Tumblr posts
Text
📢 Mystique In The Mirror update after 84 years?? One of the main actors posted and another shared this igs just now:
![Tumblr media](https://64.media.tumblr.com/5eb62fa9f786ebbb61a15fb2e5df1893/f2a1904ae78672a5-3a/s540x810/e1d4506b02d5da2c45be2cbd09ae85641e2d26ca.jpg)
WILL WE FINALLY GET IT????
Reasons you too should be hyped for this series:
![Tumblr media](https://64.media.tumblr.com/a0e883c66c3b4cea3f680527cfa8a2e8/f2a1904ae78672a5-03/s540x810/1e67e8880be818a5c29cf669b34960b50191df6d.jpg)
1. The Plot: Alan's life changes when he starts seeing the ghost of an old man in the mirror, his dad thinks they're hallucinations & sends him to a psychiatric hospital. There, Alan meets Darwin, the guy in the room next door, and the two develop a bond. [It's adapted from a novel by Patrick Rangsimant (author of My Ride and My Mate Match)].
2. Old Men Yaoi with Nat Sakdatorn and Kik Danai as a side couple:
![Tumblr media](https://64.media.tumblr.com/098de441b24f7d168bbc84017f6642ad/f2a1904ae78672a5-ab/s540x810/b116357fc1c40971242d92d8e085d2c76fe78540.jpg)
![Tumblr media](https://64.media.tumblr.com/62c64f95fa2a56916bd59a196aa4ae18/f2a1904ae78672a5-83/s540x810/a20cf25e666e8938a2f165e968e1f05170fe1e4c.jpg)
3. Sugus and Tenon (Golden Blood) again as a side couple:
![Tumblr media](https://64.media.tumblr.com/bd76efa5eb06bd7cd61e0de7896a3db3/f2a1904ae78672a5-cc/s540x810/b5237fb6c398809dd63e036aa8b609afd69234cd.jpg)
![Tumblr media](https://64.media.tumblr.com/1eae9c11d5d96748ae3c6133589d808c/f2a1904ae78672a5-c7/s540x810/ea377d3149e01e439d1c50241a7091ce160843a8.jpg)
#GIBB ME NAAAAOOOOO#they had finished filming in march 2023 and i've been on the edge ever since#mystique in the mirror the series#mitm the series#nat sakdatorn#sugus buntawit#tenon teachpat#tou sedthawut#pentor jeerapat#kik danai#official poster#pic cr mitm ig#blmpff
34 notes
·
View notes
Text
MALCOLM IN THE MIDDLE REVIAL???
HOLY SHIT
i only started watching the show for the first time a couple of months ago and it’s become my current hyperfixation, AND WE’RE GETTING NEW CONTENT???
literally so PERFECT i only recently got into it, omgggg
#mitm#malcolm in the middle#it’s only a limited series but that’s fine with me! i am actually happy it’s only a limited series
6 notes
·
View notes
Text
Collab Event PV
youtube
New Operators
![Tumblr media](https://64.media.tumblr.com/69debf4f6e8faef0a6fd6a0c2d209af9/674da0a2e87bc707-f6/s540x810/a628b6de8754b32cb43d4aff64665fd364a26ef3.jpg)
Senshi, 5* Collab Welfare Guardian Defender
Now, which is the better dish to make...?
Chilchuck, 5* Collab Agent Vanguard
For the record, i'm only a scout, don't expect me to fight.
Laios, 5* Collab Dreadnought Guard
I can't help but notice, but you're actually quite interested in monster cuisine, right?
Marcille, 6* Collab Splash Caster
It's just like what i used to do back in the Magic Academy, I've learned how to use all the magical instruments you have here, so don't worry and leave it all to me!
I just had a full meal and now i have plenty of magical energy to spare.
Operator Outfits Update
![Tumblr media](https://64.media.tumblr.com/1573afcf3a250cd3bbaccbad7619cd22/674da0a2e87bc707-d3/s540x810/e5ca585aedf2d5df12e71851b435f2b6871c50d4.jpg)
![Tumblr media](https://64.media.tumblr.com/ebd69e8f72c040fc5223d132d8bb9d62/674da0a2e87bc707-56/s540x810/e7a919a4e8065c913779dc98b66156f3839380e9.jpg)
![Tumblr media](https://64.media.tumblr.com/2e8d153e59452b77d05b19c9ccaeef5a/674da0a2e87bc707-78/s540x810/b00af1b69cce33c30722b087aea62caefc9e8325.jpg)
![Tumblr media](https://64.media.tumblr.com/b84b27c93332eb409e3c827fe24404fc/674da0a2e87bc707-c9/s540x810/9b75469644f6ecb0b25660009881c5de2a23070a.jpg)
![Tumblr media](https://64.media.tumblr.com/a00c2be9c80ff387fe377b9853ba2b3c/674da0a2e87bc707-fc/s540x810/2c60bb29ee4eecd4cb62a4974921b7917881b8f6.jpg)
![Tumblr media](https://64.media.tumblr.com/3ea758e5696791908e643fb5db4323aa/674da0a2e87bc707-24/s540x810/9b7995ffec6715763516eaf649d68fa16f87337c.jpg)
![Tumblr media](https://64.media.tumblr.com/3284fb79851fbc27e9ddc57877cb6944/674da0a2e87bc707-22/s540x810/52feb358a8e4b6e5a98a906f662e1fd758a28601.jpg)
![Tumblr media](https://64.media.tumblr.com/e60815abdb498de51344ce1b6b1f045e/674da0a2e87bc707-f7/s540x810/6b3b0b4f9616ba1c8df231b98ac8e4d01d09cd32.jpg)
Total of 7 new outfits, a new collab outfit, 4 new additions for the Achievement Star brand, 1 new addition for the Raythean Striker brand and 1 new addition for the 0011/Yun brand
Collab Series
Terra & Traveller - Marcille
Achievement Star
The Archivist and Her Pilgrimage - Leizi
The Apprentice and Her Aura - Kroos the Keen Glint
The Adjudicatrix and Her Resolve - Irene
The Zoophilist and Her Mollusca - Vanilla (Event Reward)
0011/Yun
Moon Under The Pines - Wind Chimes
Raythean Striker
Dawnbreak - Coldshot
Coldshot's outfit will be up for sale during Come Catastrophes and Wakes of Vultures Retrospect
Vanilla's outfit is a reward from Vector Breakthrough
![Tumblr media](https://64.media.tumblr.com/901645f92b97fb5e00219fda40a2769d/674da0a2e87bc707-13/s540x810/398862d7ed8bf88241a51c3959843e9b8759f13e.jpg)
![Tumblr media](https://64.media.tumblr.com/460269e5a893a9aabf1bf0bd548ec81c/674da0a2e87bc707-ce/s540x810/48510ed9516410e348423e1e0be0990d88d7d17a.jpg)
Announced a rerun for Akafuyu, Mountain and Wild Mane's Epoque outfits, up for sale at the same time as the new Achievement Star outfits
Operator Modules Update
![Tumblr media](https://64.media.tumblr.com/4f4c6f0fc9728a64ab89c81296a423af/674da0a2e87bc707-52/s540x810/d03e278082896f624290db9bcb8590b4b42ac4ee.jpg)
![Tumblr media](https://64.media.tumblr.com/631d0315ebd7084b3ecc6d404f1725e4/674da0a2e87bc707-7a/s540x810/8afec0f7c7db1ff601075205fcc124f6207bba96.jpg)
![Tumblr media](https://64.media.tumblr.com/f95de42852ebb54cea17bdfc999186c4/674da0a2e87bc707-96/s540x810/cf300943b1e39f1c02165068fb028f2f0ff09c08.jpg)
All the collab operators immediately get their modules including Chilchuck despite being part of a branch that DOESN'T have a module yet
SPC-Y module base effect reduces Marcille's deployment cost by -8 DP
DRE-Y module base effect allows Laios to revive himself and gain a +30 ASPD boost at the cost of reducing his Max HP by -60% once per deployment
The base effect of Chilchuck's module is unknown at the time of writing
GUA-Y module base effect makes Senshi take 15% less damage
Crusher Guard branch gets 1 module type
Irene gets her 2nd module
SWO-X module base effect makes Irene's skills deal 10% more damage
Events and Stories
![Tumblr media](https://64.media.tumblr.com/ff14b8bc5d49355393340e2e719ae486/674da0a2e87bc707-9a/s540x810/2626e2483f3c11bffbf4f930e9b0bd0bfdcf429b.jpg)
Delicious on Terra, a limited collaboration side story event
When adventuring with no way back, don't ask where the food comes from, you can't defeat monsters on an empty stomach. "Eat and be eaten", is it a cruel curse, or a natural law? A never before seen place, an unfamiliar menu—— i don't care about all that, let's chow down!
![Tumblr media](https://64.media.tumblr.com/16e8d77fbd783e32c0aa27fa3a6c9be4/674da0a2e87bc707-6b/s540x810/f1c20bd2bbe00230d385c9fd598c997fd3730634.jpg)
Operator Archives update for Goldenglow, Eunectes, Mitm and Courier
![Tumblr media](https://64.media.tumblr.com/07de25b3d618c1ee94421c867146ff0b/674da0a2e87bc707-89/s540x810/781745c167bdb20c9f6a4d848e1f2d1c8f1f3566.jpg)
![Tumblr media](https://64.media.tumblr.com/0acc1a59e30e65a467495233cb1b2871/674da0a2e87bc707-52/s540x810/fb4dfd5c29408f40268cd1d13d0c9321c90e1e5b.jpg)
Come Catastrophes and Wakes of Vultures Retrospect, scheduled after Delicious on Terra
Vector Breakthrough, an improved version of Interlocking Competition, scheduled after Come Catastrophes and Wakes of Vultures Retrospect
Misc Stuff
![Tumblr media](https://64.media.tumblr.com/15a8068e23cbce9ca83b04543051c879/674da0a2e87bc707-91/s540x810/ce0b5c622f8c966192c44d83458fee24641c974a.jpg)
![Tumblr media](https://64.media.tumblr.com/1f73955874a139a219a8b2f2f1f61ec5/674da0a2e87bc707-74/s540x810/c44058a56d4267107d37f34c2ad34583fbf56f9a.jpg)
Tuye and her potential tokens along with Myrrh's [Bitter Herbs] Outfit will be available in the certs shop to players that don't have them
Special collab profile icon pack and collab main menu background + UI theme pack sold in the shop during collab event period
85 notes
·
View notes
Note
zoned out,, Favorite series Favorite movie Favorite book otp When/why did you join tumblr do you have a playlist i could steal opinions on this monstrosity: 👁️W👁️
band/artist reccomendations? Favorite fandom?
Sorry all the boops crashed my Tumblr
1. Idk, hard to say. Probably Sonic Underground
2. Again, hard to choose, though I suppose my favorite would probably be Jaws (3D specifically) or Coraline (mainly 3D but also normal)
3. The Last Book in The Universe
4. Idk what otp means
5. Why? Can't remember. When? Can't remember.
6. Yes!
7. 👍
8. MITM (Milk In The Microwave), femtanyl, spellcasting (made most of the regretevator songs), Chonny Jash and Odetari!
9. M O U T H W A S H I N G
7 notes
·
View notes
Note
which of your wips are you most looking forward to publishing?
oooo i like this question!! considering i have over 40 wips/requests, i have a few lol
the fella part 11 (james maguire, derry girls). the fella is the first (and only so far) fic series ive made on here, and it's so close to the end. plus part 11 is based on the prom episode (S2E5) and i think it'll be both angsty and cute between james and the reader. although part 12 will (hopefully) be even more angsty and cute bc it's the episode where james almost leaves derry
color with no sight (benny weir, mbav). it's a soulmate au where you dont see color until you meet your soulmate. benny and reader are (obvi) soulmates but reader's blind, so benny doesn't know how to tell her.
just a game (malcolm wilkerson, mitm). malcolm gets dared to play one of those dancing arcade games, but he ends up being really good at it. but then he slowly becomes obsessive with it bc someone keeps beating his high score, so this indirect competition develops until malcolm finally sees reader at the arcade beating his score for the hundredth time lol
a psychopath and a chatterbox (james, teotfw). set in college/uni, reader and james gets stuck in an elevator together. james thinks about killing her until she starts talking about anything and everything, which throws him off
theres probably other ones im excited about, but these are definitely at the very top lol idk when they'll be finished tho, so dont be surprised if other stuff gets published first or these take a while to post (especially the fella, those chapters always take so long to write)
#agaypanic#agaypanic answers#writers of tumblr#writers on tumblr#fanfic writing#fanfiction writer#james maguire x reader#james maguire#derry girls x reader#derry girls#benny weir x reader#benny weir#my babysitter's a vampire#my babysitter's a vampire x reader#malcolm wilkerson x reader#malcolm wilkerson#malcolm in the middle#malcolm in the middle x reader#teotfw james x reader#teotfw james#teotfw#teotfw x reader
13 notes
·
View notes
Text
I wanted to talk about Frisk from my three AU's! The Growing Pains fanfic series, the River Person AU, and the Monster in the Mountain fanfic. The three of them all stem from the same timeline.
Specifically, I want to talk about their differences and similarities at the point of age 20ish. More below! 👇
Growing Pains Frisk!
🌻Dated just three people before they turned 21.
🌻More understanding and patient.
🌻Due to growing up around goofballs, they're funnier and sillier than their other two counterparts.
🌻A lethally terrible cook 🔥
🌻Very good at lying and keeping secrets.
🌻More depressed (than MitM Frisk)
🌻The biggest softie of the three.
Monster in the Mountain Frisk!
🖤Did a ton of dating in their teens, so they're more experienced in Romance than their other two counterparts. (No Asriel to distract them during that time!)
🖤A little more headstrong with their wants and needs.
🖤Can cook fairly better (than their two counterparts) (was forced to practice)
🖤After doing Asriel's puzzles, they became much more stronger and athletic.
🖤More prone to overthinking (than Growing Pains Frisk)
🖤More anxious (than Growing Pains Frisk)
🖤Might actually be a year older than they think due to Asriel ripping holes through time and space.
River Person Frisk!
👤Too busy and scared to even think about dating in their teen years. But once they became River Person they still keep their distance but definitely attempt to flirt with monsters their own age.
👤The most timid and easily frightened of the three, but the most excellent under pressure.
👤 They do NOT cook, instead they buy already-cooked meals and eat the food that they receive as tips from their patrons.
👤Very badly vitamin D deficient, either sleeps too much or not at all, physically weakest but somehow the best swimmer of the three, and also a master lock picker!
👤Better at keeping secrets and lying than even GP Frisk.
👤More anxious and depressed than the other two.
👤Has no idea how old they actually are, they grow slowly and lose count after age 17 due to the glitches and remembering erased timelines, it becomes even worse after Flowey's numerous Resets.
Similarities between GP Frisk and MitM Frisk and River Frisk.
✨All are equally flirty, lol.
✨All are very goofy and golden retriever-based.
✨All are equally Determined.
✨All are artists!
#undertale#undertale au#frisk#undertale frisk#adult!frisk#nonbinary frisk#fanfic Growing Pains#fanfic Monster in the Mountain#frisk the river person#river person au#fic growing pains#fic Monster in the Mountain#(pats River Person) you can fit so much trauma in this baby#AND I THOROUGHLY APOLOGIZE!!!!!!
4 notes
·
View notes
Text
2023/03/04 El desfile consta de una serie de agrupaciones que hace espectáculos callejeros con una temática variada, centrada en la crítica a la sociedad local, nacional o internacional. Todo desde el humor que caracteriza a los habitantes de esta tierra.
The parade consists of a series of groups that perform street shows with a varied theme, focused on criticizing local, national or international society. Everything from the humor that characterizes the inhabitants of this land.
Google Translation into French: Le défilé consiste en une série de groupes qui exécutent des spectacles de rue avec un thème varié, axés sur la critique de la société locale, nationale ou internationale. Tout de l'humour qui caractérise les habitants de cette terre.
Google translation into Italian: Il corteo consiste in una serie di gruppi che eseguono spettacoli di strada con un tema vario, incentrato sulla critica della società locale, nazionale o internazionale. Tutto l'umorismo che caratterizza gli abitanti di questa terra.
Google Translation into Portuguese: O desfile é composto por uma série de grupos que realizam apresentações de rua com temática variada, com foco na crítica da sociedade local, nacional ou internacional. Todo o humor que caracteriza os habitantes desta terra.
Google Translation into German: Die Parade besteht aus einer Reihe von Gruppen, die Straßenaufführungen mit unterschiedlichen Themen aufführen, die sich auf die Kritik an der lokalen, nationalen oder internationalen Gesellschaft konzentrieren. All der Humor, der die Bewohner dieses Landes auszeichnet.
Google Translation into Albanisch: Parada përbëhet nga një numër grupesh që performojnë shfaqje në rrugë me tema të ndryshme, duke u fokusuar në kritikat ndaj shoqërisë lokale, kombëtare apo ndërkombëtare. Gjithë humori që karakterizon banorët e këtij vendi.
Google Translation into Armenian: Շքերթը բաղկացած է մի շարք խմբերից, որոնք տարբեր թեմաներով փողոցային ներկայացումներ են կատարում՝ կենտրոնանալով տեղական, ազգային կամ միջազգային հասարակության քննադատության վրա: Այն ամբողջ հումորը, որը բնութագրում է այս երկրի բնակիչներին։
Google Translation into Bulgarian: Парадът се състои от редица групи, изпълняващи улични представления с различни теми, фокусирани върху критиката на местното, национално или международно общество. Целият хумор, който характеризира жителите на тази страна.
Google Translation into Czech: Průvod se skládá z řady skupin předvádějících pouliční představení s různými tématy se zaměřením na kritiku místní, národní nebo mezinárodní společnosti. Veškerý humor, který charakterizuje obyvatele této země.
Google Translation into Croatian: Parada se sastoji od niza skupina koje izvode ulične performanse s različitim temama, fokusirajući se na kritiku lokalnog, nacionalnog ili međunarodnog društva. Sav humor koji karakterizira stanovnike ove zemlje.
Google Translation into Danish Paraden består af en række grupper, der optræder med gadeoptrædener med forskellige temaer, med fokus på kritik af det lokale, nationale eller internationale samfund. Al den humor, der kendetegner indbyggerne i dette land.
Google Translation into Slovak: Prehliadku tvorí množstvo skupín predvádzajúcich pouličné predstavenia s rôznymi témami, ktoré sa zameriavajú na kritiku miestnej, národnej alebo medzinárodnej spoločnosti. Všetok humor, ktorý charakterizuje obyvateľov tejto krajiny.
Google Translation into Slovenian: Parado sestavljajo številne skupine, ki izvajajo ulične predstave z različnimi temami, ki se osredotočajo na kritiko lokalne, nacionalne ali mednarodne družbe. Ves humor, ki je značilen za prebivalce te države.
Google Translation into Estonian: Paraadil osalevad mitmed rühmad, kes esitavad erinevate teemadega tänavaetendusi, keskendudes kohaliku, riikliku või rahvusvahelise ühiskonna kriitikale. Kogu huumor, mis selle riigi elanikke iseloomustab.
Google Translation into Suomi: Paraati koostuu useista ryhmistä, jotka esittävät katuesityksiä eri teemoilla keskittyen kritiikkiin paikallista, kansallista tai kansainvälistä yhteiskuntaa kohtaan. Kaikki huumori, joka luonnehtii tämän maan asukkaille.
Google Translation into Greek: Η παρέλαση αποτελείται από μια σειρά από ομάδες που πραγματοποιούν παραστάσεις δρόμου με διαφορετικά θέματα, εστιάζοντας στην κριτική της τοπικής, εθνικής ή διεθνούς κοινωνίας. Όλο το χιούμορ που χαρακτηρίζει τους κατοίκους αυτής της χώρας.
Google Translation into Dutch: De stoet bestaat uit een aantal groepen die straatoptredens uitvoeren met verschillende thema's, waarbij kritiek op de lokale, nationale of internationale samenleving centraal staat. Alle humor die de inwoners van dit land kenmerkt.
Google Translation into Norwegian: Paraden består av en rekke grupper som fremfører gateforestillinger med ulike temaer, med fokus på kritikk av lokalt, nasjonalt eller internasjonalt samfunn. All humoren som preger innbyggerne i dette landet.
Google Translation into Polish: Parada składa się z kilku grup wykonujących występy uliczne o różnej tematyce, skupiające się na krytyce społeczeństwa lokalnego, narodowego lub międzynarodowego. Cały humor, który charakteryzuje mieszkańców tego kraju.
Google Translation into Romanian: Parada este formată dintr-un număr de grupuri care susțin spectacole de stradă cu diferite teme, axându-se pe critica la adresa societății locale, naționale sau internaționale. Tot umorul care îi caracterizează pe locuitorii acestei țări.
Google Translation into Russian: Парад состоит из нескольких групп, исполняющих уличные представления на разные темы, с акцентом на критику местного, национального или международного общества. Весь юмор, который характеризует жителей этой страны.
Google Translation into Serbian: Парада се састоји од више група које изводе уличне перформансе са различитим темама, фокусирајући се на критику локалног, националног или међународног друштва. Сав хумор који карактерише становнике ове земље.
Google Translation into Swedish: Paraden består av ett antal grupper som framför gatuföreställningar med olika teman, med fokus på kritik av det lokala, nationella eller internationella samhället. All humor som kännetecknar invånarna i detta land.
Google Translation into Turkish: Geçit töreni, yerel, ulusal veya uluslararası toplumu eleştirmeye odaklanan, farklı temalarda sokak performansları sergileyen bir dizi gruptan oluşuyor. Bu ülkenin sakinlerini karakterize eden tüm mizah.
Google Translation into Ukrainian: Парад складається з кількох груп, які виконують вуличні виступи на різні теми, зосереджуючись на критиці місцевого, національного чи міжнародного суспільства. Весь гумор, який характеризує жителів цієї країни.
Google Translation into Arabic: يتكون العرض من عدد من المجموعات التي تقدم عروض في الشوارع بمواضيع مختلفة ، مع التركيز على نقد المجتمع المحلي أو الوطني أو الدولي. كل الفكاهة التي تميز سكان هذا البلد.
Google Translation into Bengali: কুচকাওয়াজ স্থানীয়, জাতীয় বা আন্তর্জাতিক সমাজের সমালোচনার উপর দৃষ্টি নিবদ্ধ করে বিভিন্ন থিম সহ রাস্তার পারফরম্যান্স করে এমন কয়েকটি দল নিয়ে গঠিত। সমস্ত হাস্যরস যা এই দেশের বাসিন্দাদের বৈশিষ্ট্যযুক্ত করে।
Google Translation into Simplified Chinese: 游行由多个团体进行不同主题的街头表演,重点是对地方、国家或国际社会的批评。 这个国家的居民所特有的所有幽默。
Google Translation into Korean: 퍼레이드는 지역, 국가 또는 국제 사회에 대한 비판에 초점을 맞춘 다양한 주제로 거리 공연을 수행하는 여러 그룹으로 구성됩니다. 이 나라의 주민들을 특징 짓는 모든 유머.
Google Translation into Hebrew: המצעד מורכב ממספר קבוצות המבצעות מופעי רחוב עם נושאים שונים, תוך התמקדות בביקורת על החברה המקומית, הלאומית או הבינלאומית. כל ההומור שמאפיין את תושבי הארץ הזאת.
Google Translation into Hindi: परेड में स्थानीय, राष्ट्रीय या अंतर्राष्ट्रीय समाज की आलोचना पर ध्यान केंद्रित करते हुए विभिन्न विषयों के साथ सड़क प्रदर्शन करने वाले कई समूह शामिल होते हैं। इस देश के निवासियों की विशेषता वाले सभी हास्य।
Google Translation into Indonesian: Pawai tersebut terdiri dari sejumlah kelompok yang menampilkan pertunjukan jalanan dengan tema yang berbeda, berfokus pada kritik masyarakat lokal, nasional atau internasional. Semua humor yang menjadi ciri khas penduduk negeri ini.
Google Translation into Japanese: パレードは、地元、国内、または国際社会への批判に焦点を当てた、さまざまなテーマで大道芸を行う多くのグループで構成されています。 この国の住民を特徴付けるすべてのユーモア。
Google Translation into Kyrgyz: Парад жергиликтүү, улуттук же эл аралык коомчулуктун сынына басым жасаган ар кандай темадагы көчө спектаклдерин аткарган бир катар топтордон турат. Бул өлкөнүн тургундарына мүнөздүү бардык юмор.
Google Translation into Malay: Perbarisan ini terdiri daripada beberapa kumpulan yang membuat persembahan jalanan dengan tema yang berbeza, memfokuskan kepada kritikan terhadap masyarakat tempatan, kebangsaan atau antarabangsa. Segala jenaka yang menjadi ciri-ciri penduduk negara ini.
Google Translation into Mongolian: Энэхүү парад нь орон нутгийн, үндэсний болон олон улсын нийгмийг шүүмжилсэн янз бүрийн сэдэвтэй гудамжны үзүүлбэр үзүүлдэг хэд хэдэн хамтлагуудаас бүрддэг. Энэ улсын оршин суугчдыг тодорхойлдог бүх хошигнол.
Google Translation into Panjabi: ਪਰੇਡ ਵਿੱਚ ਸਥਾਨਕ, ਰਾਸ਼ਟਰੀ ਜਾਂ ਅੰਤਰਰਾਸ਼ਟਰੀ ਸਮਾਜ ਦੀ ਆਲੋਚਨਾ 'ਤੇ ਧਿਆਨ ਕੇਂਦ੍ਰਤ ਕਰਦੇ ਹੋਏ, ਵੱਖ-ਵੱਖ ਥੀਮਾਂ ਦੇ ਨਾਲ ਸੜਕ ਪ੍ਰਦਰਸ਼ਨ ਕਰਨ ਵਾਲੇ ਕਈ ਸਮੂਹ ਸ਼ਾਮਲ ਹੁੰਦੇ ਹਨ। ਸਾਰੇ ਹਾਸੇ ਜੋ ਇਸ ਦੇਸ਼ ਦੇ ਨਿਵਾਸੀਆਂ ਨੂੰ ਦਰਸਾਉਂਦੇ ਹਨ.
Google Translation into Pashtun: پریډ یو شمیر ګروپونه لري چې د مختلف موضوعاتو سره د سړکونو پرفارمنس ترسره کوي، د محلي، ملي یا نړیوالې ټولنې نیوکې تمرکز کوي. ټول طنز چې د دې هیواد د اوسیدونکو ځانګړتیا ده.
Google Translation into Persian: این رژه متش��ل از تعدادی گروه است که نمایش های خیابانی با موضوعات مختلف را با تمرکز بر انتقاد از جامعه محلی، ملی یا بین المللی اجرا می کنند. تمام شوخی که مشخصه ساکنان این کشور است.
Google Translation into Sundanese: Parade ieu diwangun ku sababaraha grup pintonan jalan kalawan téma béda, fokus kana kritik masarakat lokal, nasional atawa internasional. Sagala humor anu jadi ciri pangeusi nagara ieu.
Google Translation into Tagalog: Ang parada ay binubuo ng isang bilang ng mga grupo na gumaganap ng mga pagtatanghal sa kalye na may iba't ibang mga tema, na nakatuon sa pagpuna sa lokal, pambansa o internasyonal na lipunan. Lahat ng katatawanan na nagpapakilala sa mga naninirahan sa bansang ito.
Google Translation into Thai: ขบวนพาเหรดประกอบด้วยกลุ่มต่างๆ ที่แสดงการแสดงตามท้องถนนในธีมต่างๆ โดยเน้นที่การวิจารณ์สังคมท้องถิ่น ระดับชาติ หรือระดับนานาชาติ อารมณ์ขันทั้งหมดที่เป็นลักษณะเฉพาะของชาวประเทศนี้
Google Translation into Urdu: پریڈ میں مقامی، قومی یا بین الاقوامی معاشرے کی تنقید پر توجہ مرکوز کرتے ہوئے مختلف موضوعات کے ساتھ اسٹریٹ پرفارمنس کرنے والے متعدد گروپس پر مشتمل ہے۔ وہ تمام مزاح جو اس ملک کے باشندوں کی خصوصیت رکھتا ہے۔
#Valencia#España#Spain#Fallas2023#Falles2023#CabalgataNinots#Parade#City#Party#Music#Parody#Social#Review#PolloNegroSkyWalker#TravelBlogger#Wanderlust#CoupleGoals#GoodVibes#Plushies#instaGood#Maharashtra#ペンギン
2 notes
·
View notes
Note
I saw you reblogged my screens from MitM about Asbestos, and may have went to your blog and queued all of the Mitm posts 😂 This is my first time watching this series and I'm very enjoying it.
Oh yeah!! I love that show! I so wanna rewatch it but gotta try to find a DVD box set of it or something at the DVD exchange. It was so good and way ahead of it's time! 😂 I think it has a very similar theme as It's Always Sunny!
0 notes
Text
IoT Security and Privacy with Bluetooth Low Energy (BLE)
Data is only transmitted in one direction via BLE. Let’s examine a BLE beacon that is making an effort to get in touch with a nearby smartphone. Data packets are periodically broadcast by a Bluetooth beacon device. These data packets can be detected by nearby smartphones that have certain apps or pre-installed services installed.
BLE data transmission is a one-way channel. Let’s take an example of a BLE beacon attempting to communicate with a nearby smartphone. Data packets are periodically transmitted by a Bluetooth beacon device. These data packets can be detected by nearby smartphones that have certain apps or pre-installed services installed. App marketing and message push are two examples of the actions that this BLE communication can start. The entire Bluetooth BLE communication structure is made up of 40 frequency channels, spaced 2 MHz apart, to save energy and enable faster data transfer. Three of these are designated as data channels and are where commercials are primarily shown. These three primary advertisement channels initiate Bluetooth communication, which is then followed by the secondary channels.
BLE Communication
The Internet of Things (IoT) has been more deeply incorporated into a variety of systems over the last ten years, including beacon, smart home, healthcare, and industrial products. Most of these Internet of Things devices use Bluetooth Low Energy (BLE) to transmit data over the Internet. BLE is supported by almost all modern operating systems, including Windows 10, Linux, Android, and macOS.
Considering that billions of devices use BLE today, it is imperative to look into its security vulnerabilities. These consumer and business electronics improve our lives and increase productivity, but they also increase system vulnerability to attacks. BLE’s widespread use in healthcare applications gives rise to grave security and privacy concerns. A BLE connection is regarded as virtually unbreakable once it has been established. BLE devices are still vulnerable to threats such as pin cracking, eavesdropping, and Man-in-the-Middle (MITM) attacks, though, especially when it comes to incorrect pairing, inappropriate authentication, and inadequate protocol implementation (e.g., inadequate encryption). As a result, security lapses may result in personal information being stolen, smart locks being unlocked, messages being misread, IoT devices unexpectedly dying, and other issues.
Bluetooth LE security modes
The Generic Access Protocol (GAP) for a BLE connection specifies two security modes and several security levels for each mode.
There are four levels of security in Security Mode 1, which uses encryption to establish security.
Security Level 1 — No Security (No Encryption and No Authentication)
Security Level 2 — Unauthenticated pairing with encryption
Security Level 3 — Authenticated pairing with AES-CCM encryption
Security Level 4 — Authenticated LE Secure Connections pairing with encryption. Elliptic Curve Diffie-Hellman P-256 (ECDH) and AES-CCM encryption are used at Level 4.
Data signing is used to enforce security in Security Mode 2. The single application of Security Mode 2 is connection-based data signing. There are two levels available.
Security Mode 2
Security Level 1 — Data signing and unauthenticated pairing.
How BLE5 Compares to BLE4
Versions 1 through 3 of the platform used Bluetooth radio, which requires a lot of energy to operate. The original purpose of Bluetooth Low Energy, or BLE, was to reduce the power usage of Bluetooth devices. Bluetooth 4.0 marked its debut, and it got better with each subsequent BLE4 series release, the latest of which being 4.2. In many respects, BLE5 improves upon BLE4 in terms of performance and design.
Speed: BLE5 has a 48 Mbps data transfer rate. This doubles the data rate of BLE4. Bluetooth 5.0 has a maximum bandwidth of 5 Mbps, which is more than twice as much as Bluetooth 4.2’s 2.1 Mbps. Consequently, BLE5 achieves an effective data rate increase of 2 Mbps.
Range: Compared to Bluetooth 4.2, BLE5’s range can be up to four times longer. Since a BLE4 solution’s maximum range is about 50 meters, something like 200 meters is possible with Bluetooth 5.0.
Broadcast Capability: Bluetooth 5 allows data packets up to eight times larger than those supported by the previous generation, with a message capacity of roughly 255 bytes (compared to approximately 31 bytes for BLE4 messages). BLE5 now has much more capacity for its actual data load because each packet contains many more data bits, which also increases net data throughput.
Compatibility: BLE4 is most compatible with devices that support version 4 of the series, though it does not function with Bluetooth 5 devices. With the disclaimer that not all Bluetooth 5 features may be available on all devices, BLE5 is backwards compatible with all Bluetooth versions up to version 4.2.
Power Consumption: Although both BLE4 and BLE5 are part of the Bluetooth Low Energy ecosystem, BLE5 was designed to use less power than BLE4. As a result, Bluetooth 5 devices don’t significantly drain their batteries when used continuously for extended periods of time. IoT sensors and wearables, which have smaller form factors, have long faced this issue. Most of these devices’ batteries will last longer because Bluetooth 5 uses a better power-saving strategy.
Resiliency: BLE5 was designed with the knowledge that important Bluetooth operations are often performed in congested settings, which negatively affects their functionality. In busy environments, BLE5 performs noticeably better on average than Bluetooth 4.2.
Security — A number of Bluetooth software bugs that collectively became known as “BlueBorne” were discovered by security experts in April 2017. These flaws affected multiple operating systems, including Microsoft Windows, Google’s Android, Apple iOS, and Linux. A hacker may be able to take over a device by using some of these vulnerabilities to access systems or devices without the need for authentication. By using a 128-bit key to implement bit-level security and authentication rules, BLE5 has largely solved this issue.
Connection Vulnerability of BLE
There are two duties involved in the connection setup process. The client goes by the name of the Central Device. The central device may be one or more smart terminals, which often run operating systems. For instance, our smartphone frequently acts as the center of attention. The server goes by the name of a peripheral device. A peripheral device is usually a gadget with a specific use, such as a smart light, lock, or thermometer. Our smartphone might occasionally serve as a peripheral if it has the ability to provide services to other devices. A peripheral can communicate with other devices by broadcasting its presence. The central device sends a scan request and then establishes a connection in response to this advertisement.
It is very difficult to exploit BLE chips in devices that have already verified a connection. However, since devices need to pair in order to connect, pairing is where BLE-enabled systems are most vulnerable. Over the course of the two to three-step pairing process, devices exchange data necessary for authentication. The input/output capabilities and keys are included in this data. We say there are two to three phases because the third step is optional and only happens if the devices bond. In order for devices to remember each other as secure when they reconnect later, they exchange authentication information during the bonding procedure.
During the first pairing phase, devices exchange basic information about their capabilities to decide how to proceed with their connection. Devices virtually identify themselves on the network, describing what they are (a Fitbit, a keyboard, a headset, etc.) and what they can accomplish. There is no encryption used in the conversation. In the second pairing phase, keys are generated and exchanged. Currently, it is possible to interfere with BLE connections. If the connection is not sufficiently secured, attackers may be able to take control of the devices and the data they communicate. BLE’s developers have put a great deal of effort into securing the second phase because connections are so vulnerable.
Privacy
Privacy in BLE stops other untrusted devices from following a specific device. This kind of capability is determined by the device’s capacity to stop other unauthorized devices from decoding its address. Other devices might be able to use the address from the advertising phase if it is made public. Two devices communicate with each other using a private key called the Identity Resolving Key (IRK) in order to preserve anonymity. A random address that can only be resolved by that particular peer device is generated by the peer device that maintains the IRK.
Every Bluetooth device has a 48-bit Bluetooth device address, or BD_ADDR. There are two types of addresses that these belong to: public device addresses and random device addresses. The business ID and the company-assigned ID are the two 24-bit integers that make up the public device address. Conversely, the random device’s address is generated at random and can be either a private random address or a static random address. The static random address does not change, but the private random address may vary over the course of one power cycle. Every connection could have a different secret random address. Non-resolvable private addresses and resolvable private addresses are the two subcategories of private random addresses. The resolvable private address serves as the foundation for privacy in BLE.
Major Threats to Bluetooth Low Energy Security
In the years ahead, the use of BLE technology will continue to increase significantly. At the same time, it draws the attention of potential assailants. As a result, BLE security will be of the utmost importance. Bluetooth’s security architecture has evolved over time, and it wasn’t always as secure as it is now. In the past, it could be readily fabricated and might only offer minimal message integrity security.
Imagine an attacker having the ability to covertly modify the on/off switch, as shown in the heart rate monitor example above. This represents a potential MitM (Man-in-the-Middle) attack. Authentication protects against MitM by ensuring that each participant can cryptographically confirm the identity of the other. In the BLE world, when you initially connect your smartphone to an IoT device, you may encounter a “pairing” pop-up. Once two devices are paired, they save permanent settings and become “bonded,” eliminating the need for further pairing each time they attempt to connect.
During each of the three BLE pairing processes, a Temporary Key is utilized to produce a Short-Term Key (STK), which is subsequently used to encrypt the connection when a Characteristic requests encryption. The standard has defined four coupling mechanisms, known as Association Models, to accommodate different devices with distinct input/output capabilities (Core 5.2, Vol. 1, Part A, 5.2.4).
Hacking Bluetooth Low Energy modules is most commonly linked to two types of cyberattacks: man-in-the-middle attacks and passive eavesdropping. Passive eavesdropping, which enables an outside device to intercept data being exchanged between devices, is one way to attack a BLE network. To identify new security holes in the system, an attacker might, for instance, listen to the data that industrial peripheral sensors send to a central unit. By default, BLE modules that utilize BLE Secure connections are shielded from passive listening.
Man-in-the-middle attacks involve deceiving other networked devices into connecting to an alien device that simultaneously assumes central and peripheral roles. Major manufacturing complexes may experience issues as a result of the alien device introducing fake data into the system and upsetting entire production chains. BLE Passive eavesdropping is prevented by secure connections, but man-in-the-middle attacks can only be prevented by using the proper pairing technique.
Conclusion
Only when correctly implemented is Bluetooth Low Energy a secure wireless communication standard. The second step of pairing is the only real point of vulnerability, although you can always make this phase safe by using a suitable pairing technique. There are two methods that hackers could use to gain an advantage in a BLE network: first, they introduce hostile alien devices to take control of the entire network, which is known as a man-in-the-middle attack, or they passively listen to the data broadcast on the network, a practice known as passive eavesdropping.
When developing IoT applications, as a service-based organization, Silicon Signals can apply security measures through the IoT protocols to create safe and reliable applications. This is accomplished by considering the security needs of the protocols on which the IoT ecosystem entirely depends.
Businesses considering developing and deploying IoT ecosystems should always understand the fundamentals of IoT security. A good structure must have a strong foundation, as the adage goes. To create sophisticated applications, we must start with a solid foundation, as common flaws, rather than sophisticated algorithms, might be exploited by attackers, resulting in significant commercial losses.
Contact us today to enhance your multimedia and IoT products with us. Connect us at: [email protected]
#embeddedsoftware#embeddedsystems#embeddedtechnology#linux kernel#android#linuxdebugging#androidbsp#aosp#iot development services#iotsolutions#BLE#bluetooth
0 notes
Text
what does a vpn connection do
🔒🌍✨ Get 3 Months FREE VPN - Secure & Private Internet Access Worldwide! Click Here ✨🌍🔒
what does a vpn connection do
VPN Encryption
Title: Understanding VPN Encryption: Safeguarding Your Online Privacy
In today's digitally interconnected world, safeguarding your online privacy has become paramount. With cyber threats looming large, individuals and businesses alike are turning to Virtual Private Networks (VPNs) as a shield against potential breaches. Central to the efficacy of VPNs is encryption, a complex process that encodes data to prevent unauthorized access. Let's delve deeper into the world of VPN encryption and its significance.
Encryption is the process of converting plaintext data into ciphertext, making it incomprehensible to anyone without the decryption key. In the context of VPNs, encryption ensures that your internet traffic remains secure and private as it travels between your device and the VPN server. This is particularly crucial when accessing sensitive information such as financial transactions or confidential emails.
Most VPN services employ robust encryption protocols such as AES (Advanced Encryption Standard) with key lengths of 128-bit or higher. Additionally, they utilize cryptographic algorithms like RSA and Diffie-Hellman to establish secure connections and exchange encryption keys. These layers of encryption ensure that even if intercepted, your data remains indecipherable to prying eyes.
Furthermore, VPN encryption protects against various cyber threats, including Man-in-the-Middle (MitM) attacks and packet sniffing. By encrypting your data end-to-end, VPNs create a secure tunnel that shields your online activities from potential eavesdroppers.
However, it's essential to choose a VPN provider that prioritizes robust encryption standards and follows industry best practices. Look for providers that offer a variety of encryption protocols and adhere to a strict no-logs policy to maximize your privacy protection.
In conclusion, VPN encryption serves as a vital safeguard in today's digital landscape, preserving the confidentiality and integrity of your online communications. By understanding the intricacies of encryption and choosing a reputable VPN service, you can take proactive steps to fortify your online privacy and security.
IP Address Concealment
Concealing your IP address is a crucial aspect of maintaining online privacy and security. An IP address serves as your digital fingerprint, revealing your location and online activities to websites and potentially malicious actors. However, by employing various techniques, you can effectively hide your IP address and protect your anonymity.
One commonly used method is through virtual private networks (VPNs). VPNs create a secure and encrypted connection between your device and a remote server, masking your IP address in the process. This allows you to browse the internet anonymously and access geo-restricted content without revealing your true location.
Another option is proxy servers, which act as intermediaries between your device and the internet. When you connect to a website through a proxy server, it forwards your requests while masking your IP address. While proxies can provide anonymity, it's essential to choose a reputable provider to ensure security and reliability.
Additionally, Tor (The Onion Router) offers a decentralized network that routes your internet traffic through a series of volunteer-operated servers, concealing your IP address and making it difficult for anyone to track your online activities. However, it's worth noting that Tor can be slower than other methods due to its complex routing process.
In some cases, using a combination of these techniques, such as VPNs with Tor or proxy chaining, can further enhance your anonymity and security online. However, it's crucial to remain vigilant and stay informed about the latest developments in online privacy to protect yourself effectively.
By concealing your IP address, you can safeguard your online identity, protect your privacy, and browse the internet with peace of mind. Whether you're accessing sensitive information or simply want to maintain your anonymity, utilizing these methods can help you stay safe in an increasingly digital world.
Data Privacy Protection
Title: Safeguarding Your Digital Footprint: The Importance of Data Privacy Protection
In an era where personal information is increasingly digitized and shared across various online platforms, the importance of data privacy protection cannot be overstated. Data privacy refers to the safeguarding of sensitive information from unauthorized access, use, or disclosure. From financial transactions to social media interactions, almost every aspect of our lives leaves a digital footprint, making it crucial to prioritize the protection of our data.
One of the primary reasons to prioritize data privacy is to prevent identity theft and fraud. With access to personal information such as social security numbers, credit card details, and passwords, cybercriminals can wreak havoc on individuals' finances and reputation. By implementing robust data privacy measures, individuals and organizations can mitigate the risk of falling victim to such malicious activities.
Moreover, data privacy protection is essential for maintaining trust and transparency in the digital age. Users entrust companies with their personal information under the assumption that it will be handled responsibly and ethically. Any breach of this trust can result in severe consequences, including reputational damage and legal liabilities. Therefore, businesses must prioritize data privacy as part of their corporate responsibility initiatives.
Furthermore, data privacy regulations, such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States, highlight the growing importance of protecting individuals' privacy rights. Compliance with these regulations not only demonstrates a commitment to ethical data practices but also helps businesses avoid hefty fines and penalties.
In conclusion, data privacy protection is indispensable in today's interconnected world. By implementing robust security measures, respecting users' privacy rights, and complying with relevant regulations, individuals and organizations can safeguard sensitive information and foster trust in the digital ecosystem. Ultimately, prioritizing data privacy is not just a legal obligation but also a fundamental aspect of ethical business practices and responsible digital citizenship.
Secure Remote Access
Title: Enhancing Security with Secure Remote Access Solutions
In today's digital landscape, the ability to work remotely has become essential for businesses to thrive. However, with this convenience comes the critical need for secure remote access solutions. Secure remote access refers to the ability of users to connect to a private network from a remote location securely. Whether employees are working from home, traveling, or accessing company resources from a different location, ensuring the security of remote connections is paramount.
One of the primary concerns with remote access is the potential for unauthorized access to sensitive data. Without proper security measures in place, remote connections can become vulnerable to cyber threats such as hacking, malware, and data breaches. To mitigate these risks, organizations deploy secure remote access solutions that employ various authentication methods and encryption protocols.
Two-factor authentication (2FA) is one of the most commonly used methods to verify the identity of remote users. By requiring users to provide two forms of identification, such as a password and a unique code sent to their mobile device, 2FA adds an extra layer of security to remote connections.
Additionally, encryption plays a crucial role in securing data transmitted over remote connections. Virtual Private Network (VPN) technology encrypts data as it travels between the remote user's device and the corporate network, preventing unauthorized access by encrypting the data in transit.
Furthermore, implementing comprehensive security policies and regularly updating software and firmware are essential for maintaining the integrity of remote access systems. Employee training and awareness programs can also help educate users about the importance of following security best practices when accessing company resources remotely.
In conclusion, secure remote access solutions are indispensable for organizations looking to empower their workforce with flexibility while safeguarding sensitive data from potential threats. By implementing robust security measures, businesses can ensure that remote access remains both convenient and secure in today's dynamic work environment.
Bypass Geo-Restrictions
Title: Unlocking Content: How to Bypass Geo-Restrictions
In today's interconnected world, the internet serves as a global hub of information and entertainment. However, many online platforms implement geo-restrictions, limiting access to certain content based on the user's geographical location. Whether it's streaming services, news websites, or online gaming platforms, geo-restrictions can be frustrating barriers for users seeking diverse content.
Fortunately, there are several methods to bypass these geo-restrictions and access blocked content from anywhere in the world. One common approach is to use a Virtual Private Network (VPN). A VPN encrypts your internet connection and routes it through a server in a different location, effectively masking your actual location and allowing you to access content that may be restricted in your region.
Another method is to use Smart DNS services. Unlike VPNs, Smart DNS services don't encrypt your internet traffic but instead reroute your DNS queries through servers in other countries. This method can be faster than VPNs since it doesn't involve encryption, making it ideal for streaming high-definition content without buffering.
Additionally, proxy servers can be used to bypass geo-restrictions. Proxies act as intermediaries between your device and the internet, allowing you to access content as if you were in a different location. However, proxies may not offer the same level of security and privacy as VPNs or Smart DNS services.
It's important to note that while bypassing geo-restrictions may allow you to access blocked content, it may also violate the terms of service of certain platforms. Users should exercise caution and use these methods responsibly and within legal boundaries.
In conclusion, geo-restrictions need not limit your online experience. By utilizing tools like VPNs, Smart DNS services, or proxy servers, you can unlock a world of content and enjoy seamless access to your favorite websites and services, regardless of your location.
0 notes
Text
New Event PV
youtube
New Operators
![Tumblr media](https://64.media.tumblr.com/f58c32019653985c30344c76409c8f0e/b0e99c260a0a30b4-d6/s540x810/92445def15890fa679bb9ffc9e61a60159a6315c.jpg)
Mitm, 5* Tactician Vanguard
You still gotta work? But i came to Rhodes Island for a time off.
Nymph, 6* Primal Caster
My name is Nymph. If you have any problems you can come to me.
It's time to go, you can't hesitate all the time.
Operator Outfits Update
![Tumblr media](https://64.media.tumblr.com/2a80552f6209bfbdfb8ec042d75f6032/b0e99c260a0a30b4-37/s540x810/f73cd8525b9baa1c900246ca8fcce7b53ff041ee.jpg)
![Tumblr media](https://64.media.tumblr.com/f62e29e154b66d10300e71bd0a6cfbf5/b0e99c260a0a30b4-be/s540x810/aaec34b3336f0424dafb829e28107b884c7ce4f4.jpg)
![Tumblr media](https://64.media.tumblr.com/aabfec2dadcb82fde48978cf16c8f7f5/b0e99c260a0a30b4-e8/s540x810/285d5f64d2d038ca61c2fdfb0a872dc51b3cce77.jpg)
![Tumblr media](https://64.media.tumblr.com/1b49288f236a1740115a3d931c80a03d/b0e99c260a0a30b4-30/s540x810/3361ed88863c7c8281bf2d2d937bcbada6014a0b.jpg)
![Tumblr media](https://64.media.tumblr.com/7029bb97337b1d98d7ae5234d35ff7bb/b0e99c260a0a30b4-29/s540x810/77658eb96c3a0013274cd77e952e79af6a3080bd.jpg)
![Tumblr media](https://64.media.tumblr.com/6df471d88cb31b14f6f3ae58fde93646/b0e99c260a0a30b4-26/s540x810/e889613b0da1096c5e44918d11063828bfababc0.jpg)
5 new additions for the Coral Coast brand
Temperature Difference RT.RX07 - Typhon
Casual Vacation HD66 - Catapult (Event Shop)
Shimmering Dew SDm09 - Totter
Casual Vacation HD78 - Proviso
Summer Flowers FA075 - Reed the Flame Shadow (21 OP)
![Tumblr media](https://64.media.tumblr.com/defec1bd39e24c4287dc9249d35497ec/b0e99c260a0a30b4-e5/s540x810/57f42b600d657e8b1b395c25e82369026f56d455.jpg)
![Tumblr media](https://64.media.tumblr.com/49617036a8127070e758d620b571d4ff/b0e99c260a0a30b4-79/s540x810/8616b94c88c5791e3cdf1e0abc1225d4318e800b.jpg)
Announced outfit reruns
Series XI Coral Coast outfits (Beeswax, Stainless, Saileach)
Astgenne - Her Aspiration
Operator Modules Update
![Tumblr media](https://64.media.tumblr.com/7a486dd5d7b13c13e566f78df8906be1/b0e99c260a0a30b4-82/s540x810/7497cb26bfcd8091350b9859232cab39a6923fdf.jpg)
![Tumblr media](https://64.media.tumblr.com/c403a09140532cdc840d7ce85e54c9ae/b0e99c260a0a30b4-2e/s540x810/ce18101f2174750423123fe4dd95119eaac83ae3.jpg)
Mitm being part of the Tactician Vanguard branch immediately gets his module
TAC-Y module base effect makes enemies blocked by Mitm's reinforcement more likely to be attacked and increases his damage dealt to them to 165% of his ATK
Spreadshooter Sniper branch gets 1 module type
Swire the Elegant Wit and Mostima get their second modules
MER-Y module base effect increases Swire the Elegant Wit's ATK by 4% when her trait drains DP, stacking up to 5 times
SPC-X module base effect extends Mostima's attack range with a 1-tile extension up front
Events and Stories
![Tumblr media](https://64.media.tumblr.com/5f08de8894a082d915f8cbfd6c20262d/b0e99c260a0a30b4-4f/s540x810/dc9f7cdb51f06377e9307955462434a1a0819114.jpg)
A Kazdelian Rescue, a Kazdel vignette story collection event
The fire in the hearth is flowing, like a dream. People are also on the move, climbing over broken houses, flocking to construction sites and mines. We are the sparks that fly out when a saw blade bites through the rusty iron, floating in the dust and smoke on the city walls. Swimming endlessly, we little sparks gather together and then scatter—— We should be happy, because every story between us, is akin to small fireworks.
![Tumblr media](https://64.media.tumblr.com/d196bdbfe7c35984875f924fe1a44089/b0e99c260a0a30b4-2f/s540x810/d3d00c8643f68ade49124f805e6eb538388d4b35.jpg)
![Tumblr media](https://64.media.tumblr.com/e3d867788ecf3100dad76f08b3548ef3/b0e99c260a0a30b4-69/s540x810/f5df56eaf5d14d8d0ee430635c2a3051f082a565.jpg)
![Tumblr media](https://64.media.tumblr.com/70e0d88f880af96dc4bd9c5127dc941a/b0e99c260a0a30b4-97/s540x810/047bcfd795bbea222cb6d546ada1a6159b0181a4.jpg)
Operator Archives update for Harold, Warmy, Ambriel and Caper
Record Restore update for Dorothy's Vision and A Death in Chunfen
Misc Stuff
![Tumblr media](https://64.media.tumblr.com/54feea6d5131d9b1b80a8c09c15bca7e/b0e99c260a0a30b4-c9/s540x810/a735c2c69943f629b90b06993de65c3a4bdbbaa6.jpg)
Manticore's [Invisible Dirge] outfit will be available in the certs shop to players that don't have it
19 notes
·
View notes
Note
i just have a random question. why did you decide to stop writing for some of the series you wrote about in the past. like the ones mentioned in your discontinued fic list.
omg i love when yall ask me questions, i love to yap😋😋
tbh there’s 3 reasons for this (but i think the first 2 go hand in hand)
reason 1: i got older and felt a lil weird about writing for a certain character/series. this explains why i stopped writing for asoue and IT. i was probably 13 or 14 (i honestly have no idea specifically, but im sure i was in middle school/about to start high school) when i started writing for those characters, bc i liked them and i was around the age as them. but im 18 now, and although i could just clarify in requesting rules and fics that the characters would be aged up, i just decided to stop writing for them. eventually, this’ll happen for other series like mitm and mbav (unfortunately, where my writing is most popular💀💀). the only reason it hasn’t rn is bc with mitm, we see grown up (18+) versions of the characters (the ones i write for at least) (i know the losers club is grown up in chapter 2, but ill touch on that in reason 2) and with mbav, for the LONGEST time i thought that they were all upperclassmen like i was, so in my head and while writing, they are upperclassmen and like 17-18 years old.
reason 2: i just became less interested in the series. this kinda applies to all 3 of my discontinued masterlists, but again mainly asoue and IT. don’t get me wrong, i still love and appreciate them, but writing wise i just wasn’t feeling it anymore.
reason 3: people weren’t asking for it. this MAJORLY applies to tmr. i had gally on my writing list for probably 3 years (i took him/tmr off maybe a month or so ago idrk) and despite all the likes and stuff that it gets (i think it still gets some interaction every now and then), ive only had one person ask for a gally fic. and that was almost 2 years ago !! (i know that people not asking for something doesn’t mean that i shouldn’t write for it, but when a lot of my work is requested, it’s kinda like “what’s the point?”)
so yea, that’s why asoue, IT, and tmr are now discontinued masterlists. sorry to all my mitm and mbav lovers, but soon (idk how soon lol) i’ll stop writing for these two as well. in fact, one day (in the distant future dw) i’ll stop writing fanfiction completely. but if you like the way i write, i have a few story ideas that im either toying with or currently trying to write teehee
4 notes
·
View notes
Text
Thanks for the tag @celestemagnoliathewriter :)))
1. How many works do you have on AO3?
21
2. What’s your total AO3 word count?
42, 467
3. What fandoms do you write for?
Predominantly Harry Potter, but I’ve also written for Malcolm in the Middle, the Calpurnia Tate Series, The Hunger Games, Divergent, Swan Princess(1994), the American Girls series, Anne with an E, Buffy the Vampire Slayer, and the Peanuts comics. With the exception of the Calpurnia Tate series- I only have one fic from those other fandoms and a couple of them(like my Hunger Games and Divergent one) are just short one shot pieces I wrote years ago and just decided to put on AO3.
4. What are your top five fics by kudos?
1. Over and Over- 67 kudos
2. A Little Game of Envy- 52 kudos
3. Sweaters and Letters- 41 kudos
4. Shattered Hearts- 35 kudos
5. Of Disgraceful Sons and Burnt Tapestries- 32 kudos
(All my AO3 fics are only available to AO3 members at the moment)
5. Do you respond to comments? Why or why not?
For the most part I do :) I don’t really have notifications for AO3 turned on(mainly to try and not clutter up my inbox more than it already is lol), but I check my fics sometimes and will try to respond when I can 🤷♀️
6. What’s the fic you wrote with the angstiest ending?
Probably Mea Culpa- It’s a short one shot of Sirius in Azkaban. It’s set long before PoA, so Sirius has no hope of escaping at that point. He’s also being tormented by the ghosts of his past, so it’s really just a bad situation for him all around.
7. What’s the fic you wrote with the happiest ending?
I would say One July Morning - It’s a short one shot about the day Harry was born and I wrote it purely for the fluff XD
8. Do you get hate on fics?
I haven’t on AO3, but I’ve gotten a couple comments on FFNet that weren’t the most polite ones. I usually just ignore them, but I would delete them if I thought they were really bad.
9. Do you write smut?, if so- what kind?
Nope- no offense to those who do(I’ve read smut myself after all lol) but I prefer writing platonic and familial(think sibling and parent/child relationships) relationships at the end of the day :)
10. Do you write crossovers? What’s the craziest one you’ve written?
I haven’t written any at the moment, but who knows what could happen 🤷♀️? My MITM fic is technically a Groundhog Dsy style fic, but I only used the part about the time loop and nothing else(and tbh time loop stories are nothing new, so I have no idea if that counts or not XD)
11. Have you ever had a fic stolen?
To my knowledge I have not
12. Have you ever had a fic translated?
I had someone on FFNet ask if they could translate my fic(with credit), but I’m not sure if they ever did it or not. In general- I’m alright with it, just as long as they credit me somewhere :)
13. Have you ever co-written a fic before?
A few times, but not on AO3
14. What’s your all time favorite ship?
Probabaly Romione with Jily being a close second :)
15. What’s a WIP you want to finish, but doubt you ever will?
Well my only major WIP is my Over and Over fic at the moment. It’s a Malcom in the Middle fic where Malcom is forced to live the same day over and over again(Groundhog Day style lol). I really do want and intend to finish it, but it’s just been hard to find time and motivation at the moment 🤷♀️ One of these days lol
16. What are your writing strengths?
I would say writing a character’s inner dialogue and writing familial dynamics(particularly between siblings I think lol)
17. What are your writing weaknesses?
Writing descriptions of places. I can’t describe anything properly to save my life. My characters could find themselves in some beautiful, wonderful, and massive castle and I would struggle to properly describe it. I’m also not a huge fan of writing action scenes and I too have no real writing schedule to speak of XD
18. Thoughts on writing dialogue in another lanaguge for a fic?
I don’t know any other langauages besides English sadly(I’d love to learn at least basic Spanish and/or French one day though). Normally I’d use Google Translate if I need to translate something(usually just a few sentences at most) or I would ask someone for help if they knew the language I needed for the fic. I don’t have anything against writing dialogue in a other lanaguge(besides not really being able to speak other languages lol), but I haven’t really had a need to do it that much tbh.
19. First fandom you wrote for?
On AO3?- Harry Potter and I believe it was Harry Potter outside of AO3 too :)
20. Favorite fic you’ve ever written?
I really like my Swan Princess two shot- A Little Game of Envy(which I’m toying with adding a third part lol). It’s my way of trying to add some context to how Odette and Derek could have gone from hating each other to falling in love. The movie hints at it in the first song, but doesn’t really develop it beyond a line or two. Which is a shame, because I think that movie could be a good Enemies/Childhood Rivals to Lovers story if it was just developed more 🤷♀️. I wanted to explore that aspect of being in denial of one’s feelings/seeing how one’s feelings could change and thus that fic was born. I’m not a huge fan of writing romance, but there’s something about the pre stage(where the characters are either in denial or just unable to make a move for whatever reason lol) that I really enjoy XD
![Tumblr media](https://64.media.tumblr.com/e890ba654777dbf0d847f798055ec8db/7d1fbb8f22f5c3ed-5f/s540x810/d4f5ef27c1405f122e7038c29eacd583851ca309.jpg)
Tagging anyone who wants to do this :)
20 Questions for Fic Writers
Thanks for the tag @merlins-sequined-hotpants!
1. How many works do you have on AO3?
108
2. What's your total AO3 word count?
2,129,527
3. What fandoms do you write for?
Harry Potter. I have a couple neglected Pride & Prejudice fanfics that may never be posted, but we'll see.
4. What are your top 5 fics by kudos?
The Nymph of House Black. 819 kudos.
The Wizard, the Wolf, and the Son. 579 kudos.
The Nymph of House Tonks. 571 kudos.
Cariad. 513 kudos.
Moonlit Marriage. 300 kudos.
5. Do you respond to comments? Why or why not?
I try to whenever I can. Every so often I get a commenter on every chapter with emojis, or just a word or two, so I will thank them every few comments.
6. What's the fic you wrote with the angstiest ending?
Probably Father and Son. Teddy Lupin has his own son and still can't understand why his parents left him for the Battle of Hogwarts.
7. What's the fic you wrote with the happiest ending?
Other than fluffy one-shots, I think Real, Real Love.
8. Do you get hate on fics?
Sometimes. Negative reviews happen more often on FFN. The other day I got a comment on AO3 from an anon/guest that just read "Why would you write this?" on an angst fic. I replied "Because I wanted to" and left it at that.
9. Do you write smut. If so, what kind?
YES. I've really only written M/F. I've thought of dabbling in F/F, as M/M doesn't seem to interest me much. Either way, I generally like writing steamy scenes that are romantic and loving.
10. Do you write crossovers? What's the craziest one you've written?
No, and I don't think I ever will. Though maybe this Furby fic counts as a crossover. IDK.
11. Have you ever had a fic stolen?
Stolen? Ehhh I've seen a translation of one of my fics on Wattpad, but I don't really care about that.
12. Have you ever had a fic translated?
The Nymph of House Black has an ongoing Spanish translation, La ninfa de la Casa Black, though I don't think it will be finished. I'm not the translator, though I could be.
13. Have you ever cowritten a fic before?
Not yet.
14. What's your all-time favorite ship?
Remadora!!! 💖🐺
15. What's a WIP you want to finish, but doubt you ever will?
Probably one of my Pride and Prejudice ones. Or, one of my completely self-indulgent, unhinged self insert Harry Potter fics.
16. What are your writing strengths?
I want to say plot and conveying a wide range of emotions. I can bring readers to tears of joy or pain, to heartaches and fuzzy feelings, and to awkwardness and comfort, and that's something I'm proud of.
17. What are your writing weaknesses?
I used to call it poetic prose, or 'pretty' prose, but I think what I'm weak at is what I'd now call 'atmospheric writing'. I don't tend to set a mood with the prose itself, or the description of a location.
Also, my writing schedule has gone to pieces. I severely overestimate my abilities and time.
18. Thoughts on writing dialogue in another language for a fic?
Depends on the language! I'm fluent in Spanish, but unluckily for me there are no Spanish speakers in the Harry Potter series, at least not explicitly canon ones. I'm reasonably proficient in French, so I feel okay with that, but it's not something I do on the regular. I'm comfortable with Latin.
19. First Fandom you wrote for?
Harry Potter, intentionally. Twilight, unintentionally.
20. Favorite fic you've ever written?
It's hard to pick a favorite! Even though it's nowhere near my best work, Collide. It's what kicked off my fanfic. I legit thought that was the *only* story I'd ever write. How naive of me.
Tagging @puppyduckster @thecasualauthor18 @pixiedustandpetrichor @midnightstargazer @leogichidaa and anyone else who wants to join!
8 notes
·
View notes
Text
B and O hijinks, based on this.
#asoue#a series of unfortunate events#malcolm in the middle#mitm#beatrice baudelaire#count olaf#beatrice#olaf#comic#my art#adobe fresco#platonic soulmates
182 notes
·
View notes
Text
just browsing the MITM wiki page aka what i always do when i’m trying to put off writing a paper and i came across this lil nugget of information:
I’M SORRY WHAT WHAT
W H A T
😭😭😭😭😭😭😭
#idk how much truth there is to this since i am grabbing it from a wiki page but#this hurts me#like it brings me actual physical pain to know this#WHY DID THEY KEEP THIS IN#i wanted jamie to be a girl SO BAD#maybe this means i need to write an AU fanfic where jamie is in fact a girl?#or maybe make a *goes on the MITM wiki and finds information about the show that t makes me super emotional* series#jamie wilkerson#malcolm in the middle
18 notes
·
View notes
Text
Remember in the first episode of Malcolm in the Middle when Lois makes Malcolm hang out w the black asthmatic boy in a wheelchair from his genius class and Malcolm is like "no I don't wanna do that mom he's just a weirdo freak" but by the end of the episode when they're hanging out they bond over comic books like normal little boys...
And you think it's just gonna be the lesson ending there like "see little white boy, you can learn to bond w people unlike yourself" and you never hear from Stevie again, but then he actually becomes Malcolm's permanent best friend character for all 7 seasons and he AND the rest of his family get to be fully fleshed out and complicated as the main cast of white characters, w full winding story lines within themselves? Remember that?
Wow they really got us.
#they got us!#i could make a post exactly like this about piama's introduction to the series#AND not to mention when hal and stevie's dad... their POKER NIGHTS. THAT WHOLE CREW.#malcolm in the middle is a pretty white show overall (i mean it mostly revolves around just one family) but their poc representation#was so meaningful and poignant when it did show up.#i feel the same about lois as the only woman in the main cast#it's a great example i think about how good representation isn't just about meeting some quota#like u can make a good show about a poor struggling white family in middle america#and even have an incredibly male bend to it#while still addressing other social issues where it's appropriate#mitm#malcolm in the middle#text post#stevie kenarban
33 notes
·
View notes