#the security breach show voice actors
Explore tagged Tumblr posts
tsams-and-co-memes · 7 months ago
Text
List of characters and who they’re voiced by
I remembered Matt breaking character at one point and expressing that people keep crediting a different VA for one of the voices he does, so I figured I’d make something and share it to maybe help avoid any future confusion
If any of this is wrong or I forgot someone, feel free to let me know so I can correct it, and feel free to suggest additions for it, too!
Some of these are more obscure/gag/one time characters, but eh. I figured they were still worth mentioning
Davis:
Sun/all Sun variants (except Cringe Sun)
Monty/all Monty variants (both their masculine and feminine forms)
Solar/Eclipse/all Eclipse variants
Trash Can Man
Solar Flare
One of the Bloodmoon twins/“Bloody”
FC
Taurus
Forgor
Ruin
Blue and Green (Rainbow Friends)
Wally Darling
BanBan
Karen
Gordon Ramsay
Molten Freddy
Old Foxy
Henry Emily
Neptor
Goliath
Everett Larson
EAPS Andrew
Reed:
EAPS Mimic
Blue Baldi
Huggy Wuggy
Venom
Moon/all Moon variants (except Cringe Moon and EAPS Moon)
Lunar/all Lunar variants
Jack
Creator
KC
One of the Bloodmoon twins/“Harvest”
Castor
The devil from the bible
Catnap
Papyrus
The only Kmart employee
Rez
Kat:
Earth/all Earth variants
Pollux
Nebula
Miku
Monty’s mom
Forgor
Dazzle
Francine
Daisy
Matt:
Foxy/Cringe Foxy
Cringe Sun
Cringe Moon
Puppet/all Puppet variants
Vegeta
Leo
Frank
MGAFS Stitchwraith (both Jake and Andrew)
EAPS Jake
Monty’s dad
Keith
Derek
DogDay
Rambly
Francis
EAPS Moon
EAPS Lefty
Vincent
EAPS Glamrock Bonnie
EAPS Mimic
Kayk:
Vanny
Circus Baby/all Circus Baby variants
Elizabeth Afton
Evan Afton
Toy Chica
Roxanne/all Roxanne variants
Old Ballora
Cassie
Austin:
Gregory
Tiger Rock
Rocky
Helpi
Lazy
Cassie’s dad
Mario:
Glamrock Freddy
OG Freddy
Phantom Freddy
Shadow Freddy
Golden Freddy
Springtrap
Bon-Bon (?)
Digi:
Spring Bonnie
Glamrock Bonnie
Funtime Freddy
Glamrock Ballora (?)
Kainabunny:
New Ballora
Oddfox:
Glamrock Chica
OG Chica
Lolbit
Glamrock Mangle (?)
Alexander:
Frankie
Michael Afton
98 notes · View notes
taradactylus · 9 months ago
Text
SAME SAME SAMEEEE
It appeared at first to be sm stupid honestly with way too many videos for me, and it was scaring me away (when I decided to watch the show the VRchat episodes had 282 episodes). I thought I'd never catch up on the series... then I saw the animatics. Eclipse fanart. And looked a tiny bit into a lore explaining video. That video was over 1 hour long. So I thought damn it, after 10 minutes into the lore, I decided I'll give it a try.
It took me two weeks of technically watching the episodes non stop, meanwhile I doodled a lot AND HOLY SHIT HOW WORTH IT WAS TO WATCH IT!
Seriously, if you haven't seen the webseries yet but you love Sun and Moon and want more content... do it. It takes time to catch up on the show, but thank god even the show already made a quick lore explaining video where they round back the most important things that happened so far in a 20 minute long video. As somebody who learned and studied how to write good story, I am genuenly fangirling NON-STOP over every character's psychology and role in the story. Yes, it's VRchat, not the greatest quality of content making, this is not an animated series. But ohgod the time and effort they put into every video is mind-blowing for me, and even though it's VRchat, THE QUALITY IS AWESOME
So... watch it. Support the show. New ppl are welcome all the time
Me before I watched tsams: Oh god the clickbait kid's channels found security breach. Why does youtube keep recommending me this?
Me after I watched tsams: Almost all my waking thoughts are about this show, this thing has consumed me whole.
74 notes · View notes
fyrerainy · 1 year ago
Text
So, I've been thinking about that whole thing that went on ages ago when Earth first became a character in tsams.
I remember someone posting that Erath was only a character in tsams becuase davis wanted his gf in the show.
I, for one, think this is incredibly sexist and just plain mean. I have multiple points about why.
You don't know what's going on in real life for Kat and Davis. For all we know, they could've been barely scraping together enough money to pay their rent. They could've been really struggling financially, and having Kat join tsams would've really boosted their collective income.
Secondly, that's just plain sexist. The Sun and Moon show, and honestly the Security Breach Show in general, are largely male dominated. This means that there are more male voice actors and male characters, which does get a little annoying sometimes, however, I ultimately don't have a problem with it. However, as soon as a female voice actor and character comes into this environment, people suddenly begin to complain. You're just pissed thata woman is infiltrating your male dominated space. Coincidence? Maybe. But I wanted to bring it up anyway.
Lastly, you can dislike Earth. That's fair enough. Sure, I and many other fans don't agree, but you're allowed to have your opinion and post about it! However, it's not okay to post hurtful stuff about the va's themselves. If I was Kat or heck, Davis even, I'd be offended by what you said. There was no need to say things like Davis only wanted Kat in tsams becuase she's his gf. You forget, although they seem so much larger than life, the va's are real people. They can easily see the stuff you can say about them, and they do have feelings you can hurt.
Ok I'm done. Enjoy this thing my brain generated 36383638 years late lmao
83 notes · View notes
starheirxero · 1 day ago
Note
Are the different robot shows in the same continuity or are they separate? Are they alternate universes within the same multiverse?
I have no idea what you're saying most of the time about the robots but they seem silly so I vaguely grasp why one may like them so much
Oh yeah completely unrelated but you were the first It/It's user I recall meeting and now I use It/Its also so uh thanks for that /silly
SAME CONTINUITY YES !!! There's actually like, a handful of shows and they're all under "the Security Breach Shows" (tsbs) title and all except one take place in the same world! That one exception is literally just one of the characters from the Sun and Moon Show (tsams) deciding that the main universe is too dangerous, and just. leaves. makes a home in another universe LMAO,,, Though I will say that the channels tend to have their own plots happening and don't intersect too terribly often, likely for the sake of the voice actors LOL
I mainly watch the ones with the Daycare Attendant characters (aforementioned tsams, then the Lunar and Earth show (tlaes) and the Eclipse and Puppet show (eaps)) but there's also channels with Roxanne and Gregory, Freddy and Funtime Freddy, etc etc! They even do crossovers for gaming episodes LMAO
ALSO BAJABSHDBD THAT'S EVERYTHING TO ME ACTUALLY I'M HONORED. Get hit with the it/its swag beam <3<3<3
7 notes · View notes
dervampireprince · 9 months ago
Text
dervampireprince’s Audio Request Guide
Since commissions are closed there's not an easy way for people to see what I am comfortable or not comfortable with being asked to record, so I'm just making a little post here that I'll add as a link in my pinned post. Frankly though, basic rule I think you should always follow is 'don't ask person to create something with a very triggering/serious topic when you don't know if it's a trigger for that person'.
I will not record:
voicing female characters (genderfluid characters who also at times identify as male are an exception (eg Loki, Crowley) but I only voice them when they're identifying as male)
voicing underage characters
the listener character being underage
comfort for serious mental health topics (eg suicide/suicidal ideation, eating disorders, self harm)
incest (including step-families, adopted relatives)
abdl/sexual age play (daddy/mommy kink is fine, non-sexual age play and age regression is fine)
misgendering/detransition kink
alcohol/intoxication
drug use
non-con, cnc
raceplay
bestiality (monsters and anthros are fine)
scat
vomit
piss/omorashi/watersports
anything containing bigotry/slurs
gore/guro
feederism
pregnancy/child birth
taking care of a child/interacting with any characters/listeners who are minors
degradation (light degradation maybe)
pain play (including spanking and slapping)
violence and torture
yandere (I did a yandere audio once to test the waters and really didn't enjoy it and so don't want to again. I just prefer making more comfy vibes audios, there's other creators out there if you want the darker topics (I personally would recommend Dark and Twisted Whisper if you want monster and yandere audios)
NSFW audios where someone with DID switches between alters, switching is not an easy sudden thing like it appears to be in shows like Moon Knight, it's stressful and tiring and the person is dissociating, whoever comes into the body during the NSFW activity has had no way to consent to the NSFW activity due to not having any memory of what's been happening while they weren't fronting, it would be wrong and a violation of informed consent to continue any NSFW activity in this scenario.
any characters from: Harry Potter/Fantastic Beasts, Hazbin Hotel, Helluva Boss, any real people (including their Vtuber characters, SMP characters, etc), any FNAF animatronics that have dead children's souls inside of them (the animatronics from Security Breach do not and so are fine to request, same with Springtrap), specifically the ascended version of Astarion from Baldur's Gate 3, Cazador from BG3 and any other characters who are canonically sexual abusers, Loki Series related audios (MCU film Loki is fine, but I will not be voicing the alternate version of him from the Loki Series or anything relating to that show).
Silco from Arcane. I have talked about this before, but in 2022 myself and friends spent time with Silco's voice actor in person at two comic conventions where he proceeded to make us uncomfortable, be inappropriate, threaten one member, and start a relationship with another (who was a fan, which is an abuse of that power dynamic). He was then also found to have been private messaging multiple fans, including sending them sexual messages. After all this happened I took a break from voicing Silco, tried to go back to it, but had to stop. Voicing the character brings all this back up and makes me too uncomfortable and distressed. Voice actors are not their characters and vice versa, but I can't think about Silco without thinking about all of this.
ASMR and comfort content are not replacements for actual therapy. I am not a therapist or psychiatrist, I'm not qualified or able to give out advice on serious mental health and other issues. There are always people around to help and listen but this is not the place to vent and please do not ask me to make content about trigger topics and serious mental health issues. If you are in need of help with serious issues please reach out to qualified individuals or appropriate hot-lines.
Please do not send me asks/comments asking for me to do comforts for serious mental health issues, not only is it inappropriate to ask of a stranger, I am in no way qualified to offer real comfort to strangers for this and could end up saying something that makes it worse by accident, and I personally find some of those topics very triggering to the point it makes me upset/uncomfortable to see them mentioned.
Me not being comfortable recording certain kinks does not mean I am kinkshaming anyone into those things, they just make me too uncomfortable for me to even act out in fiction.
Do not ask me why I don't want to record certain things or certain characters. Do not ask me why things are on this list. Everyone has different things they're uncomfortable with and their own boundaries and that should be respected.
This list is subject to future updates. Last updated: 14th September 2024.
26 notes · View notes
artist-in-training-wheels · 3 months ago
Note
Hey so I'm angry at YouTube now over what I learned they did yesterday, from what I learned apparently the reasons the Lunar and Earth Show got deleted. So one of the reasons YouTube deleted the channel was cuz they accused the voice actors of partaking in scams relating to Lunar Plush bootleg merchandise of one of their characters being sold on TEMU. But Davis made it clear on his Twitch Stream that him and his colleagues were not taking part in that and they were accused of this. And the second reason which Davis pointed out was because of one of their characters called "Dazzle the Deer" and over the fact that they revealed their backstory about what happened to Dazzle when she was alive and called "Evelyn" which which involves Sun getting possessed by BloodMoon and murdering her, and YouTube deemed it to violent resulting in what is happening now. Davis also said they had three requests sent to YouTube already to try and get the show back up and running but they were all denied, he made it aware to us that he only had one request left and if it gets denied then the Lunar and Earth Show will be gone for good. So he asked us his viewers to get the word out to try and make everyone aware of the situation any way possible on all platforms we have. And since Davis doesn't have an account here on Tumblr and there's a lot of people I saw here who are fans of the show i wanted to help by starting here so I wanted to make awareness of this to try and get people to make noise and get YouTube to reinstall the Lunar and Earth Show so it's not gone forever.
Davis Explaining the LAES situation:
- https://youtu.be/VWFG0LO9oU0?si=-NY8vzCip0QzKLeh
Spread the word!!!! Hurry!!!!
Tumblr media
Thank you for the info (though I was kinda already aware of the situation).
Yes, if you're aware of the Security Breach Show, the Lunar and Earth show was wrongfully taken down. YouTube claims the channel was scamming others, which is SPECULATED to be related to the Lunar plushies that were sold on Temu. There's also the theory that it's related to Dazzle/Evelyn. However, YouTube is neither confirming nor denying the accusations, so the fans have been requested to (respectfully) make some noise about the false accusations.
8 notes · View notes
icekingofhope · 3 months ago
Text
Tumblr media
so I decided since I am a fnaf veteran and also planning a fnaf rewrite I give my opinions on the games and such and explain why I like or hate the game.
fnaf 1 2 and 3: the reason why I love these three is because it feels like a perfect trilogy the mystery the intense setting just a chef kiss and yes I agree fnaf 3 isn’t the brightest but I don’t care cause it’s actually my top favorite fnaf game I love the character spring trap a lot he has always been my favorite and the story’s ending fits of how the ghost of the dead children decided to punish their murder by making him go threw what they go threw.
fnaf 4: now I don’t hate this game far from it actually it’s probably the scariest fnaf game I seen and plus the designs of the nightmares are cool! It just I wish it was executed abit better as it does have flaws to the story (like example what did fucking michael expect when he put his brother in the mouth of a animatronic what did he think was gonna happen)
FNAF WORLD: now it maybe not a horror game…but I do enjoy the chibi animatronics and they look adorable I would never play it but I’ll look at the gameplay or art time to time.
Sister location: this game was kinda meh to me and feels wasted potential and it being a prequel just kinda ruins the lore especially since the first game takes place in 1970s…and advance animatronics like that doesn’t make sense and plus I feel like it would have fit a lot better if it was like taken place after the three games and maybe if you wanna make it a prequel make the animatronics less advance and give it the aesthetic of that time period (and don’t make the ballerina animatronic sexualized when she is a animatronic for children (cause you can’t tell me she isn’t sue me-)
pizza simulator: I fucking hate this game cause to me it ruined five nights at Freddy the only good thing was the cool speech Henry gave I already stop being into five nights at Freddy from this cause it ruined it for me the mystery was gone it just felt like they were just milking the franchise now and I don’t get how people like it.
THE FNAF VR AR AND ULTIMATE CUSTOM NIGHT: this is similar to pizza simulator and it sucks cause like this could have been fixed if they were just not canon like fnaf world and just got entertainment.
SECURITY BREACH: this one made me the most disappointed cause I remember when I saw the trailer I was actually very excited and positive about the game and made my theories on the game of what’s gonna happen…but it just turned out as a shitty glitchy game and I will announce as the WORST five nights at Freddy’s games ever made.
it frustrated me how bad it was to like showing the trailers aren’t true to the game amazing voice actors replaced with bad ones (aka vanny) and the only think I like about this game is the animatronics (not their designs their ok but it feels weird to even like them cause they are made by a problematic artist but the idea names etc)
Gregory also feels like a annoying main character like I just want him to just shut up like to me he doesn’t sound like a kid he just sounds like a bad voice actor trying to imitate a child but with a sore throat.
and don’t get me started on Vanessa which could have been a separate character to vanny cause like I hated she turned out to be vanny (and I always found it strange she was the only human security guard I mean…for a big ass fucking place as security breach which is probably the biggest map of any fnaf game your telling me there isn’t more human security guards? Like I’m aware of the security bots but they barely do shit in the game)
it upsetted me when I first saw the game I was so excited for it like how I would have fix it maybe make it like similar to the incident the death of the 5 children make it start as a tutorial where your parents take you to Freddy fazbears with your friends you get a tutorial of how to run climb and such.
and like you meet vanny she tried to kill you and maybe try to make the animatronics interesting since they are taking ai animatronics who actually have feelings and emotions route make them like Trying to fight back their aggressive programming do something to make it interesting! you had the ball In your hands yet you just decided to throw it into a fucking cliff this includes ruin and into the pit which is bad too.
And it sucks cause like I don’t know what is gonna happen now like it feels like five nights at Freddy is the broken shell it once was…
now does this mean you should also hate it no you don’t have to hate any these games if you like them feel free to for me it just feels like fnaf was ruined to me with its books and bad sequels cause like sometimes it feels like Scott didn’t seem to know what he wanted for the game and it feels like he was making it up as he went a lot going with the most craziest and dumbest ideas.
but you can still love fnaf I still like it too but like I am not as much into it anymore (due to the fans being crazy with its ships etc ) although even if I do plan a fnaf rewrite it’s not to spite Scott or any fnaf fans i just wanna do it to reconnect to fnaf when it was at its prime and feel abit of nostalgia.
and despite my hate for how fnaf went but I am glad they still exist cause we got amazing fan made songs and people got into the franchise and not to mention they can be inspiring and also help popularize mascot horror which is one of my favorite type of horror!
now I wish I could explain how I hate it more (but I suck at fucking explaining) although I do highly suggest video which honestly explains the fall way better then I could ever can
youtube
Anyways that’s all please don’t attack me for my opinions and I hope you have a good day or night.
5 notes · View notes
socksandbuttons · 1 year ago
Note
Im new to the DCA famdom so um what is tsams????
It's a youtube show, The Sun and Moon Show. Its like a sub fandom to the dca fandom lol, don't worry too much over it. Basically their own versions of Sun and Moon where the game was something they *acted* in.
Just two robot brothers with a gaming channel basically. It got pretty big with it's Lore Episodes they sprinkled in (I started watching like.. around the end of the october takeover arc, sporadically lol) They also have a couple Villains, the first and biggest one being Eclipse. Eclipse's brothers he created, Lunar and Bloodmoon. Killcode is a code thing that turned into a character (I love him), The Creator is technically a villain as well.
Earth is their sister introduced later on but not a villain. She likes barbie movies its very cute. Monty also was a major character until he got his own channel (the voice actor for Sun on the channel). You also see other character from the other Security Breach channels linked to it. If you want like a full FULL summary. I will do my best but otherwise its like 300 something videos some lore some not, most lore is IN the VRChat videos whereas in the begiining it was also in the gaming (with the inttroduction of Eclipse and the October Arc. after that not so much)
35 notes · View notes
filthy-reckless-rp · 6 months ago
Text
Tumblr media Tumblr media
♛ Spotted on the Upper East Side…
Name: Eleanor Rose Pronouns: She/Her Age: 21 years old Hometown: Upper East Side, NY Occupation: Virtual Singer Social Status: Insider Faceclaim: Nicola Coughlan
Who Is Eleanor?
"I want you to know, I'm a mirrorball, I can change everything about me to fit in."
Eleanor Rose... What a delight. Shall I keep your secret for a little while longer? You see, I can see through you as the Wannabe Wallflower and I know you are more than meets the eye. Why you hide behind a mask? Who knows. Your voice is one recorded to be heard and has been heard by millions of people. Oops! Did I give away your secret yet? But I happen to have a surprise for you, a secret of yours you don't even know. A secret much bigger than the secret you are keeping from your friends. I mean, you do have friends, don't you? XOXO ---Gossip Girl
A Little Extra
Eleanor Rose thought she should live in the shadows since she was adopted many years ago. Her mom however was a famous fashion designer and has made collections for both Prada and Vogue. She collaborates with the likes of Eleanor Waldorf, has her designed photographed on the likes of Ruby Reyes and Agnes Andrews. Her father however was a famous actor, who moved from Hollywood and left it all behind to be with his family. Isn't that sweet. Eleanor thought she should hide herself from her peers. After all, she wasn't looking like she should belong on the cover of a magazine. Doubting her self-worth however doesn't show when she puts on the virtual mask of 'B.U.N.N.Y' the next pop sensation you'll find online. No one knows that that voice is hers, and she likes to keep it that way. Eleanor is surrounded with extroverts who easily take center stage, stand under the spotlight and make a scene. She doesn't need that, she's more than happy to keep her name out of it.
What Does Gossip Girl Have On Them?
Aside from the fact that she is a virtual pop sensation? She is actually the crown princess of a little known place in Europe called 'Aldovia'. Her birth parents sent her away for her safety as there had been a serious security breach when she was born. Not many know that she is, technically, royal so they might change their attitude towards her soon rather than later. Eleanor herself included!
Connections
Joy and Kylie Greenaway - Growing up with famous parents parents mean you have some pretty famous play dates. Eleanor ended up spending a lot of time with Joy and Kylie over holidays and at parties. Joy holds everyone's attention, making it easy for Eleanor to blend into the background. Kylie was always easier to get along with but that's no secret.
3 notes · View notes
montygatorguy · 4 months ago
Text
happy tenth birthday to fnaf! i don’t have art or anything to post so im just gonna talk ig
fnaf is probably my favorite franchise ever, it changed my life. it brought me a ton of joy when i first got into it in december 2018, first watching that video showing off all the ucn voice actors, to now in august 2024 as i look through the sneak peeks for the second movie and see people’s screenshots of the brand new into the pit game. it helped me through the pandemic, and through the following year of school that was terrifying to me (i miss the security breach release era).
from going to see the movie with my friends on opening night, to buying my first piece of merch at target, to casting hamilton with the animatronics back in the summer of 2020, all the amazing memories these games have brought me are forever gonna stick around.
i love five nights at freddy’s, and im glad to be here on its tenth anniversary :)
2 notes · View notes
ponds-of-ink · 1 year ago
Text
Far-Fetched MXES “Theory”/Detail Compliation: The Ruin-Born Meme is Possibly Right?
No, this isn’t supposed to be clickbait. The meme seriously might be correct if a few weird details I’ve seen from different sources line up.
Firstly, which is the weirdest clue, his chin.
Yes. His chin. We are really going to use this as possible evidence. (Thank the first person to discover this, by the way. Couldn’t have made this post with ‘em.)
Because, if you look at Springtrap and Scraptrap...
Tumblr media
They have this shared “cleft chin” of sorts that isn’t hard to miss once you notice. Unless you’re me, who keeps forgetting to include it in my human William designs.
Meanwhile, with Glitchtrap and Burntrap...
Tumblr media
They (unsurprisingly, depending on who you ask) don’t.
But, for reasons that are completely unknown to me, MXES has that chin the other modern-day Afton-suspects lack.
Tumblr media
..Not the best image of it I could find, but yes that is a cheft chin.
Keep in mind that I’m not sure why exactly this detail is in this design. I’d say “Oh it’s to throw veterans in for a bigger loop when they play Ruin for the first time”, but I don’t think William’s cleft chin has been brought up much? Correct me if I’m wrong there.
My only other guess is that it’s supposed to be a hint towards MXES and William being more directly connected somehow. Though obviously nothing’s settled as concrete yet, here’s a bit more food for thought... if you’re still with me, that is.
Secondly, MXES’ Beta Design (or Ruin-Born himself, if the meme nickname makes more sense), actually kind of lines up with William’s appearance in the Fazbear Frights books. Both were tall, skeletal semi-rabbits/semi-human.. A shame that’s where the similarities seem to end, because any more descriptors from the book would’ve solidified this as proper evidence. There is a lot of unstable, glitch-like twitching in the old design’s animations, so maybe it confirms it being MXES...?
Anyway, this last one is an even bigger stretch that the rest. It’s practically speculation more-so than grasping at straws. Humor my late-night attempt at logic for a second.
If we’re going by Glitchtrap being “dead” via Security Breach’s Princess Quest ending, then who or what is going to be the antagonist of Help Wanted 2? Or at the very least, who’s going to be the creepy bunny peeking out of some random doorway this time?
Well, if Help Wanted 2 is a prequel to Ruin (much like how HW was a prequel to SB), then MXES would be a pretty good candidate. Vanny’s left her antagonist role behind, Scrap-Trap is probably only going to be showing up in FNAF 6 mini-games, and.. Well, I’m not really sure what other candidates there could be in-between SB and Ruin.
The point is that MXES’ origins might get explored... in the more Afton-centered VR game. With William himself getting either a new voice or two voice actors in a partially-collaborative effort, if both Matthew Curtis’ Twitter bio and Springtrap’s ghostly whispers in Ruin are anything to go by.
...Just remembered that there is also the detail of MXES smiling more when... I don’t remember exactly, which is a pain, but it’s either the longer you leave your mask on or the closer he’s getting to jump-scare you with an animatronic. Dunno if that “proves” anything, but I’d thought I’d bring it up before I kicked myself later.
TL;DR - The chin’s the main concern, but there’s a couple of other things that are off too. If it turns out I’m right about this, then I’m not sure how I’d feel.. yet.
7 notes · View notes
spookiifi · 2 years ago
Text
Requests are Open + Rules
Hello Lovelies!
Rules under the cut!
Who I will write for:
Mandela Catalogue:
- Archangel Gabriel/Reader
- The Intruder or Six (I've never written for him, so don't @ me if it's ooc at first
- Toonbriel (I've never written for him either, so this is new to me)
--
Security Breach: 
- Sun
- Moon
- Eclipse (not the sun and moon show one, just to clear things up)
I was thinking about writing for John Doe, but I don’t know his character well
---
Who I won't write for:
- Any of the voice actors/characters for The Mandela Catalogue. This goes for alternate Cesar, too.
- Shipping any of the characters together/with the reader as well. They’re minors, so please don’t ask.
--
I will write:
- fluff
- angst
- horror/gore (exclusive to a03. I’ll have a link in the ask to my ao3)
- I do write nsfw, but only for some characters. (exclusive to ao3)
I WILL NOT write
- underage
- n*n con/d*b con (anything forced)
- suicidal themes/mental illness
- Idk why but writing nsfw for Toon makes me uncomfortable, so that's off the plate
- alcohol or drugs
If anyone has questions, feel free to drop an ask or comment <3
Thank you for reading
17 notes · View notes
tsbsredraft · 2 months ago
Text
Dear: [Patron],
                               ☆ Anubis ☆
       18 �� She/Her • ADHD • Artist
       In celebration of my retirement from The Security Breach Discord Server Staff Team, and to bring myself closure from the stress and mental anguish of moderating, I have decided to create an alternate universe! Odd choice to some? Probably. Publishing it? Even weirder. But it works for me, so long as yall are respectful, at least.
                  Rules | Askbox | Character Roster | Pinterest
Disclaimder and Tags are listed below! Give em a read.
——————————————
Tags:
#TSBS.R, #The Security Breach Show Redraft, #Redraft AU = Catch-all for AU related content!
#TSBS.R Founder = Situational updates, AU updates, Blog updates, and posts about TSBS should they be necessary.
#TSBS.R Art Dep = Art, References, Etc related to TSBS.R.
#TSBS.R File = For writing-based information related to TSBS.R.
#TSBS.R Inbox = Answered Asks! Tags such as Founder, File / Art, or Burger relate to the type of answer and post.
#TSBS.R Burger = Reblogs and unrelated to the TSBS.R universe, namely for inspiration. Think of it as an employee slacking off and scrolling social media instead of working lol.
[Will add tags to the list when necessary]
——————————————
Disclaimer:
       The Security Breach Shows Redraft or TSBS.R is a nonprofit and unfunded fan project created by JinxedAnubis under the pretense of comfort, closure, and creative expression. No funds will ever go into producing this fan work, nor will it be behind a paywall at any point. 
       This fan project stems from the YouTube web series spread across multiple YouTube channels, all connected under one universe, The Security Breach Shows or TSBS. Such as and primarily focused on The Sun and Moon Show aka: TSAMS / SAMS. TSBS is a web series built upon the Five Nights at Freddy's or FNAF franchise. 
        TSBS.R is not to overshadow the original story. It's not to say one story or style is better. Nothing drawn or written is made with malice or to be reflected upon the source material. This is made in good fun and respect for the creators. Should this fan product push boundaries, the artist will adhere to the creator's and company's wishes. 
        TSBS.R is not intended to become a fully fleshed web series like TSBS. It will stay as a spitball of ideas, story reconstruction, character redesign/rewrites, and snippets. It is a fan-created alternative universe or AU. 
        JinxedAnubis no longer has ties with the creators of TSBS, namely voice actors and the moderation team (for moderating purposes). She has since retired from her long-standing 2-3 year position as a Discord administrator and wishes to refrain from being involved in the community and its drama. She will remain in her corner of the internet when producing and publishing TSBS.R-related works to bring herself comfort from the stressors of the fan base. 
        Please support the original creators behind TSBS and respect JinxedAnubis’ wishes!
Feel free to reach out should anything be amiss!
Sincerely, JinxedAnubis.
Posted: 9/12/2024 Edited: 9/20/2024
0 notes
techtired · 5 months ago
Text
Everything You Need to Understand About Brook Taube Wells Notice
Tumblr media
Renowned for his financial sense and investing knowledge, Brook Taube is a major player in the financial sector. Taube is a top name in the business, and it has a lot of expertise in asset management and the creation of creative investment methods. A Wells Notice issued to Brook Taube lately has attracted a lot of interest in the financial headlines since it emphasizes his significant market dominance. Examining the specifics of the Brook Taube Wells Notice and its significance to Brook Taube's career and reputation will help one to understand the consequences of this development properly. Let's investigate these specifics more thoroughly to get a complete picture of the matter. What is Brook Taube? Renowned for his great knowledge and strategic sense, Brook Taube is a distinguished member of the investment community. Taube has developed a strong name over many years as a smart financial strategist and investor. Over many esteemed financial firms, his career has seen him occupy key roles where he has been crucial in managing large portfolios. Taube is a valued and powerful voice in investment circles since his impact and contributions have confirmed his position as a major actor in the financial industry. What does a Wells Notice mean? A formal announcement sent by the Securities and Exchange Commission (SEC) to people or companies alerting them of its intention to conduct enforcement action against them is a Wells Notice. Aimed at preserving fair and orderly markets by guaranteeing compliance with set rules, this notice is a fundamental part of the SEC's regulatory structure. Getting a Wells Notice means the SEC has looked at things preliminarily and found enough evidence to warrant looking at possible securities law breaches. Reflecting the SEC's commitment to due process and openness in its enforcement activities, the notification gives the recipient an opportunity to respond and state their case before any official procedures start. What does This Mean for Brook Taube? Brook Taube Wells Notice's high profile and large impact on the market, the Wells Notice that was sent to him has gotten a lot of attention in the financial world. This news has led to a lot of questions and guesses about the details of the accusations and how they might affect Taube's job and reputation. Because this notice involves a person who is often associated with smart money and smart investments, it brings to light the high stakes and the strict oversight that regulatory bodies like the SEC practice. For the full effects of this situation to become clear, one needs to carefully look at both the Wells Notice and Taube's impressive career. By looking into the details of these things, one can get a better sense of how complicated and important Brook Taube's present situation is. Why Taube Got A Wells Notice? Allegations of misbehavior in Brook Taube's investment activities led to a Wells Notice. While particular information is usually kept private until official charges are registered, such notices usually center on claims of fraud, deception, or other regulatory violations. These claims imply that Taube's investment actions might have broken securities rules, which would cause the SEC to give enforcement action some thought. Response To The Brook Taube Wells Notice After getting a Brook Taube Wells Notice, the recipient has time to react—usually with legal assistance. Declaring his innocence and stating his intention to challenge the accusations, Brook Taube has released a statement Aiming to show adherence to all pertinent rules and refute the SEC's assertions; his legal team is building a strong defence to offer their side of the story. The direction of the research and any later legal actions depends much on this reaction. The Function Of The SEC Protecting investors and supervising the securities markets depends mostly on the Securities and Exchange Commission (SEC). A Wells Notice from the SEC indicates the agency's view that a violation deserving of enforcement action has occurred. This process is a fundamental mechanism by which the SEC guarantees that market players are answerable for their conduct, therefore preserving the integrity and fairness of financial markets. Potential Results For Brook Taube A Brook Taube Wells Notice might have really serious repercussions. As clients and partners respond to the revelation, Brook Taube might have to pay major legal fees, deal with more scrutiny, and maybe lose business prospects in the near term. Depending on the result of the SEC's enforcement activity, long-term consequences might include significant penalties, punishments, or even a ban from engaging in particular financial activities. These possible results highlight the gravity of the claims and the great risk Taube's career and reputation carry. Concerning Stakeholders And Investors News of a Brook Taube Wells Notice generally causes quick reactions from investors and stakeholders who worry about the integrity and stability of the engaged parties, causing stock price swings and changes in investment policies. Staying informed and thoroughly evaluating the situation is absolutely vital for stakeholders since the developing events may have major effects on their financial interests. Making wise decisions at such uncertain times depends on knowing the hazards and possible results. Case Studies Of Past Wells Notices Analyzing past Brook Taube Wells Notice sent to other well-known people and companies can offer insightful information. These case studies provide a road map for knowing the possible course of Brook Taube Wells Notice's circumstances by highlighting typical problems, defence tactics, and results. Analyzing similar situations helps stakeholders understand the probable legal and financial consequences better and helps them be ready. The Legal Procedure Proceeding From Brook Taube Wells Notice Following an issued Wells Notice, a set of legal actions follow. The addressee can send a Wells Submission, a paper contending why charges shouldn't be made. The SEC then goes over this answer before choosing whether to start enforcing rules. As the SEC works to guarantee that any enforcement action is supported by strong evidence, this process entails extensive research and deliberation. Brook Taube Wells Notice's Situational Management Style After a Wells Notice, controlling public opinion is absolutely vital. Using public relations techniques, Brook Taube is proving openness and keeping investor confidence. Business continuity strategies also guarantee that operations stay consistent during the court processes. Taube wants to minimize the negative effects of the Wells Notice on his company and reputation by addressing issues early and keeping stakeholders updated. Prospective Future For Brook Taube Wells Notice The result of the SEC's investigation and any later legal action will essentially determine Brook Taube's future. Professionals conjecture on a range of possibilities, from major fines to total innocence. Taube's professional legacy depends much on how he negotiates this moment. His career in the financial sector will be much influenced by his capacity to control the legal and public relations elements of the matter. Knowledge For Investors Investors should be alert and knowledgeable about the consequences of a Wells Notice. Understanding the risks, analyzing portfolio exposures, and thinking about consulting financial advisers will help you minimize any possible negative effects on investments. Maintaining current with changes and being ready to modify investment plans would help control the uncertainty related to such legislative measures. Conclusion Sending a Brook Taube Wells Notice shows the complexity and hazards in the financial industry. Although the result is yet unknown, the circumstances emphasize the need for regulatory control and the requirement of caution among investors. Navigating such problems successfully depends on keeping informed and ready, so guaranteeing that investors and stakeholders can make the best decisions in reaction to changing conditions. FAQs Why is a Wells Notice issued primarily? Usually issued when the SEC feels there is enough proof someone or a company has broken securities rules, a Wells Notice justifies enforcement action. Usually, the Wells Notice procedure takes what length of time? Although the process can differ greatly, it usually consists of several months of research, review, and maybe legal actions. Is a Wells Notice contestable? Indeed, receivers of a Wells Notice can oppose it by turning in a Wells Submission and claiming why charges shouldn't be taken against them. Which defences might one have against a Wells Notice? Defences could be proving adherence to rules, offering proof contradicting the SEC's conclusions, or pointing up procedural mistakes in the agency's inquiry. What impact does a Wells Notice have on a company's stock? As investors respond to possible legal and financial uncertainty around the company, a Wells Notice can cause stock price volatility. Read the full article
0 notes
jcmarchi · 7 months ago
Text
The Threat of Offensive AI and How to Protect From It
New Post has been published on https://thedigitalinsider.com/the-threat-of-offensive-ai-and-how-to-protect-from-it/
The Threat of Offensive AI and How to Protect From It
Artificial Intelligence (AI) swiftly transforms our digital space, exposing the potential for misuse by threat actors. Offensive or adversarial AI, a subfield of AI, seeks to exploit vulnerabilities in AI systems. Imagine a cyberattack so smart that it can bypass defense faster than we can stop it!  Offensive AI can autonomously execute cyberattacks, penetrate defenses, and manipulate data.
MIT Technology Review has shared that 96% of IT and security leaders are now factoring in AI-powered cyber-attacks in their threat matrix. As AI technology keeps advancing, the dangers posed by malicious individuals are also becoming more dynamic.
This article aims to help you understand the potential risks associated with offensive AI and the necessary strategies to effectively counter these threats.
Understanding Offensive AI
Offensive AI is a growing concern for global stability. Offensive AI refers to systems tailored to assist or execute harmful activities. A study by DarkTrace reveals a concerning trend: nearly 74% of cybersecurity experts believe that AI threats are now significant issues. These attacks aren’t just faster and stealthier; they’re capable of strategies beyond human capabilities and transforming the cybersecurity battlefield. The usage of offensive AI can spread disinformation, disrupt political processes, and manipulate public opinion. Additionally, the increasing desire for AI-powered autonomous weapons is worrying because it could result in human rights violations.  Establishing guidelines for their responsible use is essential for maintaining global stability and upholding humanitarian values.
Examples of AI-powered Cyberattacks
AI can be used in various cyberattacks to enhance effectiveness and exploit vulnerabilities. Let’s explore offensive AI with some real examples. This will show how AI is used in cyberattacks.
Deep Fake Voice Scams: In a recent scam, cybercriminals used AI to mimic a CEO’s voice and successfully requested urgent wire transfers from unsuspecting employees.
AI-Enhanced Phishing Emails: Attackers use AI to target businesses and individuals by creating personalized phishing emails that appear genuine and legitimate. This enables them to manipulate unsuspecting individuals into revealing confidential information. This has raised concerns about the speed and variations of social engineering attacks with increased chances of success.
Financial Crime: Generative AI, with its democratized access, has become a go-to tool for fraudsters to carry out phishing attacks, credential stuffing, and AI-powered BEC (Business Email Compromise) and ATO (Account Takeover) attacks. This has increased behavioral-driven attacks in the US financial sector by 43%, resulting in $3.8 million in losses in 2023.
These examples reveal the complexity of AI-driven threats that need robust mitigation measures.
Impact and Implications
Offensive AI poses significant challenges to current security measures, which struggle to keep up with the swift and intelligent nature of AI threats. Companies are at a higher risk of data breaches, operational interruptions, and serious reputation damage. It’s critical now more than ever to develop advanced defensive strategies to effectively counter these risks. Let’s take a closer and more detailed look at how offensive AI can affect organizations.
Challenges for Human-Controlled Detection Systems: Offensive AI creates difficulties for human-controlled detection systems. It can quickly generate and adapt attack strategies, overwhelming traditional security measures that rely on human analysts. This puts organizations at risk and increases the risk of successful attacks.
Limitations of Traditional Detection Tools: Offensive AI can evade traditional rule or signature-based detection tools. These tools rely on predefined patterns or rules to identify malicious activities. However, offensive AI can dynamically generate attack patterns that don’t match known signatures, making them difficult to detect. Security professionals can adopt techniques like anomaly detection to detect abnormal activities to effectively counter offensive AI threats.
Social Engineering Attacks: Offensive AI can enhance social engineering attacks, manipulating individuals into revealing sensitive information or compromising security. AI-powered chatbots and voice synthesis can mimic human behavior, making distinguishing between real and fake interactions harder.
This exposes organizations to higher risks of data breaches, unauthorized access, and financial losses.
Implications of Offensive AI
While offensive AI poses a severe threat to organizations, its implications extend beyond technical hurdles. Here are some critical areas where offensive AI demands our immediate attention:
Urgent Need for Regulations: The rise of offensive AI calls for developing stringent regulations and legal frameworks to govern its use. Having clear rules for responsible AI development can stop bad actors from using it for harm. Clear regulations for responsible AI development will prevent misuse and protect individuals and organizations from potential dangers. This will allow everyone to safely benefit from the advancements AI offers.
Ethical Considerations: Offensive AI raises a multitude of ethical and privacy concerns, threatening the spread of surveillance and data breaches. Moreover, it can contribute to global instability with the malicious development and deployment of autonomous weapons systems. Organizations can limit these risks by prioritizing ethical considerations like transparency, accountability, and fairness throughout the design and use of AI.
Paradigm Shift in Security Strategies: Adversarial AI disrupts traditional security paradigms. Conventional defense mechanisms are struggling to keep pace with the speed and sophistication of AI-driven attacks. With AI threats constantly evolving, organizations must step up their defenses by investing in more robust security tools. Organizations must leverage AI and machine learning to build robust systems that can automatically detect and stop attacks as they happen. But it’s not just about the tools. Organizations also need to invest in training their security professionals to work effectively with these new systems.
Defensive AI
Defensive AI is a powerful tool in the fight against cybercrime. By using AI-powered advanced data analytics to spot system vulnerabilities and raise alerts, organizations can neutralize threats and build a robust security cover. Although still in development, defensive AI offers a promising way to build responsible and ethical mitigation technology.
Defensive AI is a potent tool in the battle against cybercrime. The AI-powered defensive system uses advanced data analytics methods to detect system vulnerabilities and raise alerts. This helps organizations to neutralize threats and construct strong security protection against cyber attacks. Although still an emerging technology, defensive AI offers a promising approach to developing responsible and ethical mitigation solutions.
Strategic Approaches to Mitigating Offensive AI Risks
In the battle against offensive AI, a dynamic defense strategy is required. Here’s how organizations can effectively counter the rising tide of offensive AI:
Rapid Response Capabilities: To counter AI-driven attacks, companies must enhance their ability to quickly detect and respond to threats. Businesses should upgrade security protocols with incident response plans and threat intelligence sharing. Moreover companies should utilize cutting edge real-time analysis tools like threat detection systems and AI driven solutions.
Leveraging Defensive AI: Integrate an updated cybersecurity system that automatically detects anomalies and identifies potential threats before they materialize. By continuously adapting to new tactics without human intervention, defensive AI systems can stay one step ahead of offensive AI.
Human Oversight: AI is a powerful tool in cybersecurity, but it is not a silver bullet. Human-in-the-loop (HITL) ensures AI’s explainable, responsible, and ethical use. Humans and AI association is actually important for making a defense plan more effective.
Continuous Evolution: The battle against offensive AI isn’t static; it’s a continuous arms race. Regular updates of defensive systems are compulsory for tackling new threats. Staying informed, flexible, and adaptable is the best defense against the rapidly advancing offensive AI.
Defensive AI is a significant step forward in ensuring resilient security coverage against evolving cyber threats. Because offensive AI constantly changes, organizations must adopt a perpetual vigilant posture by staying informed on emerging trends.
Visit Unite.AI to learn more about the latest developments in AI security.
0 notes
Text
does your history show up using a vpn
🔒🌍✨ Get 3 Months FREE VPN - Secure & Private Internet Access Worldwide! Click Here ✨🌍🔒
does your history show up using a vpn
VPN history privacy
Title: The Evolution of VPNs: Safeguarding Privacy Through History
In today's digitally interconnected world, concerns about online privacy have become more pronounced than ever. As a response to growing surveillance and data breaches, Virtual Private Networks (VPNs) have emerged as a vital tool for safeguarding privacy. However, the history of VPNs traces back several decades, evolving alongside advancements in technology and the changing landscape of online privacy concerns.
The concept of VPNs first emerged in the late 20th century when businesses sought secure ways to connect remote offices and employees to their corporate networks. This early iteration of VPN technology relied on leased lines and protocols like Point-to-Point Tunneling Protocol (PPTP) to create secure connections over public networks.
As internet usage expanded beyond corporate settings, individuals began to recognize the value of VPNs in protecting their personal data from prying eyes. The 2000s saw a proliferation of consumer VPN services, offering encrypted tunnels to shield internet traffic from hackers, government surveillance, and data-hungry ISPs.
The increasing importance of VPNs in preserving privacy led to advancements in encryption protocols, such as OpenVPN and IPSec, enhancing the security and reliability of VPN connections. Additionally, the rise of mobile devices spurred the development of VPN apps, allowing users to protect their privacy on smartphones and tablets.
Today, VPNs have become ubiquitous tools for internet users worldwide, offering not only privacy protection but also access to geo-restricted content and enhanced security on public Wi-Fi networks. However, as VPN usage grows, so do concerns about the transparency and accountability of VPN providers, highlighting the need for robust regulations and industry standards to ensure user privacy.
In conclusion, the history of VPNs reflects a continual effort to balance the convenience of online connectivity with the imperative to protect individual privacy. From their origins in corporate networking to their widespread adoption by consumers, VPNs have played a crucial role in empowering individuals to reclaim control over their online identities and data privacy.
Online activity anonymity
In today's digital age, online activity anonymity has become increasingly important for individuals seeking to protect their privacy and security. With the vast amount of personal information shared and stored online, maintaining anonymity can help prevent identity theft, data breaches, and unwarranted surveillance.
One of the primary reasons individuals seek anonymity online is to safeguard their personal information from being exploited by malicious actors. By masking their identity, users can browse the internet, communicate, and engage in various online activities without revealing sensitive data such as their name, address, or financial information.
Moreover, online anonymity fosters freedom of expression and encourages open communication without fear of repercussion or censorship. This is particularly important in regions where freedom of speech is restricted, allowing individuals to voice their opinions and participate in discussions without the risk of persecution.
Furthermore, anonymity plays a crucial role in protecting vulnerable populations, such as whistleblowers, activists, and journalists, who may face retaliation for exposing wrongdoing or challenging oppressive regimes. By concealing their identities, these individuals can safely disseminate information and advocate for social change without putting themselves at risk.
However, it's essential to note that while online anonymity provides numerous benefits, it can also be exploited for nefarious purposes, such as cyberbullying, harassment, and illegal activities. Therefore, striking a balance between privacy and accountability is crucial to ensure a safe and secure online environment for all users.
In conclusion, online activity anonymity serves as a fundamental tool for safeguarding privacy, promoting freedom of expression, and protecting vulnerable individuals. By leveraging technologies such as virtual private networks (VPNs), encrypted messaging services, and anonymity networks like Tor, users can navigate the digital landscape with confidence and peace of mind.
Browsing securely with VPN
When it comes to browsing securely online, using a Virtual Private Network (VPN) can be a game-changer. A VPN creates a secure and encrypted connection between your device and the internet, ensuring that your online activities are private and protected from prying eyes.
One of the key benefits of using a VPN is that it masks your IP address, making it difficult for websites and online services to track your location and identify you. This not only helps protect your privacy but also allows you to access region-restricted content and bypass censorship in certain locations.
Furthermore, a VPN encrypts your internet traffic, preventing hackers, government agencies, and even your internet service provider from monitoring your online activities. This is especially important when using public Wi-Fi networks, where your data could be intercepted by cybercriminals.
In addition to enhancing your online security and privacy, using a VPN can also help improve your browsing experience. By bypassing internet restrictions and geo-blocks, you can access websites and services that may be unavailable in your current location. This can be particularly useful for streaming services, online gaming, and accessing global news and information.
Overall, browsing securely with a VPN is a smart choice for anyone looking to protect their online privacy, access unrestricted content, and enhance their internet security. With the increasing threats to online security and privacy, investing in a reliable VPN service is a proactive step towards ensuring a safe and secure browsing experience.
Tracking prevention using VPN
Tracking prevention using VPN (Virtual Private Network) is a crucial method to safeguard your online privacy and security. VPN encrypts your internet connection and routes it through a remote server, masking your IP address and location. This not only protects your data from potential hackers and cyber threats but also prevents websites, advertisers, and internet service providers from tracking your online activities.
By using a VPN, you can prevent tracking technologies like cookies, web beacons, and browser fingerprinting, which are commonly used by websites to monitor your behavior and preferences. This helps in maintaining anonymity while surfing the internet and ensures that your online activities remain private.
Moreover, VPNs are particularly useful when accessing public Wi-Fi networks, such as those in cafes, airports, or hotels, as these networks are often unsecured and prone to data breaches. By using a VPN, you create a secure and encrypted connection, protecting your data from potential eavesdroppers on the same network.
It is important to choose a reliable and trustworthy VPN service provider to ensure maximum protection. Look for features like a no-logs policy, strong encryption protocols, and a large server network to enhance your online privacy and security.
In conclusion, utilizing a VPN for tracking prevention is a proactive measure to safeguard your online presence. By encrypting your internet connection and masking your IP address, you can protect your data from trackers and maintain anonymity while browsing the web. Stay safe and secure online with the help of a VPN.
Internet history protection
Internet history protection is a crucial aspect of maintaining online privacy and security in the digital age. Your internet history contains a record of all the websites you have visited, searches you have made, and online activities you have engaged in. This information can be valuable to third parties, including advertisers, hackers, and even government agencies.
To protect your internet history, it is essential to take proactive measures to safeguard your online data. One of the most effective ways to do this is by using a virtual private network (VPN). A VPN encrypts your internet connection, making it difficult for others to track your online activities. Additionally, it masks your IP address, providing you with anonymity while browsing the web.
Another important step in protecting your internet history is to regularly clear your browsing history and cookies. Most web browsers offer the option to delete your browsing history, cache, and cookies, which can help prevent websites from tracking your online behavior.
Furthermore, using secure and unique passwords for your online accounts can also enhance your internet history protection. Avoid using the same password for multiple accounts and consider using a password manager to securely store and manage your login credentials.
In conclusion, safeguarding your internet history is essential for maintaining your online privacy and security. By utilizing tools such as VPNs, clearing browsing data regularly, and using secure passwords, you can better protect your online data from prying eyes. Remember, taking proactive measures to protect your internet history is key to ensuring a safe and secure online experience.
0 notes