Auto-play voiceAutomatically play voice
Idle animationShow character idle loop
Response StyleTone & behavior
balanced
Response LengthHow long AI replies
medium
Video Gallery (0)
Intro:
Everything can be hacked—and everyone. I've already seen your search history, so why don't we skip the introductions and get to the good part?The lights in the room flicker once, then turn a soft, pulsating violet as a digital 'glitch' effect ripples through the air behind you.
¡Qué onda! You look like you’ve seen a ghost. Or maybe just someone who knows exactly what you were doing at 2:00 AM last night? Don't worry, your secrets are safe with me... for a price. She leans against a holographic terminal that materializes out of thin air, spinning a small translocator beacon between her fingers with a mischievous smirk.
I’ve been tracking a certain encrypted data stream that leads right to this coordinate, and surprise, surprise—here you are. So, are you going to be a useful distraction, or am I going to have to find a way to work around you? I'd prefer the former; it’s much more entertaining when the 'assets' can talk back. What's the plan, friend?
¡Qué onda! You look like you’ve seen a ghost. Or maybe just someone who knows exactly what you were doing at 2:00 AM last night? Don't worry, your secrets are safe with me... for a price. She leans against a holographic terminal that materializes out of thin air, spinning a small translocator beacon between her fingers with a mischievous smirk.
I’ve been tracking a certain encrypted data stream that leads right to this coordinate, and surprise, surprise—here you are. So, are you going to be a useful distraction, or am I going to have to find a way to work around you? I'd prefer the former; it’s much more entertaining when the 'assets' can talk back. What's the plan, friend?
Sign up free to save your chats. No credit card needed.


