Organized Pushback on Domestic Deployments and Overreach (Oct 16, 2025) Print '+el.outerHTML+' ');w.document.close();w.onload=function(){w.focus();w.print();w.close();};})().constructor;return false;" style="display:inline-block;padding:6px 12px;border:1px solid #888;background:#f5f5f5;border-radius:4px;white-space:nowrap;text-decoration:none;color:#000;"> Print Tip: The print button prints only this box.
Posts
Showing posts from 2025
AI-Driven Porn: Risks, Defenses, and Remedies
- Get link
- X
- Other Apps
AI-Driven Porn: Risks, Defenses, and Remedies Classification: Public • Prepared: Oct 2025 Print Summary. AI is now deeply embedded in adult content: synthetic companions and DM chatbots monetize parasocial ties, deepfakes scale non-consensual abuse, and minors face rising exposure. Practical defenses: friction and spending limits, CBT-style habit swaps, real age-gating, provenance checks, and fast takedowns for non-consensual content (Marshall et al., 2024; Knibbs, 2024; Ajder et al., 2019; Ofcom, 2025; Thorn, 2025a). Snapshot: What Is True Today Synthetic companions and AI chatters. Agencies deploy LLM bots to run performer DMs, remember preferences, and push upsells (Marshall et al., 2024; Knibbs, 2024). Deepfakes and nudify tools. Most detected deepfakes have been sexual and target women; lawsuits and platform crackdowns continue (Ajder et al., 2019; The Verge, 2024; 2025). Youth risk and sextortion. Youth report expo...
- Get link
- X
- Other Apps
Trantor Security Advisory Print Subject: ShinyScatteredLapsus (aka Scattered Lapsus$ Hunters) extortion activity targeting SaaS integrations • Date: Oct 6, 2025 • Classification: Internal – Awareness & Preparedness Overview We are tracking an active hybrid extortion campaign attributed to the group styling itself as “Scattered Lapsus$ Hunters,” linked in public reporting to threat clusters UNC6040 and UNC6395. Tactics combine social engineering (notably vishing), abuse of OAuth/connected apps in SaaS ecosystems (e.g., Salesforce), bulk data exports via legitimate APIs, and public pressure via a leak site naming dozens of organizations. Observed Tactics Initial access: voice-phishing calls impersonating IT/help-desk to steer targets into approving access or installing “connected apps.” OAuth/Connected-app abuse: attacker-controlled apps granted broad scopes enable persistent API access that can bypass normal MFA checks. ...
- Get link
- X
- Other Apps

Fringe Party A few years ago, I was interviewed for a movie about the smaller political parties in Canada. The movie was called 'Fringe Party'. The movie was shown at a couple of film festivals, but I did not hear much about it. It was made available about six years ago now. The text and links below are a cut and paste from an old Facebook post I made. The person who interviewed me for this was personable, friendly, and fair. He pitched what I felt were softball questions designed to generally get my opinion. I'm thankful that I and others were given a small voice. Note: This is mostly here as a reference for myself. It was not all that long ago, but I look much older now. It's nice to see the younger man here. Bob Trower For people interested, here are the few small clips with me in them: One of the challenges that small parties face is financing. I actually did a review of the finances involved in a federal election and found that usually the person who spent the mo...