Posts

Showing posts from October, 2025

How to Reset MF642cdw printer

Image
I made this to document what I was able to do to finally reset my MF642cdw printer. This info should be easy to find at canon, but it is not. It took several hours of searching and repeated trial and error.
Organized Pushback on Domestic Deployments and Overreach (Oct 16, 2025) Print '+el.outerHTML+' ');w.document.close();w.onload=function(){w.focus();w.print();w.close();};})().constructor;return false;" style="display:inline-block;padding:6px 12px;border:1px solid #888;background:#f5f5f5;border-radius:4px;white-space:nowrap;text-decoration:none;color:#000;"> Print Tip: The print button prints only this box.

AI-Driven Porn: Risks, Defenses, and Remedies

AI-Driven Porn: Risks, Defenses, and Remedies Classification: Public • Prepared: Oct 2025 Print Summary. AI is now deeply embedded in adult content: synthetic companions and DM chatbots monetize parasocial ties, deepfakes scale non-consensual abuse, and minors face rising exposure. Practical defenses: friction and spending limits, CBT-style habit swaps, real age-gating, provenance checks, and fast takedowns for non-consensual content (Marshall et al., 2024; Knibbs, 2024; Ajder et al., 2019; Ofcom, 2025; Thorn, 2025a). Snapshot: What Is True Today Synthetic companions and AI chatters. Agencies deploy LLM bots to run performer DMs, remember preferences, and push upsells (Marshall et al., 2024; Knibbs, 2024). Deepfakes and nudify tools. Most detected deepfakes have been sexual and target women; lawsuits and platform crackdowns continue (Ajder et al., 2019; The Verge, 2024; 2025). Youth risk and sextortion. Youth report expo...
Trantor Security Advisory Print Subject: ShinyScatteredLapsus (aka Scattered Lapsus$ Hunters) extortion activity targeting SaaS integrations • Date: Oct 6, 2025 • Classification: Internal – Awareness & Preparedness Overview We are tracking an active hybrid extortion campaign attributed to the group styling itself as “Scattered Lapsus$ Hunters,” linked in public reporting to threat clusters UNC6040 and UNC6395. Tactics combine social engineering (notably vishing), abuse of OAuth/connected apps in SaaS ecosystems (e.g., Salesforce), bulk data exports via legitimate APIs, and public pressure via a leak site naming dozens of organizations. Observed Tactics Initial access: voice-phishing calls impersonating IT/help-desk to steer targets into approving access or installing “connected apps.” OAuth/Connected-app abuse: attacker-controlled apps granted broad scopes enable persistent API access that can bypass normal MFA checks. ...
Image
Fringe Party A few years ago, I was interviewed for a movie about the smaller political parties in Canada. The movie was called 'Fringe Party'. The movie was shown at a couple of film festivals, but I did not hear much about it. It was made available about six years ago now. The text and links below are a cut and paste from an old Facebook post I made. The person who interviewed me for this was personable, friendly, and fair. He pitched what I felt were softball questions designed to generally get my opinion. I'm thankful that I and others were given a small voice. Note: This is mostly here as a reference for myself. It was not all that long ago, but I look much older now. It's nice to see the younger man here. Bob Trower For people interested, here are the few small clips with me in them: One of the challenges that small parties face is financing. I actually did a review of the finances involved in a federal election and found that usually the person who spent the mo...