I made this to document what I was able to do to finally reset my MF642cdw printer. This info should be easy to find at canon, but it is not. It took several hours of searching and repeated trial and error.
Thursday, October 16, 2025
Organized Pushback on Domestic Deployments and Overreach (Oct 16, 2025)
Summary. AI is now deeply embedded in adult content: synthetic companions and DM chatbots monetize parasocial ties, deepfakes scale non-consensual abuse, and minors face rising exposure. Practical defenses: friction and spending limits, CBT-style habit swaps, real age-gating, provenance checks, and fast takedowns for non-consensual content (Marshall et al., 2024; Knibbs, 2024; Ajder et al., 2019; Ofcom, 2025; Thorn, 2025a).
Snapshot: What Is True Today
Synthetic companions and AI chatters. Agencies deploy LLM bots to run performer DMs, remember preferences, and push upsells (Marshall et al., 2024; Knibbs, 2024).
Deepfakes and nudify tools. Most detected deepfakes have been sexual and target women; lawsuits and platform crackdowns continue (Ajder et al., 2019; The Verge, 2024; 2025).
Youth risk and sextortion. Youth report exposure, deepfake targeting, and sextortion that leverages AI artifacts (Thorn, 2025a; 2025b).
Policy trend. UK regulator requires highly effective age checks for porn services (Ofcom, 2025).
Provenance signals. C2PA content credentials are being adopted to help verify image origins (C2PA, 2025; Warren, 2024).
Harms In Scope
Compulsivity/overuse. A subset shows impaired control consistent with CSBD in ICD-11; evidence-based therapies are available (Mayo Clinic, 2023; Grant et al., 2025; Baumeister et al., 2024; Crosby and Twohig, 2016).
Monetary drainage and deception. Chatbots are optimized to maximize time and spend (Marshall et al., 2024; Knibbs, 2024).
Non-consensual image abuse. Deepfakes and nudification drive reputational and psychological harm, including for minors (Ajder et al., 2019; The Verge, 2020; 2024; 2025).
Sextortion and recovery scams. Offenders and fake removal services exploit shame and payment rails (Cybertip.ca, 2023).
Prevention Protocols (With Rationale)
Friction at the edge. Use DNS/router filters and remove autoplay and pay-enabled apps. Rationale: reduces cue-driven access and funnels (Marshall et al., 2024; Knibbs, 2024).
Personal guardrails. OS screen-time limits and prepaid spending caps. Rationale: bounds what revenue optimizers can extract (Marshall et al., 2024).
Trigger audit. Note time-of-day, mood, and context that precede use; replace routines. Rationale: CBT and ACT approaches reduce problematic porn use (Crosby and Twohig, 2016; Baumeister et al., 2024).
Family and youth. Turn on parental controls and prefer services with audited age checks; teach that AI nudes of real people cause real harms (Ofcom, 2025; Thorn, 2025a).
Provenance checks. Prefer platforms exposing Content Credentials (C2PA) and teach how to inspect them (C2PA, 2025; Warren, 2024).
If You Are Already In The Funnel
Financial and data triage today. Cancel subscriptions, freeze or replace cards, purge DM histories, revoke app access.
Behavioral supports this month. Practice ACT skills (urge surfing, values commitments) and imaginal retraining 5–10 minutes per day (Crosby and Twohig, 2016; Baumeister et al., 2024).
Relationship repair. Share boundaries on time, spend, and content; consider guided sessions framed around values rather than shame.
Rapid Response: NCII and Deepfakes
Do not pay removal services. Preserve evidence, including messages and payment demands (Cybertip.ca, 2023).
Hash-match takedown. Adults: StopNCII.org uses local hashing and blocklists across partner platforms. Youth in Canada: NeedHelpNow.ca has step-by-steps (StopNCII, 2025; NeedHelpNow.ca, 2025).
Copyright/DMCA route. For your own photos/videos, file notices with hosts and platforms (U.S. Copyright Office, n.d.; Copyright Alliance, n.d.).
Escalate and report. Involve police for threats, minors, or stalking; regulators and courts are fining non-compliant platforms (Reuters, 2025).
References
Ajder, H., Patrini, G., Cavalli, F., and Cullen, L. (2019). The State of Deepfakes: Landscape, threats, and impact. Deeptrace. https://storage.googleapis.com/deeptrace-public/Deeptrace-the-State-of-Deepfakes-2019.pdf
Baumeister, A., Gehlenborg, J., Schuurmans, L., Moritz, S., and Briken, P. (2024). Reducing problematic pornography use with imaginal retraining: A randomized controlled trial. Journal of Behavioral Addictions, 13(2), 622–634. https://akjournals.com/view/journals/2006/13/2/article-p622.xml
Canadian Centre for Child Protection. (2023, January). Cybertip.ca Alert: Think twice before accepting help with removing images online for a fee. https://cybertip.ca/en/online-harms/alerts/2023/recovery-scams/
Crosby, J. M., and Twohig, M. P. (2016). Acceptance and commitment therapy for problematic Internet pornography use: A randomized trial. Behavior Therapy, 47(3), 355–366. https://pubmed.ncbi.nlm.nih.gov/27157029/
Grant, J. E., et al. (2025). Compulsive sexual behavior disorder: Rates and clinical correlates. Frontiers in Psychiatry. https://www.frontiersin.org/journals/psychiatry/articles/10.3389/fpsyt.2025.1561885/pdf
Knibbs, K. (2024, December 11). OnlyFans models are using AI impersonators to keep up with their DMs. WIRED. https://www.wired.com/story/onlyfans-models-are-using-ai-impersonators-to-keep-up-with-their-dms/
Marshall, A. R. C., Szep, J., and So, L. (2024, July 30). AI bots talk dirty so OnlyFans stars do not have to. Reuters. https://www.reuters.com/technology/artificial-intelligence/ai-bots-talk-dirty-so-onlyfans-stars-dont-have-2024-07-30/
Mayo Clinic Staff. (2023, April 19). Compulsive sexual behavior: Diagnosis and treatment. Mayo Clinic. https://www.mayoclinic.org/diseases-conditions/compulsive-sexual-behavior/diagnosis-treatment/drc-20360453
NeedHelpNow.ca. (2025). Help for youth (U18) when a nude is shared. https://needhelpnow.ca/en/
Ofcom. (2025, January 16). Age checks to protect children online. https://www.ofcom.org.uk/online-safety/protecting-children/age-checks-to-protect-children-online
Reuters. (2025, September 9). X fined in Canada for failing to remove non-consensual intimate image. https://www.reuters.com/legal/litigation/elon-musks-x-faces-canadian-fine-not-removing-non-consensual-intimate-images-2025-09-09/
StopNCII.org. (2025). How StopNCII.org works. https://stopncii.org/how-it-works/
Thorn. (2025a, March 3). Deepfake nudes and young people. https://www.thorn.org/research/library/deepfake-nudes-and-young-people/
Thorn. (2025b, June 24). The state of sextortion in 2025. https://www.thorn.org/blog/the-state-of-sextortion-in-2025/
The Verge. (2020, October 20). Deepfake bots on Telegram make the work of creating fake nudes dangerously easy. https://www.theverge.com/2020/10/20/21519322/deepfake-fake-nudes-telegram-bot-deepnude-sensity-report
The Verge. (2024, August 16). AI-powered undressing websites are getting sued. https://www.theverge.com/2024/8/16/24221651/ai-deepfake-nude-undressing-websites-lawsuit-sanfrancisco
The Verge. (2025, June 12). Meta cracks down on nudify apps after being exposed. https://www.theverge.com/news/685985/meta-lawsuit-crushai-nudify-app-ads
Warren, T. (2024, September 17). Google outlines plans to help you sort real images from fake. The Verge. https://www.theverge.com/2024/9/17/24247004/google-c2pa-verify-ai-generated-images-content
We are tracking an active hybrid extortion campaign attributed to the group styling itself as “Scattered Lapsus$ Hunters,” linked in public reporting to threat clusters UNC6040 and UNC6395. Tactics combine social engineering (notably vishing), abuse of OAuth/connected apps in SaaS ecosystems (e.g., Salesforce), bulk data exports via legitimate APIs, and public pressure via a leak site naming dozens of organizations.
Observed Tactics
Initial access: voice-phishing calls impersonating IT/help-desk to steer targets into approving access or installing “connected apps.”
OAuth/Connected-app abuse: attacker-controlled apps granted broad scopes enable persistent API access that can bypass normal MFA checks.
Data exfiltration: large, legitimate API or “Data Loader” style pulls used for extortion leverage.
Public coercion: leak-site listings, crowd-sourced OSINT tasks, and media theatrics to pressure executive teams.
Risk Assessment
High impact for organizations with broad SaaS integrations; exposure can include customer/CRM data and downstream credentials.
Moderate likelihood of contact/targeting via service-desk or partner channels.
Secondary risks: regulatory, reputational, and operational (forced resets, investigations).
Recommended Mitigations (actionable)
Audit connected apps now: enumerate all OAuth/connected apps in Salesforce, Google Workspace, Microsoft 365, etc. Disable or quarantine unknown or over-permissive apps. Favor whitelisting.
Constrain scopes and tokens: enforce least-privilege scopes; rotate/revoke stale tokens; shorten session lifetimes; require periodic re-consent; disable non-admin authorization of new, uninstalled apps.
Harden help-desk flows: require out-of-band callbacks on any access/change requests; maintain challenge scripts; log and rate-limit sensitive actions initiated via phone support.
Monitor for abnormal exports: alert on unusual API/bulk export volumes, new connected apps, or atypical integration behavior and geographies.
Run vishing/phishing drills: quarterly simulations focused on phone-based social engineering and OAuth approval traps.
Prep comms playbooks: align Security, Legal, and PR for potential public extortion posts; treat leak-site activity as part of the attack lifecycle.
Backups & segmentation: ensure recoverability and limit blast radius if data is exfiltrated or abused.
A few years ago, I was interviewed for a movie about the smaller political parties in Canada. The movie was called 'Fringe Party'. The movie was shown at a couple of film festivals, but I did not hear much about it. It was made available about six years ago now. The text and links below are a cut and paste from an old Facebook post I made. The person who interviewed me for this was personable, friendly, and fair. He pitched what I felt were softball questions designed to generally get my opinion. I'm thankful that I and others were given a small voice. Note: This is mostly here as a reference for myself. It was not all that long ago, but I look much older now. It's nice to see the younger man here.
For people interested, here are the few small clips with me in them:
One of the challenges that small parties face is financing. I actually did a review of the finances involved in a federal election and found that usually the person who spent the most money got elected and if they didn't, a close runner-up who spent only a bit less won. The stakes have gone up, but at the time, it only took about $100K to win a seat in parliament: https://www.youtube.com/embed/Vu3rNQNJv1Y?start=1304...
YOUTUBE.COM
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)
One of the issues that concerns me is that our elections are somewhat farcical in that all the big party candidates have more in common with each other than they do you and I: https://www.youtube.com/embed/Vu3rNQNJv1Y?start=1655...
YOUTUBE.COM
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)
At the time this was being filmed, most of the small parties and a majority of the big parties felt that the incumbent Prime Minister (Harper), just had to go. I think that I expressed the majority opinion well here: https://www.youtube.com/embed/Vu3rNQNJv1Y?start=1705...
YOUTUBE.COM
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)