Monday, October 20, 2025

How to Reset MF642cdw printer

I made this to document what I was able to do to finally reset my MF642cdw printer. This info should be easy to find at canon, but it is not. It took several hours of searching and repeated trial and error.

Thursday, October 16, 2025

Organized Pushback on Domestic Deployments and Overreach (Oct 16, 2025)

Print

Tip: The print button prints only this box.

AI-Driven Porn: Risks, Defenses, and Remedies

AI-Driven Porn: Risks, Defenses, and Remedies

Classification: Public • Prepared: Oct 2025

Summary. AI is now deeply embedded in adult content: synthetic companions and DM chatbots monetize parasocial ties, deepfakes scale non-consensual abuse, and minors face rising exposure. Practical defenses: friction and spending limits, CBT-style habit swaps, real age-gating, provenance checks, and fast takedowns for non-consensual content (Marshall et al., 2024; Knibbs, 2024; Ajder et al., 2019; Ofcom, 2025; Thorn, 2025a).

Snapshot: What Is True Today

  • Synthetic companions and AI chatters. Agencies deploy LLM bots to run performer DMs, remember preferences, and push upsells (Marshall et al., 2024; Knibbs, 2024).
  • Deepfakes and nudify tools. Most detected deepfakes have been sexual and target women; lawsuits and platform crackdowns continue (Ajder et al., 2019; The Verge, 2024; 2025).
  • Youth risk and sextortion. Youth report exposure, deepfake targeting, and sextortion that leverages AI artifacts (Thorn, 2025a; 2025b).
  • Policy trend. UK regulator requires highly effective age checks for porn services (Ofcom, 2025).
  • Provenance signals. C2PA content credentials are being adopted to help verify image origins (C2PA, 2025; Warren, 2024).

Harms In Scope

  • Compulsivity/overuse. A subset shows impaired control consistent with CSBD in ICD-11; evidence-based therapies are available (Mayo Clinic, 2023; Grant et al., 2025; Baumeister et al., 2024; Crosby and Twohig, 2016).
  • Monetary drainage and deception. Chatbots are optimized to maximize time and spend (Marshall et al., 2024; Knibbs, 2024).
  • Non-consensual image abuse. Deepfakes and nudification drive reputational and psychological harm, including for minors (Ajder et al., 2019; The Verge, 2020; 2024; 2025).
  • Sextortion and recovery scams. Offenders and fake removal services exploit shame and payment rails (Cybertip.ca, 2023).

Prevention Protocols (With Rationale)

  1. Friction at the edge. Use DNS/router filters and remove autoplay and pay-enabled apps. Rationale: reduces cue-driven access and funnels (Marshall et al., 2024; Knibbs, 2024).
  2. Personal guardrails. OS screen-time limits and prepaid spending caps. Rationale: bounds what revenue optimizers can extract (Marshall et al., 2024).
  3. Trigger audit. Note time-of-day, mood, and context that precede use; replace routines. Rationale: CBT and ACT approaches reduce problematic porn use (Crosby and Twohig, 2016; Baumeister et al., 2024).
  4. Family and youth. Turn on parental controls and prefer services with audited age checks; teach that AI nudes of real people cause real harms (Ofcom, 2025; Thorn, 2025a).
  5. Provenance checks. Prefer platforms exposing Content Credentials (C2PA) and teach how to inspect them (C2PA, 2025; Warren, 2024).

If You Are Already In The Funnel

  1. Financial and data triage today. Cancel subscriptions, freeze or replace cards, purge DM histories, revoke app access.
  2. Behavioral supports this month. Practice ACT skills (urge surfing, values commitments) and imaginal retraining 5–10 minutes per day (Crosby and Twohig, 2016; Baumeister et al., 2024).
  3. Relationship repair. Share boundaries on time, spend, and content; consider guided sessions framed around values rather than shame.

Rapid Response: NCII and Deepfakes

  1. Do not pay removal services. Preserve evidence, including messages and payment demands (Cybertip.ca, 2023).
  2. Hash-match takedown. Adults: StopNCII.org uses local hashing and blocklists across partner platforms. Youth in Canada: NeedHelpNow.ca has step-by-steps (StopNCII, 2025; NeedHelpNow.ca, 2025).
  3. Copyright/DMCA route. For your own photos/videos, file notices with hosts and platforms (U.S. Copyright Office, n.d.; Copyright Alliance, n.d.).
  4. Escalate and report. Involve police for threats, minors, or stalking; regulators and courts are fining non-compliant platforms (Reuters, 2025).

References

  1. Ajder, H., Patrini, G., Cavalli, F., and Cullen, L. (2019). The State of Deepfakes: Landscape, threats, and impact. Deeptrace. https://storage.googleapis.com/deeptrace-public/Deeptrace-the-State-of-Deepfakes-2019.pdf
  2. Baumeister, A., Gehlenborg, J., Schuurmans, L., Moritz, S., and Briken, P. (2024). Reducing problematic pornography use with imaginal retraining: A randomized controlled trial. Journal of Behavioral Addictions, 13(2), 622–634. https://akjournals.com/view/journals/2006/13/2/article-p622.xml
  3. Canadian Centre for Child Protection. (2023, January). Cybertip.ca Alert: Think twice before accepting help with removing images online for a fee. https://cybertip.ca/en/online-harms/alerts/2023/recovery-scams/
  4. C2PA. (2025). C2PA Specifications (v2.2). https://c2pa.org/specifications/specifications/2.2/index.html
  5. Crosby, J. M., and Twohig, M. P. (2016). Acceptance and commitment therapy for problematic Internet pornography use: A randomized trial. Behavior Therapy, 47(3), 355–366. https://pubmed.ncbi.nlm.nih.gov/27157029/
  6. Grant, J. E., et al. (2025). Compulsive sexual behavior disorder: Rates and clinical correlates. Frontiers in Psychiatry. https://www.frontiersin.org/journals/psychiatry/articles/10.3389/fpsyt.2025.1561885/pdf
  7. Knibbs, K. (2024, December 11). OnlyFans models are using AI impersonators to keep up with their DMs. WIRED. https://www.wired.com/story/onlyfans-models-are-using-ai-impersonators-to-keep-up-with-their-dms/
  8. Marshall, A. R. C., Szep, J., and So, L. (2024, July 30). AI bots talk dirty so OnlyFans stars do not have to. Reuters. https://www.reuters.com/technology/artificial-intelligence/ai-bots-talk-dirty-so-onlyfans-stars-dont-have-2024-07-30/
  9. Mayo Clinic Staff. (2023, April 19). Compulsive sexual behavior: Diagnosis and treatment. Mayo Clinic. https://www.mayoclinic.org/diseases-conditions/compulsive-sexual-behavior/diagnosis-treatment/drc-20360453
  10. NeedHelpNow.ca. (2025). Help for youth (U18) when a nude is shared. https://needhelpnow.ca/en/
  11. Ofcom. (2025, January 16). Age checks to protect children online. https://www.ofcom.org.uk/online-safety/protecting-children/age-checks-to-protect-children-online
  12. Reuters. (2025, September 9). X fined in Canada for failing to remove non-consensual intimate image. https://www.reuters.com/legal/litigation/elon-musks-x-faces-canadian-fine-not-removing-non-consensual-intimate-images-2025-09-09/
  13. StopNCII.org. (2025). How StopNCII.org works. https://stopncii.org/how-it-works/
  14. Thorn. (2025a, March 3). Deepfake nudes and young people. https://www.thorn.org/research/library/deepfake-nudes-and-young-people/
  15. Thorn. (2025b, June 24). The state of sextortion in 2025. https://www.thorn.org/blog/the-state-of-sextortion-in-2025/
  16. The Verge. (2020, October 20). Deepfake bots on Telegram make the work of creating fake nudes dangerously easy. https://www.theverge.com/2020/10/20/21519322/deepfake-fake-nudes-telegram-bot-deepnude-sensity-report
  17. The Verge. (2024, August 16). AI-powered undressing websites are getting sued. https://www.theverge.com/2024/8/16/24221651/ai-deepfake-nude-undressing-websites-lawsuit-sanfrancisco
  18. The Verge. (2025, June 12). Meta cracks down on nudify apps after being exposed. https://www.theverge.com/news/685985/meta-lawsuit-crushai-nudify-app-ads
  19. Warren, T. (2024, September 17). Google outlines plans to help you sort real images from fake. The Verge. https://www.theverge.com/2024/9/17/24247004/google-c2pa-verify-ai-generated-images-content

Monday, October 6, 2025

Trantor Security Advisory

Subject: ShinyScatteredLapsus (aka Scattered Lapsus$ Hunters) extortion activity targeting SaaS integrations • Date: Oct 6, 2025 • Classification: Internal – Awareness & Preparedness

Overview

We are tracking an active hybrid extortion campaign attributed to the group styling itself as “Scattered Lapsus$ Hunters,” linked in public reporting to threat clusters UNC6040 and UNC6395. Tactics combine social engineering (notably vishing), abuse of OAuth/connected apps in SaaS ecosystems (e.g., Salesforce), bulk data exports via legitimate APIs, and public pressure via a leak site naming dozens of organizations.

Observed Tactics

  • Initial access: voice-phishing calls impersonating IT/help-desk to steer targets into approving access or installing “connected apps.”
  • OAuth/Connected-app abuse: attacker-controlled apps granted broad scopes enable persistent API access that can bypass normal MFA checks.
  • Data exfiltration: large, legitimate API or “Data Loader” style pulls used for extortion leverage.
  • Public coercion: leak-site listings, crowd-sourced OSINT tasks, and media theatrics to pressure executive teams.

Risk Assessment

  • High impact for organizations with broad SaaS integrations; exposure can include customer/CRM data and downstream credentials.
  • Moderate likelihood of contact/targeting via service-desk or partner channels.
  • Secondary risks: regulatory, reputational, and operational (forced resets, investigations).

Recommended Mitigations (actionable)

  1. Audit connected apps now: enumerate all OAuth/connected apps in Salesforce, Google Workspace, Microsoft 365, etc. Disable or quarantine unknown or over-permissive apps. Favor whitelisting.
  2. Constrain scopes and tokens: enforce least-privilege scopes; rotate/revoke stale tokens; shorten session lifetimes; require periodic re-consent; disable non-admin authorization of new, uninstalled apps.
  3. Harden help-desk flows: require out-of-band callbacks on any access/change requests; maintain challenge scripts; log and rate-limit sensitive actions initiated via phone support.
  4. Monitor for abnormal exports: alert on unusual API/bulk export volumes, new connected apps, or atypical integration behavior and geographies.
  5. Run vishing/phishing drills: quarterly simulations focused on phone-based social engineering and OAuth approval traps.
  6. Prep comms playbooks: align Security, Legal, and PR for potential public extortion posts; treat leak-site activity as part of the attack lifecycle.
  7. Backups & segmentation: ensure recoverability and limit blast radius if data is exfiltrated or abused.

Key References

Trantor Security Team • Security Operations & Intelligence • [email protected]

Thursday, October 2, 2025

Fringe Party

A few years ago, I was interviewed for a movie about the smaller political parties in Canada. The movie
was called 'Fringe Party'. The movie was shown at a couple of film festivals, but I did not hear much about it. It was made available about six years ago now. The text and links below are a cut and paste from an old Facebook post I made. The person who interviewed me for this was personable, friendly, and fair. He pitched what I felt were softball questions designed to generally get my opinion. I'm thankful that I and others were given a small voice. Note: This is mostly here as a reference for myself. It was not all that long ago, but I look much older now. It's nice to see the younger man here.
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)

Bob Trower
For people interested, here are the few small clips with me in them:
One of the challenges that small parties face is financing. I actually did a review of the finances involved in a federal election and found that usually the person who spent the most money got elected and if they didn't, a close runner-up who spent only a bit less won. The stakes have gone up, but at the time, it only took about $100K to win a seat in parliament: https://www.youtube.com/embed/Vu3rNQNJv1Y?start=1304...
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)
YOUTUBE.COM
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)

FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)


Bob Trower
One of the issues that concerns me is that our elections are somewhat farcical in that all the big party candidates have more in common with each other than they do you and I: https://www.youtube.com/embed/Vu3rNQNJv1Y?start=1655...
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)
YOUTUBE.COM
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)

FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)


Bob Trower
At the time this was being filmed, most of the small parties and a majority of the big parties felt that the incumbent Prime Minister (Harper), just had to go. I think that I expressed the majority opinion well here: https://www.youtube.com/embed/Vu3rNQNJv1Y?start=1705...
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)
YOUTUBE.COM
FRINGE PARTY - An Inside Look at Political Outsiders (Documentary)

FRINGE PARTY - An Inside Look at Political Outsiders (Document

Get Real

Copy 🖨️ Print / Save as PDF Let's Get Real I gave Deep...