What is teledildonics and how it works

With the onset of the coronavirus pandemic, sales of sex toys, in particular “smart” devices for remote sex, have increased. We tell you how technology helps to make love at a distance and what pitfalls there are

What is this?

Teledildonics is sex at a distance with the help of various “smart” devices. They allow users to “feel” each other, even if they are on different ends of the Earth.

How does it work?

“Smart” sex toys can be used in real time, or they can be used according to an already written script or with partner data saved in advance. The male toy is usually a “sleeve” – ​​a masturbator, and the female – a dildo or vibrator. Intelligent masturbators can contract to the rhythm of the actions taking place on the phone screen, as well as to the rhythm of the movements of the vibrator, which is at that moment in the hands of the partner. The vibrator from the kit has a touch surface, and all the manipulations that the girl does with it are transmitted over the Network to the masturbator.

If we talk about a pre-written script, then, as a rule, we are talking about porn in VR. A person puts on VR glasses or a helmet, some action unfolds in front of him, and the “smart” masturbator is synchronized with the manipulations of virtual heroes.

Security

Like all devices connected to the Internet, smart sex toys are vulnerable to cybercriminals. These devices are typically made by companies that have never connected their products to the Web before. Accordingly, most of them did not have to worry about the consequences of data collection and Internet security.

Hacking the software of a sex gadget is not only an invasion of privacy and obtaining information about the user’s intimate life. A hacker can take control of a “smart” sex toy and cause harm to the user.

How to make sure that a sex toy does not threaten your privacy?

Find out:

  • Does the manufacturer use encryption
  • Is there an automatic security update?
  • What are the requirements for passwords (if applicable)
  • Is there a privacy policy
  • How the manufacturer fixes vulnerabilities in the software of its products

Subscribe and follow us on Yandex.Zen — technology, innovation, economics, education and sharing in one channel.

Leave a Reply