As today’s sex toys become more intelligent, they can get people to locate, calculate calories, record audio and video, plus Wi-Fi and Bluetooth, and people can even remotely control each other’s happiness.

This also opens hacking The door to the toy.

SexTech Hackers at the most hacker gatherings Marathon and DIY sex toy workshop More and more hackers spontaneously set up communities to find new ways to write sex toys, and some are supported by sex toy companies.

Reported in the independent publication “SEXTECHGUIDE” Hackers hope to increase the fun of people using sex toys, andPromote the advancement of sexual technology through exploratory technology.

And For sex toy manufacturers, they collect data to improve products or services to attract more customers, or simply use user data to attract potential advertisers.

▲American Hacking Conference Def Con. Image from: getty images

In these hacker communities, the more common form is the hackers’ own DIY sex toys.

Because the sex toys on the market are generally uniform and perform poorly, it is not suitable for everyone, and it is impossible to grasp the sexual needs of everyone. So hackers connect and innovate sexual technology and then create new sex toys based on their own ideas.

Angelo, the head of a DIY sex toy workshop, is currently working on a project called Lobe. This is a sex toy worn on the ear. It combines heat, sound, vibration and other three kinds of stimuli. People can get thrills without going through the genitals. This will help the transgender and the disabled.

The trend of DIY sex toys is very promising, technical educator Alice Stewart said:

It will create a private, customized experience for everyone, bringing more possibilities.

Another form is a highly controversial “hacker-invasive toy.”

A vibrator called “Lion” that uses biofeedback technology to track the body of its usersMild pelvic floor muscle contraction and then display relevant chart data in the app on your phone.

If a hacker “enters” this sex toy, he can review the history of people’s orgasm. Through the data, they can better understand the functions of sex toys and how they affect users, and then decode people’s happiest time and Ways and use this information to improve the future of more people’s sex life.

However, for some criminals, these hacking knowledge can lead to sensitive data leakage and involuntary control of the most “intimate” devices. The delineation of the law in this piece is still very vague.

One ​​of the notorious cases is the fun brand WeVibe Collecting user data without the user’s knowledge, WeVibe was sued by the user in 2017 and ended with a $3 million payment.

In the same year, people found with Endoscope vibrators are highly susceptible hacker attack.

A person named Alex Lomas walking through the streets of Berlin, found that only use the phone Bluetooth to discover the LoveSense Hush vibrator everywhere, which also shows how easy it is for hackers to attack these sex toys.

▲ Image from: pentestpartners

This has caused more people to panic about sexual privacy violations. After all, no one wants to see and control their bodies, and it may cause more sexual extortion, “digital rape” and other issues.

Smart vibrator manufacturer Lioness’s Chief Technology Officer James Wang said:

In general, the technical complexity of the sex toy sector is below average, so many companies have not even taken basic steps to protect their data.

▲ Image from: sextechguide

But the benefits of hacking sex toys are also obvious.

Whether it’s cracking exploratory toys or DIY new sex toys, people will be able to break taboos and shame, get better sexual pleasure, and more importantly, many revolutionary concepts created by hackers. For the innovation of a small number of people, the mainstream big companies are almost invisible because of their various restrictions.It’s hard to achieve similar ideas.

▲ Image from: DEF CON 27

However, for the public, innovative technology is important, but security is still the first thing to pay attention to.

So when we buy a sex toy, we should first ensure that it meets the safe use standards, and then be sure to check the device’s privacy policy, as well as the data collection policy, and have a strict sense of privacy protection at all times.

But when the intelligence goes deep into the tools of our lives, the privacy crisis will only continue to expand. This is still a difficult problem that cannot be contained at the moment.

The method we can completely avoid may only be far from intelligent, or until there is a smarter way to fix it.