July 24, 2021

Hacker takes IoT chastity belts hostage – News

A hacker has taken internet-connected penis cages hostage and demands 0.02 bitcoin (approximately 550 euros) in ransom to restore access.

That reports tech blog Motherboard. A penis cage or chastity belt is a sex toy that a man can wear around his penis after which he can no longer get an erection. It is a popular item in the sm scene because the key, and thus control over the genitals, can be given to a sex partner.

Remote controlled

A chastity cage usually has an analog lock, but there are also digital variants that can be controlled remotely with an app. The hack in question affects the Cellmate cages from the Chinese manufacturer Qiui. Last October they were discredited because security researchers found out that they could be cracked.

At the time, it was known that hackers can not only take the cages hostage, but also read messages sent via the Qiui app and that the user’s location can be seen. The manufacturer then announced that it had closed the leak in an update, but that users who had not installed the update remained vulnerable.

The manufacturer has not yet responded to the current hack.

That reports tech blog Motherboard. A penis cage or chastity belt is a sex toy that a man can wear around his penis after which he can no longer get an erection. It is a popular item in the sm scene because the key, and thus control over the genitals, can be given to a sex partner. A chastity cage usually has an analog lock, but there are also digital variants that can be controlled remotely with an app. The hack in question affects the Cellmate cages from the Chinese manufacturer Qiui. Last October, these were already discredited because security researchers found out that they could be cracked. At the time, it became known that hackers can not only take the cages hostage, but can also read messages sent via the Qiui app and that the user’s location can be traced. seeing is. The manufacturer then announced that it had closed the leak in an update, but that users who had not installed the update remained vulnerable. The manufacturer has not yet responded to the current hack.

.