Qiui

Last updated
Qiui
Type Private
Foundedc. 2019
Headquarters,
China
Area served
Worldwide via distributors
Products Sex toys
Website www.qiuitoy.com

Qiui is a Chinese company that manufactures Internet-connected sex toys.

The company's most famous product is the Cellmate remote-controlled chastity cage, [1] which is Bluetooth-controlled and communicates with the Internet via a cellphone app. When locked, the cage is held closed by a locking pin. In normal operation, the locking pin can only be released by a small electric motor that is controlled by an onboard micro-controller. In October 2020, a group of security researchers revealed that the Cellmate's API was exploitable in a way such that Cellmate devices could be permanently locked shut, trapping the user's penis in the device. [2] [3] Qiui provided a software work-around using an updated version of the app, and a physical solution, if all else fails, of using a screwdriver to disassemble the device. [4] [5]

Related Research Articles

<span class="mw-page-title-main">Chastity belt</span> Device to prevent sexual activity

A chastity belt is a locking item of clothing designed to prevent sexual intercourse or masturbation. Such belts were historically designed for women, ostensibly for the purpose of chastity, to protect women from rape or to dissuade women and their potential sexual partners from sexual temptation. Modern versions of the chastity belt are predominantly, but not exclusively, used in the BDSM community, and chastity belts are now designed for male wearers in addition to female wearers.

<span class="mw-page-title-main">Chastity belt (BDSM)</span> Device to prevent sexual activity in BDSM play

Chastity belts are a type of chastity device used in BDSM as part of the practice of orgasm denial, to prevent the wearer from engaging in certain types of sexual activity without the permission of the dominant, who acts as "keyholder", possessing the key that unlocks the chastity belt. Without access to the key, the wearer usually cannot take off the chastity belt or device. Dominants may also enjoy long-distance chastity with their sub by keeping the key in a third location that the chastity wearer cannot access by themself.

The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks. The Internet of things encompasses electronics, communication and computer science engineering. Internet of things has been considered a misnomer because devices do not need to be connected to the public internet, they only need to be connected to a network, and be individually addressable.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

A smart TV, also known as a connected TV (CTV), is a traditional television set with integrated Internet and interactive Web 2.0 features, which allows users to stream music and videos, browse the internet, and view photos. Smart TVs are a technological convergence of computers, televisions, and digital media players. Besides the traditional functions of television sets provided through traditional broadcasting media, these devices can provide access to over-the-top media services such as streaming television and internet radio, along with home networking access.

Phone hacking is the practice of exploring a mobile device often using computer exploits to analyze everything from the lowest memory and central processing unit levels up to the highest file system and process levels. Modern open source tooling has become fairly sophisticated as to be able to "hook" into individual functions within any running App on an unlocked device and allow deep inspection and modification of their functions.

The transition from Windows 7 to Windows 8 introduced a number of new features across various aspects of the operating system. These include a greater focus on optimizing the operating system for touchscreen-based devices and cloud computing.

<span class="mw-page-title-main">Smudge attack</span> Discerning a password via screen smudges

A smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a cell phone or tablet computer from fingerprint smudges. A team of researchers at the University of Pennsylvania were the first to investigate this type of attack in 2010. An attack occurs when an unauthorized user is in possession or is nearby the device of interest. The attacker relies on detecting the oily smudges produced and left behind by the user's fingers to find the pattern or code needed to access the device and its contents. Simple cameras, lights, fingerprint powder, and image processing software can be used to capture the fingerprint deposits created when the user unlocks their device. Under proper lighting and camera settings, the finger smudges can be easily detected, and the heaviest smudges can be used to infer the most frequent input swipes or taps from the user.

<span class="mw-page-title-main">Notes (Apple)</span> Combination of two software applications developed by Apple Inc

Notes is a notetaking app developed by Apple Inc. It is provided on their iOS, iPadOS and macOS operating systems, the latter starting with OS X Mountain Lion. It functions as a service for making short text notes, which can be synchronized between devices using Apple's iCloud service. The application uses a similar interface on iOS and macOS, with a non-textured paper background for notes and light yellow icons, suggesting pencil or crayon. Until 2013, both applications used a strongly skeuomorphic interface, with a lined, textured paper design; the Mountain Lion version placed this inside a leather folder. This design was replaced in OS X Mavericks and iOS 7.

A lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring the user to perform a certain action in order to receive access, such as entering a password, using a certain button combination, or performing a certain gesture using a device's touchscreen. There are various authentication methods to get past the lock screen, with the most popular and common ones being personal identification numbers (PINs), the Android pattern lock, and biometrics.

<span class="mw-page-title-main">Smart lock</span> Electromechanical lock

A smart lock is an electromechanical lock that is designed to perform locking and unlocking operations on a door when it receives a prompt via an electronic keypad, biometric sensor, access card, Bluetooth, or Wi-FI from a registered mobile device. These locks are called smart locks because they use advanced technology and Internet communication to enable easier access for users and enhanced security from intruders. The main components of the smart lock include the physical lock, the key, a secure Bluetooth or Wi-Fi connection, and a management mobile app. Smart locks may also monitor access and send alerts in response to the different events it monitors as well as other critical events related to the status of the device. Smart locks can be considered part of a smart home.

<span class="mw-page-title-main">HomeKit</span> Software framework by Apple for home automation

HomeKit, also known as Apple Home, is a software framework and communication protocol developed by Apple Inc. that lets users configure, communicate with and control smart-home appliances using Apple devices. It provides users with a way to automatically discover such devices and configure them. By designing rooms, items and actions in HomeKit, users can enable automations in the home through a voice command to Siri or through the Home app. With HomeKit, developers are able to create complex applications in order to manage accessories at a high level.

Amazon Alexa, also known simply as Alexa, is a virtual assistant technology largely based on a Polish speech synthesizer named Ivona, bought by Amazon in 2013. It was first used in the Amazon Echo smart speaker and the Echo Dot, Echo Studio and Amazon Tap speakers developed by Amazon Lab126. It is capable of many NLP tasks such as voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, sports, and other real-time information, such as news. Alexa can also control several smart devices using itself as a home automation system. Users are able to extend the Alexa capabilities by installing "skills" such as weather programs and audio features. It performs these tasks using automatic speech recognition, natural language processing, and other forms of weak AI.

A smart speaker is a type of loudspeaker and voice command device with an integrated virtual assistant that offers interactive actions and hands-free activation with the help of one "hot word". Some smart speakers can also act as a smart device that utilizes Wi-Fi, Bluetooth, and other protocol standards to extend usage beyond audio playback, such as to control home automation devices. This can include, but is not limited to, features such as compatibility across a number of services and platforms, peer-to-peer connection through mesh networking, virtual assistants, and others. Each can have its own designated interface and features in-house, usually launched or controlled via application or home automation software. Some smart speakers also include a screen to show the user a visual response.

<span class="mw-page-title-main">Google Pay (payment method)</span> Mobile payments platform developed by Google

Google Pay is a mobile payment service developed by Google to power in-app, online, and in-person contactless purchases on mobile devices, enabling users to make payments with Android phones, tablets, or watches. Users can authenticate via a PIN, passcode, or biometrics such as 3D face scanning or fingerprint recognition.

<span class="mw-page-title-main">Home Assistant</span> Home automation software

Home Assistant is free and open-source software for home automation designed to be a central control system for smart home devices with a focus on local control and privacy. It can be accessed through a web-based user interface by using companion apps for Android and iOS, or by voice commands via a supported virtual assistant such as Google Assistant or Amazon Alexa.

<span class="mw-page-title-main">Pre-installed iOS apps</span> Apps pre-installed on the Apple iOS operating system

Pre-installed iOS apps, referred to in the App Store as 'Built-In Apps', are a suite of mobile applications developed by Apple Inc. which are bundled with iOS and installed by default or through a system update. Many of the default apps found on iOS have counterparts on Apple's other operating systems macOS, iPadOS, watchOS, and tvOS, which are often modified versions of or similar to the iOS application. As each app is integrated into the operating system itself, they often feature greater support for system features than third-party alternatives and are quick to adapt new features of iOS.

iOS 15 2021 mobile operating system

iOS 15 is the fifteenth major release of the iOS mobile operating system developed by Apple for its iPhone and iPod Touch lines of products. It was announced at the company's Worldwide Developers Conference on June 7, 2021, as the successor to iOS 14, and released to the public on September 20, 2021.

Smart-ID is an electronic authentication tool developed by SK ID Solutions, an Estonian company. Users can log in to various electronic services and sign documents with an electronic signature.

The version history of the HarmonyOS distributed operating system began with the public release of the HarmonyOS 1.0 for Honor Vision smart TVs on August 9, 2019. The first commercial version of the IoT based operating system, HarmonyOS 2.0, was released on June 2, 2021 for phones, tablets, smartwatches, smart speakers, routers, and internet of things. Beforehand, DevEco Studio, the HarmonyOS app development IDE, hat been released in September 2020 together with the HarmonyOS 2.0 Beta. HarmonyOS is developed by Huawei. New major releases are announced at the Huawei Developer Conference|Huawei Developers Conference (HDC) in the fourth quarter of each year together with the first public beta version of the operating system's next major version. The next major stable version is then released in the third quarter of the following year.

References

  1. Vincent, James (2020-10-06). "Internet-enabled male chastity cage can be remotely locked by hackers". The Verge. Retrieved 2020-10-13.
  2. "Smart male chastity lock cock-up". www.pentestpartners.com. Pen Test Partners. Retrieved 2020-10-13.
  3. "Locked In An Insecure Cage". The Internet Of Dongs Project. 2020-10-06. Retrieved 2020-10-13.
  4. "'Smart' male chastity device can be controlled by hackers, users warned". The Guardian. Agence France-Presse. 2020-10-09. ISSN   0261-3077 . Retrieved 2020-10-13.
  5. "Cellmate chastity gadget hack thwarted by screwdriver trick". BBC News. 2020-10-08. Retrieved 2020-10-13.