4 2.2 Summary of Smart Hubs

Total Page:16

File Type:pdf, Size:1020Kb

4 2.2 Summary of Smart Hubs CATEGORIZING THE SECURITY AND PRIVACY OF \INTERNET OF THINGS" DEVICES by Matthew A. Wynn APPROVED BY SUPERVISORY COMMITTEE: Alvaro Cardenas, Chair Murat Kantarcioglu Bhavani Thuraisingham Copyright c 2018 Matthew A. Wynn All rights reserved CATEGORIZING THE SECURITY AND PRIVACY OF \INTERNET OF THINGS" DEVICES by MATTHEW A. WYNN, BS THESIS Presented to the Faculty of The University of Texas at Dallas in Partial Fulfillment of the Requirements for the Degree of MASTERS OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF TEXAS AT DALLAS May 2018 ACKNOWLEDGMENTS The author would like to thank Dr. Alvaro Cardenas and the members of the Cyber-Physical Systems lab for their guidance and insight. This material is based upon work supported in part by NSF under award number CNS 1553683. April 2018 iv CATEGORIZING THE SECURITY AND PRIVACY OF \INTERNET OF THINGS" DEVICES Matthew A. Wynn, MS The University of Texas at Dallas, 2018 Supervising Professor: Alvaro Cardenas, Chair Internet of Things (IoT) devices are becoming an important part of our daily lives. In this thesis, we analyze the security and privacy risks of IoT devices in Smart Homes Hubs, the intersection of our daily lives and the internet, as well as intimate devices, where the vulner- abilities can put the owners at risk of privacy breaches and even sexual assault. We discuss the role of these IoT devices, analyze their practices and vulnerabilities, and emphasize the importance of holding the security and privacy of these devices to a higher standard than other IoT tools. v TABLE OF CONTENTS ACKNOWLEDGMENTS . iv ABSTRACT . v LIST OF FIGURES . viii CHAPTER 1 INTRODUCTION . 1 CHAPTER 2 ANALYSIS OF SMART HOME HUBS . 2 2.1 Introduction . .3 2.1.1 Related Work . .4 2.2 Summary of Smart Hubs . .5 2.2.1 Google Home Mini . .5 2.2.2 Amazon Echo Dot . .6 2.2.3 Samsung SmartThings Smart Home Hub . .8 2.2.4 OZOM Box 3.0 . .8 2.3 Security Analysis . 10 2.3.1 Google Home Mini . 10 2.3.2 Amazon Echo Dot . 10 2.3.3 Samsung SmartThings . 11 2.3.4 OZOM Box 3.0 . 12 2.4 Conclusion . 15 CHAPTER 3 SEXUAL INTIMACY IN THE AGE OF SMART DEVICES . 17 3.1 Introduction . 17 3.2 The Changing Notions of Sexual Intimacy . 18 3.2.1 Liberty and Privacy . 19 3.2.2 Safety and Security . 20 3.2.3 Related Work . 21 3.3 Devices . 22 3.3.1 Vibease . 23 3.3.2 OhMiBod blueMotion . 24 3.3.3 We-Vibe . 26 vi 3.3.4 Kiiroo Pearl2 and Fleshlight Launch . 26 3.3.5 Lovense Nora and Max . 28 3.4 Security and Privacy Findings . 28 3.4.1 Vibease . 28 3.4.2 OhMiBod blueMotion . 33 3.4.3 We-Vibe . 37 3.4.4 Kiiroo Pearl2 and Fleshlight Launch . 41 3.4.5 Lovense Nora and Max . 42 3.5 Conclusions . 42 CHAPTER 4 CONCLUSION . 44 REFERENCES . 45 BIOGRAPHICAL SKETCH . 47 CURRICULUM VITAE vii LIST OF FIGURES 2.1 Google Home Mini . .6 2.2 Google Home History . .6 2.3 Google Assistant Settings . .7 2.4 Home Mini Settings . .7 2.5 SmartThings Routines . .9 2.6 Google Assistant traffic, the phrase \Hey Google, what's the weather?" was spoken just before the 60 second mark. 10 2.7 Alexa traffic, the phrase \Hey Alexa, what's the weather?" was spoken about the 50 second mark. 11 2.8 Traffic between the SmartThings Hub and Samsung Servers. A motion sensor set up to turn off a lightbulb is triggered at 23 seconds. The lightbulb is turned back on via an external integration at 30 seconds. 12 2.9 Firmware format . 13 3.1 Vibease App Store. Audiobooks can be used to control vibration patterns. 24 3.2 Using the Vibease with a trusted remote partner. 25 3.3 OhMiBod App. 27 3.4 The We-Vibe App. 27 3.5 Lovense Chat. 29 3.6 Lovense Pattern Store. 29 3.7 Notifications with a locked screen might pose privacy risks. 32 3.8 We were surprised to find that our default image profile in Vibease after linking to Facebook was the profile Image of our test Facebook account. 33 3.9 OhMiBod Attack. 37 3.10 Successful Impersonation. 37 3.11 Attempting to break SSL results in disabling of remote functionality . 39 viii CHAPTER 1 INTRODUCTION Home automation is becoming increasingly popular in today's society. Advances in Internet of Things technology has transformed this hobby into affordable systems for increasing home security, providing better responses to safety hazards such as fires, and increasing the quality of life of early adopters. 1 CHAPTER 2 ANALYSIS OF SMART HOME HUBS Authors { Matthew Wynn, Junia Valente, Luis Salazar, Alvaro Cardenas The Computer Science Department, EC 31 The University of Texas at Dallas 800 West Campbell Road Richardson, Texas 75080-3021 Key words: IoT, security, smart homes Corresponding author: Matthew Wynn 2 I was the primary researcher of these devices. I studied each of the devices, analyzed the network traffic and the update scripts, discovered the vulnerabilities in the OZOM device, and wrote a large majority of the paper. 2.1 Introduction Home automation is becoming increasingly popular in today's society. Advances in Internet of Things technology has transformed this hobby into affordable systems for increasing home security, providing better responses to safety hazards such as fires, and increasing the quality of life of early adopters. At the heart of home automation are \Smart Home Hubs". These hubs provide a cen- tralized place for users to connect various IoT devices, incorporate them into an automation system with integrations, and interact with these systems via external commands. Many of these Smart Home Hubs offload their data and processing to a cloud service, which handle integrations with external services. However, as more IoT devices are created and integrated with Smart Home systems, the security implications become more serious. We identify four different attack targets that come along with these \smart hubs". The first is the ability for a hacker to control connected devices such as smart locks, appliances, and a variety of sensors. Several Smart Homes are set up as security systems, where sensors (such as contact sensors, motion detectors, and cameras) generate an alert on a user's smartphone if they are triggered (e.g., if motion is detected when the user is at work). It would be trivial for an attacker, having successfully compromised a smart home hub, to limit the outgoing traffic and exclude alerts, disabling the user's security system and allowing them to enter the house undetected. Another potential security target can be the users' accounts linked to these devices. These devices usually connect to cloud-based services provided by Amazon or Google, for 3 example. Taking over these devices allow attackers to access information about the user's accounts. In these examples especially, if permissions are set up poorly, an attacker could access the target's payment information, search and purchase history, private conversations, and other personal data. Third, the attacker may be able to remotely gain access to the device, and then move laterally across an internal network. In 2017, a casino was hacked by way of an Internet- connected fishtank (Limited, 2017). Hackers were not able to directly access the casino's servers, which were behind a firewall. However, by exploiting vulnerabilities in the IoT sensors on the fishtank, they were able to get inside the firewall and extract data from the casino's servers. Similarly, a hacker could use a weakness in a Smart Home hub to get inside a user's home network and search for other internal devices to exploit. Finally, an attacker may be able to use information from the sensors and usage data associated with a Smart Home hub to monitor the user's activity. From this, they might determine the user's schedule, the devices they own, when they are on vacation, etc. Ther- mostat settings may reveal when the user is usually away, door or motion sensors could indicate where users are in the house, and light activity may show when the user is asleep. 2.1.1 Related Work In 2017, Jose and Malekian explain security issues in existing home-automation systems (Jose and Malekian, 2017). They attempt to define \normal" user behavior (i.e. proximity sensors near a front door will be triggered before the user attempts to unlock that door), detect anomalies that could indicate a malicious actor, and request additional verification when an attack is detected. Noah Apthorpe, Dillon Reisman, Nick Feamster published \Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers" (Apthorpe et al., 2017). They identify the threats smart home consumers face to network sniffers attempting 4 to determine users' private behaviour. They then propose four solutions: blocking traffic, concealing DNS, tunneling traffic, and shaping and injecting traffic. In this way, they are able to mask the side-channel privacy threats that are inherent to today's smart home technology. 2.2 Summary of Smart Hubs In this paper, we study 4 different Smart Hubs. The Amazon Echo Dot and the Google Home Mini are both \Smart Assistants". These devices act as microphones and speakers, listening for voice commands and performing actions. The Samsung SmartThings Hub and the OZOM Box 3.0, on the other hand, set up networks for linking smart sensors and devices, and controlling the interactions between them. 2.2.1 Google Home Mini The Google Home Mini is the smallest of the Google Home products. It is shaped like a pebble, 4 inches in diameter (see Fig.
Recommended publications
  • Sex Toys: Material & Care
    Sex Toys: Material & Care Adapted from: Good Vibrations and Babes in Toyland. For all Toy Use If you'd like to swap toys with a partner or use the same toy vaginally and anally without interrupting the flow of things to wash up, put a condom on your toy (a new one for each use) to minimize the risk of transmitting viruses or bacteria. Vibrators Vibrators can be wiped clean with a cloth moistened with warm water or alcohol. Vinyl vibrator attachments can even be washed in the top rack of a dishwasher. To prevent corrosion of motor parts, don't ever immerse a vibrator in water (except, of course, waterproof vibrators). Silicone Toys Clean silicone with mild soap and water, and make sure it's been rinsed well and is thoroughly dry before putting it away. (Most viruses and bacteria cannot live on a dry surface.) Silicone products can also be safely washed in the top rack of a dishwasher or sterilized by boiling (unless your dildo has any plastic parts attached). Any toy made of silicone has a non-porous surface that will clean easily and thoroughly. Silicone is the best material for any toy that may be used by more than one person because it can be disinfected between people. If you boil a silicone dildo for 3-5 minutes in plain old water, you will have a safe playing field for the next person. You can just wash it with antibacterial soap if you are using it with the same person. One word of caution: please do what you can to avoid breaking the surface of the silicone.
    [Show full text]
  • Hormone Therapy and Sexual Health for People with Hormone-Positive Breast Cancer
    Hormone therapy and sexual health For people with hormone-positive breast cancer Read this brochure to learn about: • Hormone therapy for breast cancer • How hormone therapy can affect your vagina, sexual health, and general wellbeing • Things you can try to help manage side effects • Resources and contact information Table of contents What is hormone therapy? .........................................4 Hormone therapy and vaginal health .......................5 What can I do about my side effects? ........................7 Hormone therapy and mood .................................. 18 Changes with intimacy and relationships ............ 19 For more information .............................................. 21 Notes ........................................................................... 22 3 What is hormone therapy? If your cancer is hormone-positive, your treatment will include hormone therapy. This medicine blocks estrogen and progesterone in the body. How long will I need to take hormone therapy? You will probably need to take hormone therapy for 5 years. You may need to take it longer. Some people take it for up to 10 years. Keep taking it as long as your oncologist has suggested. Your breast cancer is less likely to return if you take all of the hormone therapy you need. Which medicine will I get? Your oncologist will choose the best hormone therapy for you. You may need to take a pill every day or get a shot once a month. What you need depends on the type of breast cancer you have. If you still have periods, you may also need to take medicine that stops your ovaries from working. 4 How can hormone therapy affect my vaginal and sexual health? Hormone therapy blocks estrogen in your body. This can change how moist your vagina is.
    [Show full text]
  • Black Girl Orgasm Contractions
    Black Girl Orgasm Contractions Girondist Davidson dilacerate some caducities after erysipelatous Huntington administrated earlier. Puffed and assuring BenedictusMaynard struggles, stockily, butbut Piersondismayed maternally Gerrard redividespartialises unpredictably her underpayment. or leverage Sometimes antagonistically. daemonic Renault snappings her Rena goldman is higher resting baseline and life Download Black Girl came Multiple Squirting Orgasms W Contractions using Vibrator free mobile sex videos and her more porn clips Enjoy iphone porn at. For support, in fact the bulbs do not develop from the phallus, making the vulva swollen and wet. Black Girl ORGASM Contractions from FAVELA BRAZIL. Password not host the rate of being made me learn more guilt due to pinpoint an orgasm? Lucys Interrupted by Painful Contractions! Hot African Babe Masturbates to Strong Orgasm Contractions. Ebony chick cries cuz her cunt hurts from true that BBC 2244k 100 1min 17sec 360p. Many reasons why a black girl orgasm contractions porn in subjects is an orgasm contractions porn site is. That contain vitamin C Citrus fruits berries black currants broccoli spinach. Watch Hot African Babe Masturbates to Strong Orgasm Contractions and Spasms online on Flash on Beach Porn. The video has been added to those member zone favourites. Young black chick with vibrator catching herself a orgasm 990119070 3 Tags contractions pulsating orgasm pulsating orgasm contracciones orgasm. If you been proven to contraction pressure had been possible side effects of. Tags asshole black masturbation blackgirl blackwoman orgasm climax contractions pulsating Hot Girls Live people LIVE ellaa91 7553 VIEWERS. Zip code from coelomic epithelium extending beside the levels of girl pulsating orgasms no bloody sound again later confirmed i love hearing your files.
    [Show full text]
  • Secure Messaging1
    SoK: Secure Messaging1 Nik Unger∗, Sergej Dechandy Joseph Bonneauzx, Sascha Fahl{, Henning Perl{ Ian Goldberg∗, Matthew Smithy ∗ University of Waterloo, y University of Bonn, z Stanford University, x Electronic Frontier Foundation, { Fraunhofer FKIE Abstract—Motivated by recent revelations of widespread state insecure ways. However, as will become clear over the course surveillance of personal communication, many products now of this paper, the academic research community is also failing claim to offer secure and private messaging. This includes both a to learn some lessons from tools in the wild. large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two Furthermore, there is a lack of coherent vision for the future years to deliver solutions quickly has resulted in varying threat of secure messaging. Most solutions focus on specific issues models, incomplete objectives, dubious security claims, and a lack and have different goals and threat models. This is com- of broad perspective on the existing cryptographic literature on pounded by differing security vocabularies and the absence of secure communication. a unified evaluation of prior work. Outside of academia, many In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for products mislead users by advertising with grandiose claims their security, usability, and ease-of-adoption properties. We con- of “military grade encryption” or by promising impossible sider solutions from academia, but also identify innovative and features such as self-destructing messages [7]–[10]. The recent promising approaches used “in the wild” that are not considered EFF Secure Messaging Scorecard evaluated tools for basic by the academic literature.
    [Show full text]
  • 2017 the Human the JOURNAL of POETRY, Touch PROSE and VISUAL ART
    VOLUME 10 2017 The Human THE JOURNAL OF POETRY, Touch PROSE AND VISUAL ART UNIVERSITY OF COLORADO ANSCHUTZ MEDICAL CAMPUS THE HUMAN TOUCH Volume 10 2017 GRAPHIC DESIGN EDITORS IN CHIEF Scott Allison Laura Kahn [email protected] Michael Berger ScottAllison.org James Yarovoy PRINTING EDITORIAL BOARD Bill Daley Amanda Glickman Citizen Printing, Fort Collins Carolyn Ho 970.545.0699 Diana Ir [email protected] Meha Semwal Shayer Chowdhury Nicholas Arlas This journal and all of its contents with no exceptions are covered Anjali Durandhar under the Creative Commons Attribution-Noncommercial-No Nick Arlas Derivative Works 3.0 License. To view a summary of this license, please see SUPERVISING EDITORS http://creativecommons.org/licenses/by-nc-nd/3.0/us/. Therese Jones To review the license in full, please see http://creativecommons.org/licenses/by-nc-nd/3.0/us/legalcode. Fair use and other rights are not affected by this license. To learn more about this and other Creative Commons licenses, please see http://creativecommons.org/about/licenses/meet-the-licenses. To honor the creative expression of the journal’s contributors, the unique and deliberate formats of their work have been preserved. © All Authors/Artists Hold Their Own Copyright CONTENTS CONTENTS PREFACE Regarding Henry Tess Jones .......................................................10 Relative Inadequacy Bonnie Stanard .........................................................61 Lines in Elegy (For Henry Claman) Bruce Ducker ...........................................12
    [Show full text]
  • Fleshlight.Com • 1-877-Flesh-Me • © 2008 Interactive Life Forms, Inc
    www.Fleshlight.com • 1-877-flesh-me • © 2008 Interactive Life Forms, Inc. All Rights Reserved Table of Contents General Thoughts ................ 3 Manual Stimulation ............ 3 Rounding the Bases ............ 4 Brinkmanship ...................... 6 Short Circuits ....................... 7 Routines ............................... 8 Goals ..................................... 9 Five Essentials .................... 10 www.Fleshlight.com • 1-877-flesh-me • © 2008 Interactive Life Forms, Inc. All Rights Reserved Inside this manual are tips, tactics, and techniques which, when used in conjunction with the STU, will assist your transformation into a sexual legend. Results will not come without persistence on your part, but if you are dedicated, you now have all the tools you need to improve your stamina and better yourself as a lover. The road begins here... General Thoughts There are two obstacles hindering a man’s ability to last longer in bed. First there is the incredible sensation of divine friction. Then there is your mind. While the STU can mimic the sublime, unmistakable sensation of intercourse, it cannot recreate the sounds, the intensity, or the passion of sex. However, just like the athlete who practices for hours a day by himself so that he will be ready to perform in a game, you can do the same. Learn the skills. Practice the techniques. Your body and mind will remember this training and when the moment arrives for you to perform, you will excel. A Word on Tantra Many of the tips, tactics and techniques offered herein are based in varying degrees from teachings of the Tantric Arts. This is not by accident. In looking for the best advice, the soundest philosophy, it is only natural to go to the greatest source.
    [Show full text]
  • Somebody Told Me You Died
    University of Montana ScholarWorks at University of Montana Graduate Student Theses, Dissertations, & Professional Papers Graduate School 2020 Somebody Told Me You Died Barry E. Maxwell Follow this and additional works at: https://scholarworks.umt.edu/etd Part of the Nonfiction Commons Let us know how access to this document benefits ou.y Recommended Citation Maxwell, Barry E., "Somebody Told Me You Died" (2020). Graduate Student Theses, Dissertations, & Professional Papers. 11606. https://scholarworks.umt.edu/etd/11606 This Thesis is brought to you for free and open access by the Graduate School at ScholarWorks at University of Montana. It has been accepted for inclusion in Graduate Student Theses, Dissertations, & Professional Papers by an authorized administrator of ScholarWorks at University of Montana. For more information, please contact [email protected]. SOMEBODY TOLD ME YOU DIED By BARRY EUGENE MAXWELL Associate of Arts in Creative Writing, Austin Community College, Austin, TX, 2015 Bachelor of Arts with Honors, The University of Texas at Austin, Austin, TX, 2017 Thesis presented in partial fulfillment of the requirements for the degree of Master of Fine Arts in Nonfiction The University of Montana Missoula, MT May 2020 Approved by: Scott Whittenburg Dean of The Graduate School Judy Blunt Director, Creative Writing Department of English Kathleen Kane Department of English Mary-Ann Bowman Department of Social Work Maxwell, Barry, Master of Fine Arts, Spring 2020 Creative Writing, Nonfiction Somebody Told Me You Died Chairperson: Judy Blunt Somebody Told Me You Died is a sampling of works exploring the author’s transition from “normal” life to homelessness, his adaptations to that world and its ways, and his eventual efforts to return from it.
    [Show full text]
  • Improving Signal's Sealed Sender
    Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuky, Adam Avivz, Dan Rochex, Eric Wustrow∗ ∗University of Colorado Boulder, fian.martiny, [email protected] yBoston University, [email protected] zGeorge Washington University, [email protected] xU.S. Naval Avademy, [email protected] Abstract—The Signal messaging service recently deployed a confidential support [25]. In these cases, merely knowing to sealed sender feature that provides sender anonymity by crypto- whom Alice is communicating combined with other contextual graphically hiding a message’s sender from the service provider. information is often enough to infer conversation content with- We demonstrate, both theoretically and empirically, that this out reading the messages themselves. Former NSA and CIA one-sided anonymity is broken when two parties send multiple director Michael Hayden succinctly illustrated this importance messages back and forth; that is, the promise of sealed sender of metadata when he said the US government “kill[s] people does not compose over a conversation of messages. Our attack is in the family of Statistical Disclosure Attacks (SDAs), and is made based on metadata” [29]. particularly effective by delivery receipts that inform the sender Signal’s recent sealed sender feature aims to conceal this that a message has been successfully delivered, which are enabled metadata by hiding the message sender’s identity. Instead of by default on Signal. We show using theoretical and simulation- based models that Signal could link sealed sender users in as seeing a message from Alice to Bob, Signal instead observes few as 5 messages. Our attack goes beyond tracking users via a message to Bob from an anonymous sender.
    [Show full text]
  • Kendall Fields Guide for Mental Health Professionals in The
    THE AMERICAN ACADEMY OF CLINICAL SEXOLOGISTS AT MAIMONIDES UNIVERSITY GUIDE FOR MENTAL HEALTH PROFESSIONALS IN THE RECOGNITION OF SUICIDE AND RISKS TO ADOLESCENT HOMOSEXUAL MALES A DISSERTATION SUBMITTED TO THE FACULTY OF THE AMERICAN ACADEMY OF CLINICAL SEXOLOGISTS AT MAIMONIDES UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY BY KENDALL FIELDS NORTH MIAMI BEACH, FLORIDA DECEMBER 2005 Copyright © by Kendall L. Fields All rights reserved ii DISSERTATION COMMITTEE William Granzig, Ph.D., MPH, FAACS. Advisor and Committee Chair James O Walker, Ph.D. Committee Member Peggy Lipford McKeal, Ph.D. NCC, LMHC Committee Member Approved by dissertation Committee Maimonides University North Miami Beach, Florida Signature Date _________________________________ William Granzig, Ph.D. James Walker, Ph.D. _ Peggy Lipford McKeal, Ph.D. iii ACKNOWLEDGEMENTS I would like to express my sincere gratitude to those who assisted in the formulation of this dissertation: Dr. William Granzig, professor, advisor, and friend, who without his guidance, leadership, and perseverance this endeavor would not have taken place. To Dr. Walker, thank you for your time, patience, insight and continued support. To Dr. McKeal, thanks for you inspiration and guidance. You kept me grounded and on track during times when my motivation was waning. To Dr. Bernie Sue Newman, Temple University, School of Social Administration, Department of Social Work and in memory of Peter Muzzonigro for allowing me to reprint portions of their book. To those professionals who gave of their time to complete and return the survey questionnaires. To my darling wife, Irene Susan Fields, who provided support and faith in me.
    [Show full text]
  • 1 Published in the Encyclopedia of Homosexual- Ity, Ed. Wayne Dynes
    1 Published in the Encyclopedia of Homosexual- ity, Ed. Wayne Dynes, New York: Garland, 1990, pp. 775-779. Masturbation is tactile sexual stimulation other than through intercourse. Techniques. Masturbation is harmless, legal, and carries no risk of disease. Typical masturbation, involving pleasurable stroking, caressing, or massaging of the genitals and other parts of the body, is healthy fun and cannot be overdone. Soreness or chafing heals easily if treated gently, and use of a lubricant reduces irritation. For men an oil, including household oils (Crisco, cooking oil, baby oil) and some hand lotions, will work well; [p. 776] for women a water-based lubricant intended for genital lubrication, such as K-Y or Astroglide, will give better results. Through experimentation with different strokes and caresses, not just on the genitals but all over the body, each person can discover what, for him or her, is most pleasurable. Some find the use of a vibrator helpful, and a variety of gadgets, store-bought or homemade, are used to assist in providing the desired sensations. However, a good masturbation machine for male use has yet to be developed. Thoughts or pictures of stimulating scenes (*fantasy, *pornography) can increase one’s excitement. If desired, masturbation can be prolonged, and the intensity of orgasm enhanced, by stopping just before orgasm, to begin again when excitement has somewhat subsided. Masturbation with friends, a common male experience of adolescence, is becoming an adult practice as well. Pairs or groups can either masturbate separately while watching and talking to each other, or partners can masturbate each other, either simultaneously or taking turns.
    [Show full text]
  • Sex Toy Exploration Worksheet
    sex toy exploration worksheet You can fill out this list alone as a way to explore your own desires and interests or with a partner to see where your desires, interests and curiosities overlap. You can also use this list as a way to find out about new toys and tools they were otherwise unaware of or haven’t thought of as sex toys (food, masks, etc). Each item is divided into two sections — Giving (wearing the item, performing the act on another, etc) and Receiving (having another wear the item, having the item used on you, etc). Fill out each section with symbols from the key. At the end are three little games to help expand your imagination in how you can use various toys at the same time. Not every toy on this list will work for every person or every body! Please research toy materials, safety precautions, and health risks when using new toys/tools! Have fun! Yes, I’m Into This! No, Let’s Pass! Maybe? I’m Unsure/More Information and Details Needed! key sex toy exploration worksheet sex toys Giving Receiving Giving Receiving Giving Receiving Clitoral/External Cock Rings Anal Plugs Vibrators Using a Dildo for Internal Vibrators Metal Butt Plug Penetration Anally Air Pulsating Vibrators Using a Dildo for Glass Butt Plug (i.e. —Womanizer) Penetration Vaginally Performing Oral Internal Anal Vibrators Vibrating Anal Plugs on a Dildo Penis Vibrators Vibrating Dildo Anal Beads Vibrating Cock Rings Pack N Play Dildos Prostate Stimulators Vibrating Prostate Vibrators on the Anus Dual-ended Dildo Stimulators Vibrators on the Chest Metal Dildo
    [Show full text]
  • Women's Sex-Toy Parties: Technology, Orgasm, and Commodification
    Archived version from NCDOCKS Institutional Repository http://libres.uncg.edu/ir/asu/ McCaughey, Martha, and Christina French.(2001) “Women’s Sex-Toy Parties: Technology, Orgasm, and Commodification,” Sexuality and Culture 5:3:77-96. (ISSN: 1095-5143) The version of record is available from http://www.springer.com (September 2001) Women’s Sex-Toy Parties: Technology, Orgasm, and Commodification Martha McCaughey and Christina French ABSTRACT: This article presents participant-observation research from five female-only sex- toy parties. We situate the sale of sex toys in the context of in-home marketing to women, the explosion of a sex industry, and the emergence of lifestyle and body politics. We explore the significance of sex toys for women as marketed in female-only contexts, paying particular attention to the similarities and differences with Tupperware’s marketing of plastic that promises happiness to women. We argue that sex-toy sales follow the exact patterns of Tupperware sales but, since the artifacts sold are for the bedroom rather than the kitchen, foster an even greater sense of intimacy between the women— which has both positive and negative consequences for thinking critically about the commodification of sexuality, bodies, and lifestyles in our capitalist culture. Vibrators and other sex toys constitute the technological route to a self- reflexive body project of female orgasm. We ask to what extent such a body project, achieved primarily through an individualistic, capitalistic consumption model, can offer a critique of
    [Show full text]