Feeds

Dick Smith pr0n mobe heads for eBay

Complete with preloaded smut

Gartner critical capabilities for enterprise endpoint backup

The mobile phone at the centre of the Dick Smith Electronics preloaded porn scandal will on Monday hit eBay complete with the snaps that reduced a sickened Cairns woman to a state of shock.

One of the Dick Smith mobile phone snapsFor those of you not up to speed on the whole sorry affair, the university student was sold a display phone because it was the last one in stock, and later discovered store staff had been making good use of the device to capture images of "a woman naked from the waist down lying on a bed performing a sex act, a man holding his penis and consecutive shots of the woman in her bra and pulling her pants down".

Cue outrage, internal investigations, demands for compensation, and so forth.

Well, it appears Dick Smith has not yet whipped out his bulging wallet, because the shaken customer has now told the Cairns Post she'll flog the smutmobe on the world's fave tat bazaar under the listing "The original Dick Smith scandal mobile phone".

She said: “We don’t want it, and apparently Dick Smith doesn’t want it, so we’re open to all offers and it will be on eBay from Monday. Reserve will be set at $200, which is what we paid for this second-hand phone that we thought was new. It’ll come in its original box with charger, dishonoured contract and 49 dodgy photos including those of the Dick Smith staff member, which some people might find entertaining.”

Dick Smith Electronics spokesman Benedict Brook said the sale would "hinder the company’s ability to investigate the matter", while his employer insisted it had "interviewed all its staff at the store involved as it tries to hunt down the culprit that has caused it national embarrassment".

The student remains unimpressed by the company's handling of the matter. She grumped: “We haven’t heard a single thing from anyone at Dick Smith, not so much as an apology or offer of a refund or even where they’re at in the investigation. We’re deeply disappointed in the way the thing has been handled and all we can do is to advise people to think twice about where they buy their mobile phones.” ®

Boost IT visibility and business value

More from The Register

next story
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
Things are looking up in Flappy Bird sequel
'Swing Copters' offers the same gameplay but in a different direction
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.