Feeds

A decade of techno-sex: Look how far we've come

Ten years of turn-ons - is society tuned in?

Secure remote control for conventional and virtual desktops

What's next, and whether or not it should be stopped

Is that a bad thing? The argument here is very circular. If you see a particular activity as inherently wrong, harmful or immoral, then the effect of the internet does appear in part to be the normalisation of that activity – and therefore the role of the internet is by definition negative. If, however, you have few problems with the activity itself, then any boost it may receive through the internet is going to be a good thing.

As we look ahead into the next decade, we are left to predict two further developments, and one related issue.

Let’s start with the issue. Over the last decade, the internet has spawned a series of MMORPGs – multi-player role playing games – of which virtual worlds such as Second Life are a leading example. These have quickly been taken on by those who wish to recreate their favourite fantasies online, adopting new shapes and bodies, and acting out fantasies with other (presumably) adult players.

A major issue has been the way that they enable individuals to act out wholly non-consensual and illegal fantasies, including scenes with children or animals. On the one hand, defendants of these games point out that "they are only games" and there is a world of difference between role-playing a scene and doing it in real life.

On the other, critics have worried that acting out a fantasy is just one step away from committing it – and therefore individuals should be prevented from doing so and, in some cases, punished if they try to. This debate – the boundary between real and fantasy – is likely to continue and if anything to be exacerbated by two further technological developments.

The first is that of teledildonics: the ability to use telecomms technology to spur remote – usually vibratory devices – into action. It has been possible for a few years now to set off vibrators remotely via mobile telephone technology. The last year or so has seen similar developments arising through the internet – particularly through MMORPG’s – that ensure that when an individual "feels" something in game, they will also get to feel it wherever they are sat.

It is at this point that we move from the known and familiar to the sci-fi and faintly scary. As the tele- part of teledildonics becomes firmly established, so the range of what may be controlled remotely via the net becomes ever greater. Nerve implants, body suits, and systems that mimic far more subtle interaction and contact are now emerging from the labs, bringing the prospect of genuine "cyber sex" ever closer.

It may be that we are now at a turning point: if the past decade has been about technology more closely mimicking what people want to feel, and the internet facilitating real world communication, the next may see at least a partial reversal of that. In future, you will be able to have the sex you want with whoever you want without ever stirring from your keyboard.

Bad news, perhaps, for those celebrating St Valentine’s day – but possibly not such bad news for the more techie-minded. ®

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.