Feeds

'Toothed' condom hits rapists where it hurts

South African assault victims bite back

Secure remote control for conventional and virtual desktops

NSFW A South African doctor unveiled an anti-rape device designed to hit assailants where it hurts - the Rape-aXe biting condom.

Dr Sonnet Ehlers and the Rape-aXe condomAs a 20-year-old medical researcher, Dr Sonnet Ehlers (pictured with the Rape-aXe) met a rape victim who told her: "If only I had teeth down down there." Ehlers explained to CNN: "I promised her I'd do something to help people like her one day."

The result is "a device which latches itself to the skin of the attacker, causing immense discomfort, allowing the victim to escape".

The Rape-aXe blurb continues: "The attacker is 'branded' a rapist! Since the attacker will need medical assistance, there is no escaping arrest since medical staff will alert the authorities."

Ehlers elaborated: "It hurts, he cannot pee and walk when it's on. If he tries to remove it, it will clasp even tighter... however, it doesn't break the skin, and there's no danger of fluid exposure."

Thirty thousand Rape-aXe condoms are been handed out free in South African cities hosting World Cup matches, and once the trial period ends, they'll be available for $1.50 each.

Ehlers said: "The ideal situation would be for a woman to wear this when she's going out on some kind of blind date ... or to an area she's not comfortable with."

However, the Rape-aXe has attracted some criticism, the Daily Mail notes. Victoria Kajja, of Uganda's Centers for Disease Control and Prevention, insisted: "The fears surrounding the victim, the act of wearing the condom in anticipation of being assaulted all represent enslavement that no woman should be subjected to."

Ehlers, though, is determined that the condom will help tackle South Africa's serious rape problem. A 2009 report by the country's Medical Research Council found "that 28 per cent of men surveyed had raped a woman or girl, with one in 20 saying they had raped in the past year".

Ehlers said that some women "take drastic measures to prevent rape", including "inserting razor blades in their private parts".

She concluded: "I believe something's got to be done ... and this will make some men rethink before they assault a woman." ®

Intelligent flash storage arrays

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.