Feeds

US condom rules 'will cause nasty RED RINGS on porn stars' todgers'

'Typical' smut stud too well equipped to wear FDA rubbers

Beginner's guide to SSL certificates

City of Angels porn actors will in future be required to sport condoms for their performances after Los Angeles County voters gave the thumbs up to the "Safer Sex in the Adult Film Industry Act", aka "Measure B".

The act was proposed to prevent "thousands of performers contracting preventable sexually transmitted infections, including gonorrhea, chlamydia, syphilis, herpes, hepatitis, and HIV", as a result of not slipping on a rubber.

That's all well and good, but according to UK "Condom Revolutionary" Joe Nelson, of custom johnny purveyor TheyFit.com, Measure B simply doesn't measure up in the trouser department.

He notes that the US Food and Drug Administration (FDA) requires condoms to be at least 170mm (6.6in) in length, with a nominal width of 47-57mm - that's the width at the opening when laid flat, not to be confused with the diameter of the French letter when, er, in use.

At the maximum width, the condom will have a circumference of 114mm. Nelson explains: "Now, for a comfortable fit you want a maximum latex stretch of 25 per cent - anything more and you start to get a nasty red ring in the flesh as the latex 'cuts in'."

Since 114mm x 1.25 = 142.5mm, if you're packing a todger girth of more than 142.5mm, it's "game over for comfort and pleasure".

Nelson claims the "typical" porn star swells to 180mm of girth - requiring a nominal width of 64-69mm - so you can see the FDA-approved dimensions are seriously going to cramp the smut hunk's style.

A quick shufti online reveals that stateside grumble-flick artists can buy products such as the Durex XXL, which boasts a truly equine 228.6mm length, but a width of just 54mm. Alternatively, there's the Trojan Supra, 200mm in length, and which appears to be non-FDA compliant with a width of 58mm.

British studs, on the other hand, can readily obtain protection suitably sized for their impressive engorgements, but it's illegal to import these into the US.

Evidently, Los Angeles County voters were unaware of just how genuinely restricting Measure B's restrictions will prove. It remains to be seen just how much of a squeeze the law will put on LA's porn industry. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.