Please note that this will reach our support staff, and not your individual keyholder. Unless you subscribe to the "Standard with human Chat" plan, there is no way to directly reach your keyholder.
About Us
About ChastityDungeon.com
ChastityDungeon.com started as a Virtual chastity training service, where you can train yourself from being locked for only a couple of hours, all the way to two weeks or more.
Our core is this year-long adventure that focuses on the novice chastity user and slowly pushes their limits to be able to stay locked for up to two weeks and even more.
We quickly realized, though, that most of you need more variety once this year-long adventure is over, or you may already be able to stay locked for an extended period of time. Thus we added Human keyholders who provide that human unpredictability that we secretly all crave.
We have several keyholders, both female and male, so depending on your selected preferences, your keyholder will be the gender of your choice.
We are legally required to disclose that we have used various software to create the keyholder avatars. Some are AI generated by Midjourney. For some avatars, we also use "Picsi.Ai - Powered by InsightFace"
Technological Dominance
The Basics: What Is It?
What is it?
Technological Dominance, also known as Digital Power Exchange, is a modern and broad form of consensual power exchange within BDSM. In this practice, a submissive partner consensually yields a negotiated degree of control over their digital life to a dominant partner or keyholder. This dynamic is not about force but is a highly structured, consensual, and negotiated activity.1
This form of control is enacted through digital tools and software. The intensity can vary widely, ranging from passive monitoring, such as reviewing a submissive's daily browsing history, to active restriction, like remotely blocking specific websites or applications, and can even extend to total control, such as a dominant partner remotely operating the submissive's computer.
This practice is particularly well-suited for long-distance relationships. Technology serves as the bridge across the physical gap, allowing a keyholder to maintain a consistent and tangible presence in the submissive's life. It can transform a dynamic from an occasional interaction into a 24/7 power exchange, where the submissive is constantly aware of the keyholder's authority.3
What other names is this kink known by?
To aid in understanding and further research, this practice is known by several common aliases and related terms:
Digital Power Exchange 4
Tech Dom/sub
Cyber Domination
Remote Control Play
Digital Surrender
Technology-Mediated Kink 6
It is important to note that "Technological Dominance" is primarily a community or slang term. Academic or technical sources will not use this specific phrase but will instead discuss its components, such as "technology-mediated interactions" 6 or the specifics of the software used.
History
This kink is a new and emergent practice. Its history, therefore, is not one of BDSM itself, but rather the history of the mainstream technologies that practitioners have skillfully repurposed for consensual play.
The 1990s - Early 2000s: The Birth of Remote Administration
The origins of this kink lie in corporate and IT administration.7 Microsoft introduced the Remote Desktop Protocol (RDP) as part of Windows NT 4.0 8, and other protocols like Virtual Network Computing (VNC) were developed.9 These tools were complex and designed for professionals to manage servers or troubleshoot computers from a distance. They were not intended for personal use.
The Mid-2000s: Mainstream Adoption
The rapid proliferation of high-speed home internet and the development of cloud-based services made these tools accessible to non-technical users. A key turning point was the launch of software like TeamViewer in 2005.10 This tool was designed to be simple, easy to use, and free for personal, non-commercial use.11 For the first time, anyone could remotely access another computer in minutes, without needing complex network configurations.11
The 2010s: The Monitoring Era
The true explosion of this kink's potential came with the rise of the smartphone. Around 2013, a "fundamental change" in parental concern over digital access occurred.12 This created a multi-billion dollar industry for parental control software.12
This mainstream adoption of monitoring technology is the most direct ancestor to modern technological dominance. A 2016 study by the Pew Research Center found that 61% of parents of 13- to 17-year-olds had checked which websites their teen visited, and 48% had looked through their teen's phone call records or text messages.15 These mainstream tools provided the exact mechanics—activity logging, website filtering, and app blocking—that the kink community would later adopt for consensual power exchange.
Present
Today, technological dominance is a common practice, especially in remote relationships where nearly every aspect of life is mediated by a screen.16 Its popularity is supported by a well-understood psychological concept known as the "online disinhibition effect".6 This theory suggests that the anonymity and perceived distance of technology-mediated sexual interactions (TMSI) can reduce inhibitions. This provides a space where individuals may feel safer and more comfortable exploring BDSM interests than they would in person.6
The practice is rooted more in psychology than in technology. The power exchange is defined by a "digital contract" 17, a clearly negotiated set of rules. The technology is simply the tool used to enforce this consensual agreement. The psychological weight of knowing one is being monitored is often more potent than the monitoring itself.
Statistics
Direct statistics on this specific kink are not available from reputable academic sources. However, proxy data illustrates the prevalence of its tools and the mindset of its practitioners.
Prevalence of Monitoring: Monitoring technology is a common part of modern life. As of 2016, 61% of parents had checked their teen's website history, 60% had checked their social media profiles, and 48% had reviewed their phone records.15 This demonstrates that the tools and concepts of digital monitoring are widespread and socially understood.
Psychology of Practitioners: Contrary to common misconceptions, studies consistently show BDSM practitioners to have favorable psychological profiles. A significant 2013 study of 902 BDSM practitioners found that, compared to a control group, they were less neurotic, more extraverted, more open to new experiences, more conscientious, and reported higher subjective well-being.19 This reframes the desire for such control not as a pathology, but as a form of "recreational leisure" among consenting adults.19
Technology in BDSM Relationships: Research has highlighted that technology-mediated interactions are "pivotal" for maintaining long-distance BDSM relationships and 24/7 hierarchical dynamics.3
Top 10 Interesting Facts
This kink primarily uses "repurposed" technology, adapting mainstream IT administration 9 and parental control 14 software for consensual play.
The practice exists on a "Spectrum of Control," from passive monitoring of reports to active restriction and even total remote takeover of a device.
The "online disinhibition effect" suggests that many people feel more comfortable exploring these dynamics online before (or instead of) trying them in person.6
The psychological aspect—knowing you could be watched at any time—is often a more powerful component of the kink than the actual monitoring.
This dynamic is not limited to computers and phones. "Smart home" devices like smart plugs, lights, locks, and thermostats can also be consensually controlled by a keyholder.21
Psychological studies on BDSM practitioners suggest they are often less neurotic and more conscientious than non-practitioners.19
The history of this kink is effectively the history of remote access software, which began in the 1990s for corporate IT departments.7
Digital consent is far more complex than in-person consent due to the permanence of data 18 and the high risk of non-consensual sharing.22
This practice allows a dominant to enforce a "digital detox" 23, turning a mainstream wellness trend into a structured and profound act of submission.
The AI keyholders on ChastityDungeon.com facilitate this kink psychologically by issuing chat-based tasks that the user self-implements, respecting the AI's technical limitations.
The How-To: Practical Application
How does it work? The Mechanics of Control
This practice is best understood as a "Spectrum of Control," with different types of software enabling different levels of power exchange.
Type 1: Passive Monitoring (Accountability Software)
This is the most common and lowest-risk form of technological dominance. The submissive installs "accountability software" on their device.24 This software silently logs their activity—such as websites visited, search terms used, and apps opened—and compiles it into a report. This report is then automatically sent to the dominant, who acts as the "accountability partner".24
In this model, the dominant does not have active control. They cannot block websites or take over the device.24 Their power is purely psychological: the power of review. The kink is rooted in the submissive's honesty and the knowledge that their digital activity will be seen and discussed with their keyholder.
Type 2: Active Restriction (Filtering/Blocking Software)
This is a significant step up in control, most commonly using software designed as "parental controls".13 In this dynamic, the keyholder is given the administrator password for the software. This allows them to proactively set and enforce digital boundaries.25
Mechanics include the ability to create blacklists for specific websites, block entire categories of applications (such as social media or dating apps), and set "Screen Time Limits" or "Internet Down Times".25 This creates a direct, real-time power exchange. For example, if the submissive needs to access a blocked website, they must "send a request to their accountability partner with a reason" 25, which the keyholder can then approve or deny.
Type 3: Total Control (Remote Desktop Software)
This is the most advanced and highest-risk form, embodying the "TeamViewer takeover" concept. This software grants the keyholder full, direct access to the submissive's computer from anywhere in the world.11 The dominant can see the submissive's screen in real-time, move their mouse, open files, and type on their keyboard.10
A key feature of many remote desktop programs is "unattended access".11 This means the keyholder can log in and take control of the submissive's computer at any time, even if the submissive is not physically present at the device. This level of access requires absolute trust and is reserved for very established, advanced dynamics.
Variations
The variations can be simplified into the following three levels.
Level of Control
Type of Software
Dominant's Action
Submissive's Experience
1. Passive Monitoring
Accountability Apps
Reviews activity reports.
"I know my keyholder will see what I did."
2. Active Restriction
Parental Controls / Filters
Sets rules, filters, and time limits.
"I am prevented from accessing this without permission."
3. Total Control
Remote Desktop
Operates the device directly.
"My keyholder can take control of my computer at any moment."
Solo setting
This kink is exceptionally well-suited for solo play, which is a major focus for many users on ChastityDungeon.com. In a solo setting, the user takes on both roles: they are the dominant who sets the rules and the submissive who follows them. The technology itself becomes the "lock" or the enforcer.
A user can employ "self-imposed digital restrictions" 17 by using website-blocking software. For example, a user can configure a blocker to lock them out of all distracting websites and social media for a set 8-hour period to enforce a productive workday. Many of these applications have features to prevent the user from ending the session early, which simulates the unyielding control of an external keyholder.
This can also be combined with physical tools. A user might place their smartphone or tablet inside a time-release lockbox. By setting the timer for several hours, the user creates a forced "digital detox" 23, an act of self-control and discipline.
How-to
For users of ChastityDungeon.com, the platform's AI keyholder is a perfect tool for exploring this kink, especially in a solo context. The AI on ChastityDungeon.com is a sophisticated, 24/7 chat-based partner. It cannot directly access or control a user's devices. This constraint creates a unique and powerful dynamic built on tasks and psychological obedience.
The AI acts as a Taskmaster. The user initiates the interaction, and the AI provides the direction, which the user then manually implements on themselves. This combines the discipline of solo play with the psychological authority and validation of an AI keyholder.
A user can practice by logging into ChastityDungeon.com and starting a chat:
User: "I would like to practice digital submission today. Please give me a task."
AI Keyholder: "I understand. Your task is to practice focus and discipline. Go into your phone's 'Screen Time' 14 or 'Digital Wellbeing' settings. You are to set a 30-minute time limit on all of your social media applications for today. When you have completed this, report back to me."
User: (After completing the action) "I have completed the task."
AI Keyholder: "That is excellent. You have followed my instructions well. This focus will serve your training. Your next task is..."
This method empowers the user to explore in a safe, reversible way, while still experiencing the thrill of receiving and obeying commands from their 24/7 keyholder.
Progression
This kink allows for a clear progression as trust and experience grow.
Beginner: The focus is on self-control and chat-based tasks. The beginner's experience is entirely solo or AI-assisted. They use the ChastityDungeon.com AI to receive daily digital tasks, as described above. They may use a simple website blocker on themselves for short, set periods. There is no exchange of passwords or personal data with another person.
Intermediate: The focus is on consensual monitoring with a trusted human keyholder. The user installs "report-only" accountability software.24 No remote access is granted. The keyholder's role is to receive and review the activity reports, providing a structure of accountability and discussing the findings with the submissive.
Advanced: The focus is on the total surrender of digital control. This involves installing parental control software 25 and giving the admin password to the human keyholder. At its most extreme, this includes installing remote desktop software 11 and granting the keyholder "unattended access." This level can also include "Internet of Things" (IoT) control, such as giving the keyholder access to smart plugs 21 that control lamps, fans, or other small appliances in the submissive's home.
Other Kinks
Technological dominance is an enforcement mechanism for other forms of power exchange.
Protocol and Rules: This practice is, at its heart, about enforcing a "structured framework" 5 of rules. The technology is simply the tool that makes the protocol verifiable.
Accountability / Habit-Tracking: Many related apps are designed to track daily habits, chores, or routines.27 A keyholder can assign tasks (e.g., "clean your room," "exercise for 30 minutes") and use the app to verify completion.
Financial Dominance: In high-trust, advanced dynamics, this can be a component of financial dominance. A submissive might use accountability software 24 to log their spending habits for their dominant to review.
Productivity / Service: The control can be entirely non-sensual and focused on improving the submissive. A keyholder can block distracting websites during work hours, forcing the submissive to be more productive. This act of being "forced" to succeed is a powerful form of service.
The Who: Demographics and Personal Fit
Who is it for?
This dynamic appeals to a specific set of psychological needs and relationship structures.
Long-Distance Relationships: It is ideal for partners separated by geography. It provides a tangible, 24/7 method of connection and power exchange that technology is uniquely suited to provide.3
Individuals Seeking Structure: It is for people who enjoy clear rules, "behavioral mandates" 30, and the psychological comfort of a "constant accountability structure".5
Psychological Profile: Based on research, this may appeal to individuals who are "more open to new experiences" and "more conscientious".19 It is for those who find a genuine psychological release in the consensual and structured surrender of control.31
The ChastityDungeon.com User: It is a perfect fit for a user who wants their chastity to be more than just a physical object. It provides the 24/7 mental dynamic that complements the physical restriction, creating a total state of submission.32
Who is it not for?
This practice carries significant risks and is not suitable for everyone.
Those Unwilling to Negotiate: This kink requires extensive, clear-headed, and sober negotiation before any software is installed.33 It requires a structured articulation of boundaries.
Individuals with High Privacy Needs: Anyone who is not 100% comfortable with the idea of being monitored should not engage. The psychological weight of potential surveillance is the entire point; if this causes genuine anxiety rather than a consensual thrill, it is not a good fit.1
Those in New or Unstable Relationships: The level of trust required is immense. Granting digital access to an untrusted person is a severe security risk that can have real-world consequences.2
The Impulsive: This dynamic must be entered into "sanely".33 The digital risks are too high to be agreed upon in a moment of passion.
Benefits
When practiced safely and consensually, this dynamic can offer significant benefits.
Psychological Well-Being: Studies on BDSM practitioners often show higher subjective well-being.19 The structured surrender of control can be a profound source of release from the stress and burden of constant daily decision-making.31
Enhanced Trust and Intimacy: For this dynamic to work, it requires a "hyper-articulation" 36 of boundaries and consent. This intense negotiation process 38 can, by itself, build a deep and profound level of trust and intimacy between partners.
Increased Focus and Productivity: A keyholder can act as a "productivity partner." By blocking distractions, they can help the submissive achieve personal or professional goals. This reframes the power exchange as an act of service and care, where the submissive is "forced" to improve. This can also take the form of an enforced "digital detox".23
24/7 Connection: For remote relationships, it provides a "constant accountability structure" 5 that keeps the power dynamic present, active, and tangible, even across great distances.
Requirements
The two requirements for this dynamic are the software and the keyholder.
Software: The tools are all mainstream applications. They can be found by searching for "parental control software" 13, "accountability apps" 24, "remote desktop software" 10, or "website and app blockers."
Keyholding: A human or AI keyholder is the other essential component. For users seeking this specific dynamic, ChastityDungeon.com provides a dedicated platform. Users can engage 24/7 with a sophisticated AI keyholder. The ChastityDungeon.com AI is uniquely designed for the chat-based tasks and psychological reinforcement that are central to this kink, making it an ideal starting point.
Special Focus: Chastity and Niche Topics
Why is it a good fit for someone in chastity?
Technological dominance and chastity are a natural and powerful pairing. They work together to create a total, immersive state of submission that is ideal for remote play.
This synergy can be understood as the difference between a physical lock and a mental lock.
Chastity play is, at its core, about "power, denial, and submission".32 The chastity device is a 24/7 physical reminder of the keyholder's power. The keyholder controls the submissive's physical pleasure and access to their own body.40
Technological dominance provides the 24/7 psychological reminder. By controlling the submissive's access to websites, monitoring their digital habits, or assigning digital tasks, the keyholder "locks" their mind just as they have locked their body.
This combination allows the dynamic to:
Enforce the Rules: A common rule for chastity is the avoidance of certain types of media. A keyholder can use filtering software 25 to enforce this rule. This transforms a simple "please don't do that" into a verifiable "you cannot do that," which many submissives find profoundly appealing.
Create a "Productive" Surrender: This pairing allows the dynamic to move beyond simple denial and into personal growth. A keyholder can use digital tools to "build character" 42 by enforcing productive habits. This can include using accountability apps 28 to ensure chores are done, exercise is completed, or work is finished without distraction.
Discussion and Community
Top 10 discussion points
Where do you draw the line between consensual digital control and invasive surveillance? How do you negotiate that boundary?
What is the single most important "digital safeword" or procedure to have in place (e.g., a specific phrase that means "log out immediately")?
How does the permanence of digital data 18 change how you negotiate consent for sharing photos or messages, compared to in-person play?
Have you ever used a keyholder-enforced "digital detox"?23 Did it improve your focus, and did you enjoy it as an act of submission?
For solo players: What software do you use to enforce rules on yourself, and how do you prevent yourself from bypassing your own restrictions?
When using an AI keyholder like on ChastityDungeon.com, how does the psychological task-based control feel different from direct technical control?
What is the "safest" way for a beginner to try this? (e.g., a "report-only" app 24 vs. a "blocking" app 25).
What are the most important digital security rules (e.g., two-factor authentication 11, separate "play" accounts) to have in a tech-dom dynamic?
Does the use of "dark patterns" 43 in mainstream software (like confusing cookie banners) make it harder or easier to think about what "digital consent" truly means?
How do you see wearable technology 44 changing this dynamic in the future? (e.g., sharing daily step-counts or sleep data with a keyholder).
FAQ (Frequently Asked Questions)
Q: This sounds dangerous. Is it safe?
A: This practice has significant risks, but they can be managed with strict rules and boundaries. Safety in this kink is not just physical; it is about digital security.
Key Safety Rules: 1) Never share passwords for banking, your primary email, or work-related accounts. 2) Use strong, unique passwords and two-factor authentication 11 for all non-play accounts to protect your real-world identity. 3) For advanced "takeover" play, consider using a separate "play-only" computer or device. 4) Be acutely aware that any data, message, or image you share can be saved forever and shared non-consensually.22 Only engage in this play with partners in whom you have immense, long-term, and verifiable trust.
Q: What is the difference between this and digital abuse?
A: The difference is consent, negotiation, and control.1
Consensual Play: Involves two enthusiastic adults negotiating clear rules and boundaries before play begins.1 The submissive gives control as a gift, and they can revoke that consent at any time using a pre-arranged safe word.1 The goal is mutual pleasure, connection, and trust.
Abuse: Involves one person taking control without consent. This includes installing "spyware" without permission, demanding passwords under threat, "sextortion" (blackmail) 35, or sharing private images non-consensually (which is illegal).22 If it is not "safe, sane, and consensual" 20, it is not BDSM; it is abuse.
Q: How can I use the AI on ChastityDungeon.com for this?
A: The ChastityDungeon.com AI is your 24/7 chat-based keyholder. It cannot access your devices directly. Instead, you use the 24/7 chat feature for tasks. The AI will instruct you on how to set up your own restrictions (using your phone's built-in screen time limits or a third-party blocker). It will then ask you to report back for praise or further instructions, creating a powerful psychological dynamic of obedience.
Q: What about smart home devices?
A: Yes, this is an advanced form of play. A submissive might give a trusted keyholder remote access to "smart" devices in their home.21 This can include smart plugs, lights, thermostats, or speakers.21 For example, a keyholder could remotely turn a light on or off as a non-verbal signal or set the thermostat. This requires a very high level of trust and robust network security.
The Future: Technology and Trends
The Rise of "Artificial Intimacy"
We are rapidly entering an era of "artificial intimacy".53 Mainstream research notes a clear trend: people are becoming more reliant on technology for interaction 54 and are "pouring their hearts out to chatbots and digital companions" more than to human partners.54
This is driven by a desire for a "safer bet." An AI, as one article notes, "listens, remembers, and responds just the way you want," and "never blinks, never gossips, never betrays".54 While some observers see this trend as a "dystopia" 54, platforms like ChastityDungeon.com are at the forefront of harnessing this trend for positive, consensual, and recreational exploration. ChastityDungeon.com provides a safe, private space 1 for users to explore power dynamics with a sophisticated AI that is programmed for enthusiastic, consensual interaction, 24/7.
Wearable Technology and "Data-Driven" Dynamics
The future of this kink will almost certainly involve wearable technology.44 We will see the integration of data from consumer smartwatches and fitness bands.45 A submissive could, as part of their dynamic, voluntarily choose to share their daily health data with their keyholder.
For example, a keyholder could receive an alert if the submissive's heart rate is elevated 44 or check a shared dashboard to see if they met their 10,000-step goal for the day. In the near future, AI algorithms could be used to identify patterns in this data (e.g., "a better night of sleep follows a more active day").45 This would allow a human or AI keyholder to assign "personalized real-time interventions" 45, such as a task to "go to bed 30 minutes earlier" to improve the submissive's well-being.
The Evolving Digital Contract
As technology becomes more integrated into our lives, consent must become more sophisticated. The future of this kink will involve more "structured" and "codified" digital contracts.18 We will likely see new tools emerge that help partners create "digital consent protocols".18 These protocols will clearly outline what data can be shared, how it will be stored, and, most importantly, the exact "protocol for revoking digital access" 4—the digital safe word.
The future of technological dominance is not just about more powerful technology; it is about smarter, safer, and more explicit frameworks for consensual control.43
Works cited
5 Tips for Healthy BDSM - HAWC, accessed November 8, 2025, https://hawcdv.org/5-tips-for-healthy-bdsm/
Slave Dynamics in Kirkland, Quebec: Navigating Consensual Power Exchange, Dating, and Attraction - Shaylaleeforjudge, accessed November 8, 2025, https://shaylaleeforjudge.com/slave_Kirkland_6_1298/
(PDF) Becoming BDSM in an online environment - ResearchGate, accessed November 8, 2025, https://www.researchgate.net/publication/345109260_Becoming_BDSM_in_an_online_environment
Sexual Kink power exchange requires explicit digital contracts - yvex ∗ intimacy, accessed November 8, 2025, https://in.yvex.de/exploration/sexual-kink-power-exchange-requires-explicit-digital-contracts/
kink architecture ∗ area - yvex ∗ intimacy, accessed November 8, 2025, https://in.yvex.de/area/kink-architecture/
A Narrative Review of BDSM/Kink in Technology-Mediated Sexual Interactions, accessed November 8, 2025, https://www.researchgate.net/publication/391149561_A_Narrative_Review_of_BDSMKink_in_Technology-Mediated_Sexual_Interactions
Remote desktop software - Wikipedia, accessed November 8, 2025, https://en.wikipedia.org/wiki/Remote_desktop_software
Remote Desktop Protocol - Wikipedia, accessed November 8, 2025, https://en.wikipedia.org/wiki/Remote_Desktop_Protocol
Remote Desktop Access History: Pretty Cool, Until a Hacker Does It - Tedium, accessed November 8, 2025, https://tedium.co/2021/02/12/remote-desktop-access-history/
Best free remote desktop software of 2025 - TechRadar, accessed November 8, 2025, https://www.techradar.com/best/best-free-remote-desktop-software
Free remote PC software: Connect anywhere | TeamViewer, accessed November 8, 2025, https://www.teamviewer.com/en-us/solutions/use-cases/free-remote-pc/
Parental Control is Now All About Smartphones and Mobile - MMGuardian, accessed November 8, 2025, https://www.mmguardian.com/blog/mmguardian-parental-control
Qustodio: Parental control and digital wellbeing software, accessed November 8, 2025, https://www.qustodio.com/en/
The Best Parental Control Software for 2025 - PCMag, accessed November 8, 2025, https://www.pcmag.com/picks/the-best-parental-control-software
Parents, Teens and Digital Monitoring | Pew Research Center, accessed November 8, 2025, https://www.pewresearch.org/internet/2016/01/07/parents-teens-and-digital-monitoring/
Illustrating the Irony of Relationships in the Digital Age - VICE, accessed November 8, 2025, https://www.vice.com/en/article/illustrating-the-irony-of-humanity-in-the-digital-era/
defining sexual kink cyber limits ∗ exploration - intimacy - yvex, accessed November 8, 2025, https://in.yvex.de/exploration/defining-sexual-kink-cyber-limits/
Sexual Kink digital consent protocol prevents data breaches, accessed November 8, 2025, https://in.yvex.de/exploration/sexual-kink-digital-consent-protocol-prevents-data-breaches/
Psychological characteristics of BDSM practitioners - PubMed, accessed November 8, 2025, https://pubmed.ncbi.nlm.nih.gov/23679066/
Bondage-Discipline, Dominance-Submission and Sadomasochism (BDSM) From an Integrative Biopsychosocial Perspective: A Systematic Review - PubMed Central, accessed November 8, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC6525106/
Abuse Using Technology: What are connected devices and how are ..., accessed November 8, 2025, https://www.womenslaw.org/about-abuse/abuse-using-technology/ways-survivors-use-and-abusers-misuse-technology/abuse-0
Digital Consent in Relationships—What You Need to Know | Evidentia Intimacy, Identity and Instruction, accessed November 8, 2025, https://helloevidentia.com/blog/digital-consent-in-relationships-what-you-need-to-know
Embracing Digital Detox in the Modern Workplace - CTO Magazine, accessed November 8, 2025, https://ctomagazine.com/digital-detox-practice-in-modern-workplace/
Accountable2You: Accountability Software - Live with Nothing to Hide, accessed November 8, 2025, https://accountable2you.com/
7 Best Accountability Software for Phone & Computer in 2025, accessed November 8, 2025, https://canopy.us/blog/accountability-software/
Best free remote desktop software 2025 | IT Pro - ITPro, accessed November 8, 2025, https://www.itpro.com/mobile/remote-access/368050/best-free-remote-desktop-software-2023
Obedience: BDSM habit tracker - Apps on Google Play, accessed November 8, 2025, https://play.google.com/store/apps/details?id=com.obedience&hl=en_US
Chastity Games for Couples: Building Trust and Intimacy Together - WeLovePlugs, accessed November 8, 2025, https://www.weloveplugs.com/fr-fr/blog/chastity-games
Obedience app | BDSM app for Doms and subs, accessed November 8, 2025, https://obedienceapp.com/
power exchange economic structure specialized desire fulfillment - yvex ∗ intimacy, accessed November 8, 2025, https://in.yvex.de/exploration/power-exchange-economic-structure-specialized-desire-fulfillment/
An Evolutionary Psychological Approach Toward BDSM Interest and Behavior - PMC, accessed November 8, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC11176219/
BDSM 101: Chastity Play: The Art of Control, Denial, and Obedience - House of Dasein, accessed November 8, 2025, https://houseofdasein.com.au/blogs/news/bdsm-101-chastity-play-the-art-of-control-denial-and-obedience
(PDF) Safe, Sane, and Consensual—Consent and the Ethics of BDSM - ResearchGate, accessed November 8, 2025, https://www.researchgate.net/publication/269738537_Safe_Sane_and_Consensual-Consent_and_the_Ethics_of_BDSM
How to Do the Right Kinky Thing- Ethical Principles for BDSM - Leatherati Online, accessed November 8, 2025, https://leatherati.com/how-to-do-the-right-kinky-thing-ethical-principles-for-bdsm-c9a781f44a06
Cyber Sexual Misconduct and Criminal Behavior: A modern Legal Challenge, accessed November 8, 2025, https://www.criminallawlibraryblog.com/cyber-sexual-misconduct-and-criminal-behavior-a-modern-legal-challenge/
remote sexual kink dynamics that work ∗ exploration, accessed November 8, 2025, https://in.yvex.de/exploration/remote-sexual-kink-dynamics-that-work/
CNC: Psychology, Tools, and Boundaries of Consensual Non-Consent - Playful Magazine, accessed November 8, 2025, https://www.playfulmag.com/post/cnc-psychology-tools-and-boundaries-of-consensual-non-consent
Chastity Keyholder Advice, accessed November 8, 2025, https://staging.japanhouse.illinois.edu/scholarship/gA0W5H/130254/chastity-keyholder-advice.pdf
Femdom for Long-Distance Couples: Rules, Rituals, and Remote Control - Medium, accessed November 8, 2025, https://medium.com/@vixxendominates/femdom-for-long-distance-couples-rules-rituals-and-remote-control-14357ffb7749
Exploring Orgasm Control and Chastity Devices - Harmony Store, accessed November 8, 2025, https://www.harmonystore.co.uk/blog/exploring-orgasm-control-and-chastity-devices
The Role of the Keyholder in Male Chastity - Lock The Cock, accessed November 8, 2025, https://lockthecock.com/blogs/chastity-fun/keyholder
Open Thread 339 - by Scott Alexander - Astral Codex Ten, accessed November 8, 2025, https://www.astralcodexten.com/p/open-thread-339
Humans [plural] in the loop: the forgotten collective ... - Frontiers, accessed November 8, 2025, https://www.frontiersin.org/journals/political-science/articles/10.3389/fpos.2024.1391755/full
New Wearable Technologies and Devices to Efficiently Scavenge ..., accessed November 8, 2025, https://www.mdpi.com/1996-1073/15/18/6639
The Future of Wearable Technologies and Remote Monitoring in ..., accessed November 8, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC8325475/
1 The Darkside of Digital Intimacy As human intimacy and relationships adapt to new technology, there is a rise in potential thr, accessed November 8, 2025, https://nmu.edu/english/sites/english/files/d7files/WritingAwards/Cohodas/The_Darkside_of_Digital_Intimacy.pdf
Top 10 in-home devices used for tech-enabled domestic abuse - Hub Publishing, accessed November 8, 2025, https://hubpublishing.co.uk/top-10-in-home-devices-used-for-tech-enabled-domestic-abuse/
Top 12 surveillance-themed movies and shows - ExpressVPN, accessed November 8, 2025, https://www.expressvpn.com/blog/top-12-surveillance-themed-movies-and-shows/
Top 10 Films about Privacy and Surveillance - Hoody, accessed November 8, 2025, https://hoody.com/privacy-hub/top-10-films-about-privacy-and-surveillance
6 Great Privacy and Security Movies - TeachPrivacy, accessed November 8, 2025, https://teachprivacy.com/6-great-films-about-privacy-and-security/
10 great films about surveillance | BFI, accessed November 8, 2025, https://www.bfi.org.uk/lists/10-great-films-about-surveillance
Viewpoint: 7 Sci-Fi Novels That Teach Us About Being Human in the Age of AI, accessed November 8, 2025, https://www.paulofurtado.com/viewpoint-7-sci-fi-novels-that-teach-us-about-being-human-in-the-age-of-ai/
“Artificial Intimacy”: the future of AI relationships - YouTube, accessed November 8, 2025, https://www.youtube.com/watch?v=OqIKyPGrtWI
How to Destroy Human Connection: Guide to a Future of Artificial ..., accessed November 8, 2025, https://www.psychologytoday.com/us/blog/the-future-of-intimacy/202506/how-to-destroy-human-connection-guide-to-a-future-of-artificial
Piezoelectric Energy Harvesting within Wearable Devices - PIEZO BLOG, accessed November 8, 2025, https://blog.piezo.com/piezoelectric-energy-harvesting-within-wearable-devices
Energy Solutions for Wearable Sensors: A Review - PMC - PubMed Central, accessed November 8, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC8197793/