Porn pumps the wireless net

Whooooar! Check out the sales figures on that


The market for porn and other adult content on handsets will grow to around $90m in the US and $1bn globally by 2008, according to a study by analysts Yankee Group published yesterday.

Yankee reckons that many carriers are true prudish and risk missing out on a slice of the lucrative market because of misplaced fears. Child protection concerns are real enough but can be managed it concludes in the report Child Protection Unlocks Wireless Adult Content Market.

"US carriers are the latest to discover that half of the traffic outside their walled gardens is related to adult content," Yankee notes. "Fear is trumping greed for the moment, but [adult content and child protection] can work together - if carriers can develop a solid mechanism for protecting minors, as Vodafone UK has done, and they can safely profit from the opportunity."

Adult content includes chat and gaming services but porn is a mainstay for many players in the market. Yankee cites the example of PhoneErotica.com, run by wireless startup PhoneBox Entertainment, which receives more than 75 million hits per week. PhoneErotica.com charges users via their phone bill. It reckons less than five per cent of visitors to wireless adult sites will enter credit cards, versus over 30 per cent who are willing to put the charge on their phone bill. However, most customers of wireless adult content, especially in Europe, find services by sending a premium SMS message, rather than browsing to a WAP site. "Using premium SMS scenario, the cellphone carrier arguably distances itself from the content. The carrier can claim that its relationship to the adult content industry is similar to the landline operator’s relationship with a sex hotline," Yankee reports. ®

Related stories

Nokia touts content filter for mobiles
Vodafone's adult filter is go
Mobile porn is a 'time bomb'
French ISPs to carry the can for dodgy content
Porn and the handset

Similar topics

Broader topics


Other stories you might like

  • If you're using the ctx Python package, bad news: Vandal added info-stealing code
    Domain associated with maintainer email expired, taken over in supply-chain attack

    The Python Package Index (PyPI), a repository for Python software libraries, has advised Python developers that the ctx package has been compromised.

    Any installation of the software in the past ten days should be investigated to determine whether sensitive account identifiers stored in environment variables, such as cloud access keys, have been stolen.

    The PyPI administrators estimate that about 27,000 malicious copies of ctx were downloaded from the registry since the rogue versions of ctx first appeared, starting around 19:18 UTC on May 14, 2022.

    Continue reading
  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading

Biting the hand that feeds IT © 1998–2022