Total pages in book: 63
Estimated words: 58317 (not accurate)
Estimated Reading Time in minutes: 292(@200wpm)___ 233(@250wpm)___ 194(@300wpm)
Estimated words: 58317 (not accurate)
Estimated Reading Time in minutes: 292(@200wpm)___ 233(@250wpm)___ 194(@300wpm)
She leaned over, close enough that I could smell her shampoo, and typed a username into my login screen: DOLLHOUSE_071. Then she gestured for me to enter a password.
“They’ll have left it on a sticky note in your desk drawer,” she explained.
I opened the drawer and found a yellow Post-it with a complex string of characters. I typed it in, my fingers finding the familiar rhythm of keyboard work despite my trembling hands. The system accepted the credentials and a new interface loaded—sleek and purpose-built.
“This is what we call the Honeypot Development Environment,” Emily said, her voice taking on a different quality—the tone of someone who loved their work. “It’s where we build the traps. The system will walk you through a tutorial first. Pay attention—it’s actually pretty elegant.”
A dialog box appeared on my screen with clean, minimalist design:
Welcome to Project Dollhouse Technical Training
This tutorial will introduce you to Selecta’s proprietary counter-hacking methodology and honeypot architecture. Estimated completion time: two to three hours.
Please be aware that your recruitment into Project Dollhouse has made you a de facto signatory of a nondisclosure agreement. Any sharing of Selecta’s intellectual property in your work on Project Dollhouse will result in severe disciplinary consequences, including corporal punishment and extended service of Selecta’s choosing, in Selecta’s correctional facilities.
Begin tutorial?
I swallowed hard, my brow having furrowed at the highly non-standard NDA’s mention of corporal punishment. I clicked yes, and the first lesson loaded. Despite everything—the plug in my ass, the diaper around my hips, the humiliation of the morning—I felt my analytical mind engage. The tutorial was sophisticated, walking me through the theoretical framework of creating convincing vulnerabilities that would trap attackers while appearing legitimate.
“See?” Emily said, watching my screen. “It’s fascinating, isn’t it? The way they’ve structured it?”
She was right. The system presented scenarios where I had to identify the optimal level of security—too strong would repel attackers, too weak would seem suspicious. I had to think like both the attacker and the defender simultaneously, finding the sweet spot that would lure in cybercriminals while documenting their methods.
I worked through the first few modules, my fingers flying over the keyboard. The familiar feeling of solving complex problems washed over me, and for a few minutes I almost forgot where I was. Almost forgot about the plug, the diaper, the degradation of the morning.
Then I felt it—a strange ache in my chest. A longing for something I couldn’t quite name.
I glanced at the clock. It had been over sixteen hours since I’d last seen Daddy Bill and Daddy Ed. Since they’d tucked me into bed last night with that vibrator keeping me on edge. Since they’d shaved me and filled me and made me call them Daddy.
And somehow I missed them. I wanted to see them, because I wanted to tell them that I was doing really well at the tutorial, and I wanted to ask them a zillion questions about the theory and the practice behind it. I wanted to ask Daddy Bill why the fuck my mind seemed more focused with a diaper on and a plug in my anus. I wanted to ask Daddy Ed what the dataset behind the methodology looked like.
The realization made me feel dizzy, then mortified, and then angry.
Nope. That’s not what you’re feeling. That’s… that’s Stockholm syndrome or some shit.
But that didn’t mean I wasn’t feeling it, did it?
I missed my daddies. After a few hours with them, and a few hours without them, I missed their presence, their approval, their… God help me… their control. The thought made me want to die from shame, but I couldn’t deny the truth of it. Some part of me had already started to crave their attention, to need the structure they provided.
The door opened and I looked up instinctively, hoping—
But it wasn’t my daddies. Two men I didn’t recognize entered, both in business casual attire. They walked directly to Keiko’s station.
“Time for your session, Little Sixty-Eight,” one of them said.
I couldn’t keep my eyes from traveling over there as Keiko saved her work and stood, following them out without a word. The door closed behind them and I felt a spike of something like jealousy. She was going to be with her daddies. She was going to get their attention, their touch, their approval.
Session. What did that mean? I felt my tummy flutter at the images that filled my mind, and I realized that my left hand had drifted down under the desk to the front of my diaper.
“Don’t,” Emily said, her voice sharp, but in warning rather than in threat. “You don’t want to find out what happens to girls who touch themselves without permission.”
I looked over to see her gazing back at me steadily, her eyes unreadable.
“Get that hand up,” she told me. “Remember that you’ve got a sensor down there.”