Feeds

UK political party flogged on eBay

MP3 yours for £2k

Gartner critical capabilities for enterprise endpoint backup

The MP3 Party, a UK political party which aimed to simplify British government and civil administration, has put itself up for sale on eBay.

The party, which was officially registered as a political party in 2002 by the UK Electoral Commission, is currently on sale on the online auction site for a starting bid of £2,000. The political party has been for sale on eBay for the past three days and has yet to attract a single bid.

The founders of the party, who include Russian-born Ruslan G. Fedorovsky, have decided to sell up, saying they are "too preoccupied with their own projects to make MP3 Party into real political force". They say they hope the new owner will be someone who can take the party forward.

In addition to becoming the new owner of the MP3 Party, a successful bidder will get all rights to existing party logos, the party domain names - www.theMP3Party.com and the www.MP3Party.co.uk - and all current party officials will be replaced by the lucky bidder's new party officials at the UK Electoral Commission.

The inspiration for the party's name is drawn from the MP3 community, who swap digital media files online. Based on the mathematical theory of complex systems, the party's philosophy states that complex systems of any kind are inherently dysfunctional. Therefore when social, legal and administrative systems reach a certain level of complexity they cease functioning. The MP3 Party wanted to apply this mathematical theory to politics and government.

In addition to attracting voters from amongst the MP3 community, the party was also targeting young voters were uninterested in old-fashioned political process and systems. The party sought to implement its simplification policy into all aspects of life in the UK, including taxation, law, economics, foreign policy, immigration and the monarchy. One of the proposed slogans for the party read: "Elect us and we will delete one regulation per day, one law per week, one subsidy per month and one tax per year."

Copyright © 2005, ENN

Next gen security for virtualised datacentres

More from The Register

next story
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
Nuts to your poncey hipster coffees, I want a TESLA ELECTRO-CAFE
Examining the frothy disconnect in indie cafe culture
Ex-Apple man Sam Sung - for it is he - sticks namebadge on eBay
Stump up via tat bazaar, do a good thing for ill kids
Check your Clungene, Irish women warned
Have a quick shufti, you may not be pregnant after all
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.