Feeds

Who owns your Wikipedia bio?

Web's favourite RPG hits the headlines

Security for virtualized datacentres

#1 - No: The Case of Daniel Brandt

When veteran activist Daniel Brandt objected to his entry, he found himself in a new and frenetic part of the game. Brandt had earned the hostility of the game players by attacking one of their favorite sites, Google.

(The busiest Wikipedia players are also supporters of a predictable range of techno utopian causes, for example blogs and 'Creative Commons', which are defended with a religious zeal.)

The "WP:CIV" rule was suspended, Brandt was ejected, and the Wikipedia "editors" lined up to mock him for his impertinence.

"Let's all point and laugh!" wrote one, 'Ta Bu Shi Da Yu'.

"Poor baby" wrote 'Superm401'.

"Whiny and baseless," added 'Linuxbeak'. "He can cry about this until the cows come home".

(Brandt was inspired to start a site, 'Wikipedia Watch', where he recounts the experience. He says he simply wished to remove the entry, but the request was declined by Jimmy Wales).

Conclusion:

From this example, we can conclude that you can't edit your own entry if you are not a Wikipedia fan, or display any criticism of the project.

#2 - Maybe: The Case of Jimmy Wales

The rules are rather different if you're closely involved in Wikipedia itself. Jimmy Wales has made many edits to his own entry without falling foul of the rules he helped devise. More than once he has removed a credit to Wikipedia co-founder Larry Sanger. Again, here and here.]

Wales also assiduously removes explicit use of the word 'pornography', and even 'erotica' in reference to his porn operation Bomis.com, for which he prefers the term "search portal".

Last week former MTV host Adam Curry was caught making similar edits to the history of podcasting.

Wales signs one of his own edits with the instruction -

"Please do not change it back without consulting with me personally."

Conclusion:

From this example, we can conclude that you can edit your Wikipedia entry - if you are a co-founder of the Wikipedia project.

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.