Feeds

eBay sues Craigslist as family squabble goes public

eBay's 28.4% stake diluted

High performance access to file storage

eBay has taken a family squabble with eBay public and it could get messy.

In a lawsuit filed Tuesday in the Court of Chancery of the State of Delaware, the online auction house sued Craigslist, the online provider of classified ads for hookers, used toasters and room-mates that is 28.4 per cent owned by eBay. eBay claims that Craigslist's board of directors, which consists of founder Craig Newmark and CEO Jim Buckmaster, has taken unilateral and illegal actions to unfairly dilute that stake.

"Since negotiating our investment with Craigslist's board in 2004, we have acted openly and in good faith as a minority shareholder, so we were surprised by these recent unilateral actions," eBay General Counsel Mike Jacobson said here. "We are asking the Delaware court to rescind these recent actions in order to protect eBay's stockholders and preserve our investment."

The dealings between the two were so open, apparently, that the lawsuit was filed before eBay even bothered to broach the issue with Craigslist, according to a response headlined Tainted Love.

"We are surprised and very disappointed by eBay's unfounded allegations, which came to us out of the blue, without any attempt to engage in a dialogue with us," it states. "We have always done our best to protect the well-being of Craigslist and the Craigslist community, and will continue to do so. eBay has absolutely no reason to feel threatened — unless a hostile takeover of Craigslist, or the sale of eBay's stake in Craigslist to an unfriendly party, is their ultimate goal. (In which case, they’re out of luck!)"

eBay, which acquired the stake from a former Craigslist executive in 2004, said it filed the complaint under seal because it includes details protected by confidentiality requirements. Delaware's Court of Chancery, is a popular forum for settling internal disputes among companies registered in that state. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.