Feeds

Iran's Ayatollah Khamenei outs his supreme-self as arty hipster

Instagram photo-bloggers get an unlikely new friend

High performance access to file storage

Iran's Supreme Leader of 23 years, "divine" boss of the country's military, judiciary, and state broadcasting services, has joined hipster cupcake-pic site Instagram and posted four photos.

Ayatollah Khamenei, or more realistically a member of his staff, appears to have created an account, khamenei_ir, where arty snapshots of prayer sessions and meetings with "officials and agents" have been posted using the twee colour filters available on the app. The Iranian establishment is notoriously not the greatest fan of bloggers, though Khamenei already has 5,066 followers on micro-blogging platform Twitter.

The ruling clerical establishment, with Khamenei at its helm, holds absolute power in Iran and directly controls all broadcast media, and is well-known for its internet censorship and surveillance, which was ramped up during the 2009 protests against the disputed election results. The country is on the bottom of most media and web freedoms lists – according to NGO Freedom house, it's even less free than China and Saudi Arabia.

The ayatollah is a pointedly reclusive figure who refrains from interviews and TV appearances, according to a biography, The Ayatollah Begs to Differ: The Paradox of Modern Iran. But despite his reluctance to go TV, he seems to have found the photo-sexer-upper site an appropriate way to communicate with the faithful – of which there are so far 617 on Instagram. He previously used Twitpic, but was no doubt drawn by Instagram's allowing for much more attractive colour balances on the images.

Khamenei's engagement with the hipster photo blogging platform also seems to run counter to previous pronouncements that the Internet was a poisonous and corrupting influence. The Supreme Leader joined Twitter in April 2009, but when there was unrest in the Green movement last year, the regime banned Facebook.

The khamenei_ir Instagram account appears to be genuine because it is linked to the official @khamenei_ir Twitter.

However as most of the photos feature Khamenei, we presume it's an underling doing the social media rather than the great man himself.

We believe he is also paralysed in his right arm, following an assassination attempt in the 80s, which could make handling a smartphone tricky. ®

High performance access to file storage

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.