Feeds

TRULY sinister blond madman signed for Bond 24, whisper insiders

'Makes Javier Bardem look like Rolf Harris'

Top three mobile application threats

The Register has exclusively learned that the next James Bond movie outing will pit 007 against a truly sinister blond madman "who'll make Javier Bardem look like your kindly maiden aunt playing Mother Teresa for the benefit of kids in a Rwandan orphange", as our inside source put it.

Producers hope Julian Assange, who allegedly inked the deal yesterday at his extradition-proof quarters inside the Ecuadorian embassy in London, will bring "an extra edge of grandiose delusion" to Bond 24.

Our source explained that due to Assange's limited scope for travel, the likelihood is that his performance will be part live action, shot in the embassy itself, and part motion-capture CGI, with a computer-generated Assange performing the most technically demanding sequences.

With this in mind, the studio has already created three virtual Assanges, one for each of the trio of working titles for the project, which we reveal here for the first time:

Pointfinger

Julian Assange as Goldfinger

Assange plays an information-obsessed Australian with a diabolical plan to nuke rival email servers in order to artificially drive up the value of his own holdings of sensitive electronic traffic. His ambitions thwarted by Bond armed with several international arrest warrants, he's sucked out of a depressurising aircraft while trying to escape to Central America.

Muckraker

Julian Assange as Hugo Drax

Driven by an obsessive sense of manifest destiny, Assange constructs an incredible orbiting space station from which he and a selected few will repopulate the Earth after the rest of humanity has been bored to death by exposure to millions of confidential but ultimately deadly dull US government documents. The film ends with Assange sucked out of an airlock while trying to evade Bond and astronauts from the Swedish Prosecution Authority.

You Only Leak Twice

Julian Assange as Blofeld

From his fantastical bunker complex under the London embassy of a fictitious banana republic, Assange attempts to provoke nuclear war between the US and Russia by publishing confidential emails in which diplomats from both sides deride each others' table manners, dress sense and general lack of personal hygiene. Armageddon is averted when Bond identifies his key weakness and, disguised as a buxom Swedish wench, penetrates and destroys his lair with the assistance of the Metropolitan Police.

Incredible stuff. We don't have any information on villainous sidekicks, Bond girls or gadgets, but we're sure readers can fill in the blanks. ®

High performance access to file storage

More from The Register

next story
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Sleuths find nosy NORKS drones on the Chinternet
UAVs likely to have been made in the Middle Kingdom
Och aye! It's the Loch Ness Monster – but only Apple fanbois can see it
Fondleslab-friendly beastie's wake spotted... OR WAS IT?
Dorian Nakamoto gets $23,000 payout over Bitcoin invention saga
Maintains he didn't create cryptocurrency, but will join community
Japanese boffin EYES up big bucks with strap-on digi-glasses
AgencyGlass saddles user with creepy OLED display
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.