Feeds

Iran's Ayatollah Khamenei 'likes' Facebook despite ban

Supreme Leader dodges filters to post status, photos

High performance access to file storage

Iran is a nation known for its heavy-handed censorship of the internet, but it is still possible to access Facebook from within its borders – particularly, that is, if you happen to be the country's Supreme Leader, Ayatollah Ali Khamenei.

The Ayatollah set up his new Facebook profile on Friday, and it has already garnered nearly 6,000 "Likes", even though the social network is technically blocked by the Iranian government's internet filters.

Although tech-savvy Iranians have found a number of ways around the government blockade, average citizens are unable to access many prominent English-language websites from within Iran, including Facebook, Twitter, and The New York Times, among others.

In 2010, Iran's state-run TV news channel actually went as far as to denounce Facebook CEO Mark Zuckerberg as a "Zionist", claiming (falsely) that the hoodie-wearing exec offered cash prizes for Israelis who killed Palestinians.

None of this has seemingly dissuaded Ayatollah Khamenei from signing up for Facebook himself, however. So far, he has used his profile to post photographs of himself and links to his speeches in Persian.

This isn't the first time the Supreme Leader has used the internet to spread his message, either. Khamenei, who came to power in 1989, has maintained an official Twitter feed for several years, and in August he actually joined Instagram.

Bizarrely, that makes the Islamic leader fairly modern, as religious figures go. By comparison, Catholic Pope Benedict XVI only joined Twitter in early December, and so far he has resisted the urge to do any photo-blogging.

How long the Ayatollah will maintain his public internet presence, however, is unclear. Iran has repeatedly claimed that it is developing its own, private "Islamic network", and that once construction is complete, it plans to unplug from the public internet altogether.

Experts have viewed such claims with skepticism, but even if they eventually prove true, it seems likely that the Iranian leader might maintain his online profiles as information (or disinformation) services for those outside the country.

After all, by flouting his country's own internet filters to access the blocked services, Khamenei has already demonstrated that he has no qualms about applying a double standard. ®

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.