Feeds

Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine

Only I can 'make an empire out of a republic' intones presidential candidate

Choosing a cloud hosting partner with confidence

The Ukrainian Internet Party has announced that a man wearing the costume of the Dark Lord of the Sith is their chosen candidate for the country's presidential elections on 25 May.

According to the Russia's Interfax news agency, the party was serious enough to stump up the whopping UAH 2.5 million (approx £132,000) registration fee.

Above: Russian blogger "koffboy" tweets about the rally, calling it a "good joke". Chewbacca's an odd addition if you consider Star Wars lore, which is perhaps explained by this throwaway comment of one of koffboy's followers: "Chewie looks like he just got off a bender".

"After winning intra-party primaries by a landslide, comrade Vader will be our party's candidate," the UIP's leader, Dmitry Golubov, said on the party's website.

Golubov has spent time in prison in connection with a credit card hacking scam, although he claims it was a case of mistaken identity, according to the Washington Post.

The UIP's candidate also chucked in his two Galactic credit standards' worth on the site, declaring dramatically: "I alone can make an empire out of a republic, to restore former glory, to return lost territories and pride for this country."

The party has been around since 2007, but gained momentum in late 2009, when it conducted protests in favour of the abolition of a proposed "tax on the internet". Among other things, it proposes a single income tax of 25 per cent across the board, an abolition of VAT and land taxes, a complete "digitisation" of government and, er, free computer courses for all.

The Ukraine has been having something of a dark time since Pro-Russian leader Viktor Yanukovych was kicked out of office in February against the backdrop of unrest by pro-European factions.

Russia has since sent troops to the Ukraine's Crimea region, ostensibly to protect it from the unrest.

UIP members have been a very visible part of recent street protests ... dressed as storm troopers, natch. ®

Intelligent flash storage arrays

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.