Feeds

Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine

Only I can 'make an empire out of a republic' intones presidential candidate

Top 5 reasons to deploy VMware with Tegile

The Ukrainian Internet Party has announced that a man wearing the costume of the Dark Lord of the Sith is their chosen candidate for the country's presidential elections on 25 May.

According to the Russia's Interfax news agency, the party was serious enough to stump up the whopping UAH 2.5 million (approx £132,000) registration fee.

Above: Russian blogger "koffboy" tweets about the rally, calling it a "good joke". Chewbacca's an odd addition if you consider Star Wars lore, which is perhaps explained by this throwaway comment of one of koffboy's followers: "Chewie looks like he just got off a bender".

"After winning intra-party primaries by a landslide, comrade Vader will be our party's candidate," the UIP's leader, Dmitry Golubov, said on the party's website.

Golubov has spent time in prison in connection with a credit card hacking scam, although he claims it was a case of mistaken identity, according to the Washington Post.

The UIP's candidate also chucked in his two Galactic credit standards' worth on the site, declaring dramatically: "I alone can make an empire out of a republic, to restore former glory, to return lost territories and pride for this country."

The party has been around since 2007, but gained momentum in late 2009, when it conducted protests in favour of the abolition of a proposed "tax on the internet". Among other things, it proposes a single income tax of 25 per cent across the board, an abolition of VAT and land taxes, a complete "digitisation" of government and, er, free computer courses for all.

The Ukraine has been having something of a dark time since Pro-Russian leader Viktor Yanukovych was kicked out of office in February against the backdrop of unrest by pro-European factions.

Russia has since sent troops to the Ukraine's Crimea region, ostensibly to protect it from the unrest.

UIP members have been a very visible part of recent street protests ... dressed as storm troopers, natch. ®

Beginner's guide to SSL certificates

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.