Related Links

Top 5 Stories


Megaupload v2 in the pipeline

29 August 2012

Kim Dotcom never accepted that Meagupload was finished. Now he has said that it will return, bigger, better and more secure than ever. “We are building a massive global network. All non-US hosters will be able to connect servers & bandwidth. Get ready.”

In a series of tweets yesterday Kim Dotcom has explained some of his plans. “The new Mega will offer one-click-encryption of ALL your data transfers, on the fly, easy to use, free of charge, TOTAL PRIVACY!” he said, asking developers of “up/download & file managers, email & fax tools, VOIP & video apps” to mail him “for early API access.” Together, “Our API and your Mega tools will change the world,” he announced.

Dotcom is a showman who exudes self-confidence. It could be bluster, or it could be genuine – only time and his continued freedom will show which. He is still fighting extradition from New Zealand to the US on charges of facilitating copyright infringement – and money laundering and racketeering. In a separate development a New Zealand judge has now granted him access to NZ$6 million ($6.1 million) from his frozen bank accounts in order to pay his mounting legal fees and living expenses (he had earlier been given access to funds to pay for living expenses but not legal fees).

It is still not certain that New Zealand will proceed with his extradition, nor that any case against him will succeed in the US. Dotcom himself is certainly bullish. “They abused the wrong guy. I am going to turn this world upside down. Power to the people. Bye bye Echelon [a reference to the global spy system supposedly operated by the US, UK, Canada, New Zealand, and Australia]. Hello Freedom,” he tweeted yesterday. And he is fighting back against the US government, pointing people to the site “The war for the internet has begun,” it states. “Hollywood is in control of politics. The government is killing innovation.”

This article is featured in:
Compliance and Policy  •  Industry News  •  Internet and Network Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×