Falls jemand an der #ENABLE!-Werkstatt "Erwerben um zu Öffnen" – die P2O-Plattform als Pledging Hub" jetzt teilnehmen will: der Zoom-Link hat sich geändert!
[edit: ich habe den link wieder rausgenommen, weil das meeting gehackt wurde; wer ihn noch braucht, bitte bei mir melden.]
https://enable-oa.org/news/erwerben-um-zu-oeffnen-die-p2o-plattform-als-pledging-hub
#P2O #Purchase2Open
Making sure you're not a bot!

Purchase to Open #P2O ist an den Start gegangen und verspricht aus meiner Sicht ein Game changer in der #OpenAccess-Finanzierung von Buchpublikationen zu werden. Wir von der @ubleipzig sind jedenfalls gern dabei!
https://www.purchase-to-open.com/
Das Prinzip: Gemeinsam finanzieren, offen publizieren |  Purchase to Open

RT @[email protected]

The full results from Day One of #Pwn2Own are in! Check out the blog for details on all of today's activities. We awarded $240,000 USD today for four wins and one partial win. See http://bit.ly/2TS6zJV for the info. #P2O

Pwn2Own Vancouver 2019: Day One Results

The first day of Pwn2Own Vancouver 2019 is in the books and already, we’ve seen some great research. At the end of the day, we saw 4 successful attempts and one partial win, with contestants earning $240,000 USD in cash awards – plus the laptops used to demonstrate their research. Let’s take a close

RT @[email protected]

Get ready for #Pwn2Own by reading about a pair of #Apple #Safari JIT bugs used at #P2O Tokyo. @[email protected] provides the details on the bugs and the PoC. http://bit.ly/2T3hk6F

The Apple Bug That Fell Near The WebKit Tree

Pwn2Own Vancouver is right around the corner so it seemed fitting to talk about an old Pwn2Own bug. Because we recently gave a presentation at OffensiveCon on how Adobe improperly patched some vulnerabilities, it seemed only fair to highlight how Apple has had similar issues. In April of 2018, we