Fellow crypto felon Sam Bankman-Fried has been working to rehabilitate his image as he prepares for his upcoming appeal hearings. He also seems to be angling for a pardon of his own if his appeal is unsuccessful, though whether Trump would oblige is less clear.
I always forget about my complete archive of UK government source code until I receive panicked emails asking me to delete things from it.
This time it was password hashes. A *lot* of password hashes.
Hey, Anthropic owes me $9000! They illegally used at least 3 of my books on LibGen to create Claude. Now they're paying a $1.5 billion settlement, at $3000 per book. See if *your* books are on the list:
https://www.anthropiccopyrightsettlement.com/
If so, you have until March 23, 2026 to file a claim. The above website lets you file a claim, but this one explains everything more clearly:
Actually I exaggerated: the payment will be split between authors and publishers, but I have to make the claim - so the settlement is making me do some work my publisher should be doing for me. My coauthors and I will just get half, $4500. One of these books has 2 coauthors, one has 3, and one is a book I edited, with essays by lots of authors. So $1000 is a more realistic estimate of what I get. Oh well.
Bizarrely, my most popular book, Gauge Fields, Knots and Gravity, is not on the list. But I guess it's not surprising:
"The settlement agreement discloses that approximately 500,000 titles out of the 7 million copies of books that Anthropic reportedly downloaded from LibGen and PiLiMi meet the definition required to be part of the class."
Only books whose copyright is registered with the US Library of Congress meet that defiinition!
If you have a book on the list, you can opt out of the current settlement and join future lawsuits. But you have to take action to do that!!! For more information on that, see item 40 here:
Didn't somebody recently ask me what the Sanitizer API status is? Well anyway, it's in Firefox Nightly for testing now.
TLDR:
```diff
- foo.innerHTML = DOMPurify.sanitize(untrusted);
+ foo.setHTML(untrusted);
```
Download on https://nightly.mozilla.org
🚨 New advisory was just published! 🚨
A Local Privilege Escalation vulnerability was found in Ubuntu, caused by a refcount imbalance in the af_unix subsystem.
This vulnerability was disclosed during our TyphoonPWN 2025 Linux category and won first place:
https://ssd-disclosure.com/lpe-via-refcount-imbalance-in-the-af_unix-of-ubuntus-kernel/
#Brida 0.6 is here! The bridge between #BurpSuite and #Frida is now fully compatible with Frida 17+.
As of this release, Brida 0.6 supports only Frida 17 and later. For users who still rely on older Frida versions, Brida 0.6pre remains available on GitHub.
Get the latest release here:
https://hnsecurity.it/blog/brida-0-6-released/
Coming soon to the PortSwigger BApp Store (pending approval).
Kudos to our @apps3c for keeping this essential integration tool up to date with Frida's fast-evolving ecosystem!
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
Fuzzing pyhacl (https://codeberg.org/drlazor8/pyhacl), a package of Cython bindings for HACL* (the High Assurance Cryptographic Library), with fusil we only found one crash.
It turned out to actually be a silly bug in #Cython:
Issue: https://github.com/cython/cython/issues/7263
Fix: https://github.com/cython/cython/pull/7264
Goes to show how fuzzing a C-extension can uncover crashes in many different layers.
Thanks @drlazor8 for taking up the call for C-extensions maintainers to fuzz their code.
We've officially had our 31337th student join at OST2! We're waiting to hear back to see if the lucky registrant wants to be publicly lauded for their random achievement or not ;)