Hey, Anthropic owes me $9000! They illegally used at least 3 of my books on LibGen to create Claude. Now they're paying a $1.5 billion settlement, at $3000 per book. See if *your* books are on the list:
https://www.anthropiccopyrightsettlement.com/
If so, you have until March 23, 2026 to file a claim. The above website lets you file a claim, but this one explains everything more clearly:
Actually I exaggerated: the payment will be split between authors and publishers, but I have to make the claim - so the settlement is making me do some work my publisher should be doing for me. My coauthors and I will just get half, $4500. One of these books has 2 coauthors, one has 3, and one is a book I edited, with essays by lots of authors. So $1000 is a more realistic estimate of what I get. Oh well.
Bizarrely, my most popular book, Gauge Fields, Knots and Gravity, is not on the list. But I guess it's not surprising:
"The settlement agreement discloses that approximately 500,000 titles out of the 7 million copies of books that Anthropic reportedly downloaded from LibGen and PiLiMi meet the definition required to be part of the class."
Only books whose copyright is registered with the US Library of Congress meet that defiinition!
If you have a book on the list, you can opt out of the current settlement and join future lawsuits. But you have to take action to do that!!! For more information on that, see item 40 here:
Didn't somebody recently ask me what the Sanitizer API status is? Well anyway, it's in Firefox Nightly for testing now.
TLDR:
```diff
- foo.innerHTML = DOMPurify.sanitize(untrusted);
+ foo.setHTML(untrusted);
```
Download on https://nightly.mozilla.org
🚨 New advisory was just published! 🚨
A Local Privilege Escalation vulnerability was found in Ubuntu, caused by a refcount imbalance in the af_unix subsystem.
This vulnerability was disclosed during our TyphoonPWN 2025 Linux category and won first place:
https://ssd-disclosure.com/lpe-via-refcount-imbalance-in-the-af_unix-of-ubuntus-kernel/
#Brida 0.6 is here! The bridge between #BurpSuite and #Frida is now fully compatible with Frida 17+.
As of this release, Brida 0.6 supports only Frida 17 and later. For users who still rely on older Frida versions, Brida 0.6pre remains available on GitHub.
Get the latest release here:
https://hnsecurity.it/blog/brida-0-6-released/
Coming soon to the PortSwigger BApp Store (pending approval).
Kudos to our @apps3c for keeping this essential integration tool up to date with Frida's fast-evolving ecosystem!
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
Fuzzing pyhacl (https://codeberg.org/drlazor8/pyhacl), a package of Cython bindings for HACL* (the High Assurance Cryptographic Library), with fusil we only found one crash.
It turned out to actually be a silly bug in #Cython:
Issue: https://github.com/cython/cython/issues/7263
Fix: https://github.com/cython/cython/pull/7264
Goes to show how fuzzing a C-extension can uncover crashes in many different layers.
Thanks @drlazor8 for taking up the call for C-extensions maintainers to fuzz their code.
We've officially had our 31337th student join at OST2! We're waiting to hear back to see if the lucky registrant wants to be publicly lauded for their random achievement or not ;)
I’ve uploaded the slides and added the links to the videos of the two presentations i did at #r2con2025
* TocTouMaps https://github.com/radareorg/r2con2025/tree/main/TocTouMaps
* VibeReversing https://github.com/radareorg/r2con2025/tree/main/VibeReversing
https://m.slashdot.org/story/448340
why fix bugs when you can just disable features instead?
All US Nuclear Reactor Incidents are public and posted online by the NRC.
My Favorites:
“The reactor cavity is full of water. [Individual] ingested some amount of cavity water.”
(Michigan, 4 days ago)
“Unit 2 power is being reduced from 100% in response to the influx of jellyfish.”
(Florida, 2011)
Radioactive AMC Theater Exit Sign Missing
(New York, 2025)
Got angry, posted about academic fuzzing research status quo again: https://addisoncrump.info/research/what-the-hell-are-we-doing/
please enjoy: my Wasm-hosted, Wasm-targeting build of Clang/Clang++/LLD: a self-contained, 25 MiB (gzipped) pure function
https://www.npmjs.com/package/@yowasp/clang
The MI-12877 was a cartridge containing thin magnetic wire for recording and playback of audio, and was introduced in 1947 for use in the RCA Magnetic Wire Recorder. Wire was already in use as a recording medium but it was fragile and needed to be threaded across the recording head and attached to a take-up spool. The use of a cartridge made this much easier.
I'm grateful to my friend Thomas for donating this.
For more information, visit https://obsoletemedia.org/mi-12877/
Project: golang/go https://github.com/golang/go
File: src/cmd/compile/internal/ssa/rewritegeneric.go:3307 https://github.com/golang/go/blob/6425749695130f2032ac9cfdf5407b6a322534db/src/cmd/compile/internal/ssa/rewritegeneric.go#L3307
func rewriteValuegeneric_OpAnd32(v *Value) bool
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?github=https%3A%2F%2Fgithub.com%2Fgolang%2Fgo%2Fblob%2F6425749695130f2032ac9cfdf5407b6a322534db%2Fsrc%2Fcmd%2Fcompile%2Finternal%2Fssa%2Frewritegeneric.go%23L3307&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?github=https%3A%2F%2Fgithub.com%2Fgolang%2Fgo%2Fblob%2F6425749695130f2032ac9cfdf5407b6a322534db%2Fsrc%2Fcmd%2Fcompile%2Finternal%2Fssa%2Frewritegeneric.go%23L3307&colors=light
It's getting close to being done - #BinYars a #YARA-X #BinaryNinja plugin! Still testing, but plan on open sourcing it for all to use.
Shout out to Remco Sprooten for making this tool (also shown in the video) for quickly drafting Yara rules 💪 https://github.com/1337-42/SimpleYaraBN
Video: Part 1 of 2
When you go to the lavatory, spend a longer time there than is necessary.