Mine taunts me in plain view from my bookshelf. It's a cool book but I have little use for what it provides so I haven't been able to dig into it much.
I use mine on occasion. It's particularly useful when targeting architectures that don't have modern intrinsics for special operations.
It's worth noting that some of the solutions aren't optimal for modern devices with conditional moves. In some cases you can get equal or better performance with straightforward code than some of the stuff in the book that goes out of its way to avoid branching control flow.
It has a pretty cool niche as a set of toy problems to verify cryptography tooling and I've found some of the recipes inside useful inspiration for constant time programming and other constrained domains. It's not as useful as it used to be for exactly the reasons you mentioned though.
Same. But sometimes I like skimming it just as a distraction. There's something so satisfying about seeing these tricks I'm far too stupid to come up with on my own. A couple of times, I've had some breakthroughs when stuck on an unrelated problem, while reading this book, because the "psychedelic hackery" sort of leads me down an alley I wouldn't otherwise have thought of, due to some superficial similarity.