<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OSLogs</title>
	<atom:link href="https://oslogs.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://oslogs.com</link>
	<description>Logging Operating System Updates</description>
	<lastBuildDate>Mon, 04 May 2026 12:20:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://oslogs.com/wp-content/uploads/2023/05/favicon.png</url>
	<title>OSLogs</title>
	<link>https://oslogs.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Linux Copy Fail bug and local privilege escalation (LPE) vulnerabilities</title>
		<link>https://oslogs.com/2026/05/04/linux-copy-fail-bug-and-local-privilege-escalation-lpe-vulnerabilities/</link>
					<comments>https://oslogs.com/2026/05/04/linux-copy-fail-bug-and-local-privilege-escalation-lpe-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Mon, 04 May 2026 12:20:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Copy Fail]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Linux Vulnerabilities]]></category>
		<category><![CDATA[Local Privilege Escalation]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=8883</guid>

					<description><![CDATA[The Linux kernel community is currently wrestling with one of the most significant Local Privilege Escalation (LPE) vulnerabilities in recent memory. Dubbed Copy Fail and tracked as CVE-2026-31431, this flaw allows a local user with zero special permissions to gain full root access in seconds. If you&#8217;re getting a sense of déjà vu, it’s probably [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>The Linux kernel community is currently wrestling with one of the most significant <strong>Local Privilege Escalation (LPE)</strong> vulnerabilities in recent memory. Dubbed <strong>Copy Fail</strong> and tracked as <strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31431" target="_blank" rel="noopener">CVE-2026-31431</a></strong>, this flaw allows a local user with zero special permissions to gain full root access in seconds.</p>



<p>If you&#8217;re getting a sense of déjà vu, it’s probably because this feels remarkably like the infamous <strong>Dirty Pipe</strong> <strong>CVE-2022-0847</strong>. However, <strong><a href="https://cert.europa.eu/publications/security-advisories/2026-005/#:~:text=By%20chaining%20an%20AF_ALG%20socket,a%20root%20shell%20%5B1%5D." target="_blank" rel="noopener">Copy Fail</a></strong> is arguably more dangerous because it exploits a performance optimization that has been sitting quietly in the kernel since 2017, affecting nearly every major distribution in the wild.</p>



<h2 class="wp-block-heading">The Technical Gory Details: How &#8220;Copy Fail&#8221; Works</h2>



<p>At its heart, <strong>CVE-2026-31431</strong> is a <strong>logic flaw within the algif_aead module</strong>, which is part of the AF_ALG userspace cryptographic API. The vulnerability was introduced when the kernel team implemented an &#8220;in-place&#8221; optimization to speed up crypto operations. In a standard cryptographic operation, you have a source buffer and a destination buffer. To save memory and cycles, the optimization allowed the kernel to use the same memory area for both (i.e., $req->src == req->dst$). The problem arises when this is combined with the splice() system call.</p>



<p><strong>The Attack Chain</strong></p>



<p>An attacker can chain three specific primitives to achieve escalation:</p>



<ol class="wp-block-list">
<li><strong>The Socket Setup:</strong> Open an AF_ALG socket for an Authenticated Encryption with Associated Data (AEAD) algorithm, such as authencesn(hmac(sha256), cbc(aes)).</li>



<li><strong>The Splice Trap:</strong> Use splice() to move data from a read-only file (like /usr/bin/su or /etc/passwd) into the socket. Because splice() works by moving pages rather than copying data, the socket&#8217;s destination scatterlist now points directly to the kernel’s page cache—the in-memory <strong>cached</strong> version of that file.</li>



<li><strong>The Overwrite:</strong> When the AEAD operation executes, it incorrectly performs a 4-byte <strong>scratch</strong> write of a sequence number (specifically the $seqno_lo$ field) into the destination.</li>
</ol>



<p>Because the destination is the page cache, the kernel effectively writes those four bytes directly into the memory of a privileged binary. The attacker doesn&#8217;t need write permissions to the file on disk; they are only corrupting the version the kernel is currently holding in RAM.</p>



<p><strong>Note:</strong> The exploit is entirely deterministic. It doesn&#8217;t rely on winning a race condition or spraying the heap. It is a surgical, four-byte strike that can turn a <strong>reject access</strong> instruction in a binary into a <strong>grant access</strong> one.</p>



<h2 class="wp-block-heading">The Harm: Why &#8220;Copy Fail&#8221; is a Nightmare</h2>



<p>The immediate risk is a total compromise of the host system. A 732-byte Python script is all it takes to trigger the vulnerability.</p>



<ol class="wp-block-list">
<li>Root Escalation: An unprivileged user can corrupt the memory of /usr/bin/su to ignore password requirements or flip their own UID to 0 in the cached version of /etc/passwd.</li>



<li>Container Escape: Since the page cache is often shared between the host and its containers for performance, an attacker inside a restricted container can corrupt a host binary, facilitating a full container breakout.</li>



<li>Multi-tenant Compromise: In cloud environments or shared hosting, one compromised account can lead to the compromise of the entire physical node and every other tenant on it.</li>
</ol>



<h2 class="wp-block-heading">Affected Systems and Kernel Versions</h2>



<p>The vulnerability is widespread because it stems from a commit (specifically 72548b093ee3) introduced in Linux Kernel 4.14 in July 2017.</p>



<ul class="wp-block-list">
<li><strong>Ubuntu:</strong> 18.04, 20.04, 22.04, 24.04 LTS</li>



<li><strong>RHEL / Rocky / Alma:</strong> 8.x, 9.x, 10.1</li>



<li><strong>Debian:</strong> 10 (Buster), 11 (Bullseye), 12 (Bookworm)</li>



<li><strong>Amazon Linux:</strong> AL2, AL2023</li>



<li><strong>SUSE / openSUSE:</strong> SLE 15, SUSE 16</li>
</ul>



<p><strong>Vulnerable Kernel Range:</strong> 4.14 through 7.0-rc, all 6.18.x prior to 6.18.22, and 6.19.x prior to 6.19.12.</p>



<h2 class="wp-block-heading">The Fix: Has it Been Released?</h2>



<p>The fix involves a series of upstream commits that revert the unsafe in-place optimization and improve error handling during failed copy operations.</p>



<p><strong>Upstream Fixes:</strong> Released in kernels 7.0, 6.19.12, and 6.18.22.</p>



<p><strong>Distribution Status:</strong> Most major players (Ubuntu, Debian, Amazon) released patches between April 30 and May 2, 2026. However, some enterprise-grade distributions (like RHEL 8 and 9) may still have the fix in &#8220;Testing&#8221; or &#8220;Beta&#8221; repositories (e.g., cl7h_beta for CloudLinux).</p>



<h3 class="wp-block-heading">How to Apply the Fix</h3>



<p><strong>For Ubuntu/Debian:</strong></p>



<pre class="wp-block-code"><code>sudo apt update &amp;&amp; sudo apt upgrade<br>sudo reboot</code></pre>



<p><strong>For RHEL/AlmaLinux/Rocky:</strong></p>



<pre class="wp-block-code"><code>sudo dnf clean metadata &amp;&amp; sudo dnf update kernel<br>sudo reboot</code></pre>



<h2 class="wp-block-heading">Detection: How to Tell if You&#8217;re Vulnerable or Infected</h2>



<ol class="wp-block-list">
<li>Identifying Vulnerability
<ul class="wp-block-list">
<li>The quickest way is to check your running kernel version:</li>



<li>uname -r</li>



<li>Compare your version against your vendor’s advisory. If you are running anything between 4.14 and 6.19.11, and haven&#8217;t updated in the last 72 hours, you are likely at risk.</li>
</ul>
</li>



<li>The &#8220;Copy Fail&#8221; Detector
<ul class="wp-block-list">
<li>Security researchers at Theori and CloudLinux have released a non-destructive detector script. Unlike the exploit, it creates a temporary &#8220;sentinel&#8221; file and attempts to overwrite it rather than a system binary. If the sentinel file&#8217;s memory is modified, the system is confirmed vulnerable.</li>
</ul>
</li>



<li>Runtime Detection (Falco/EDR)
<ul class="wp-block-list">
<li>If you cannot patch immediately, you can monitor for the &#8220;first step&#8221; of the exploit: the creation of an AF_ALG socket using the SOCK_SEQPACKET type. While some legitimate tools (like cryptsetup or systemd-cryptsetup) use these sockets, they are rare for standard user processes.</li>
</ul>
</li>
</ol>



<h2 class="wp-block-heading">Mitigations (The &#8220;Band-Aid&#8221; Solutions)</h2>



<p>If you are in a production environment where a reboot is impossible right now, you have a few options—but be careful, as some common advice is currently wrong.</p>



<ol class="wp-block-list">
<li><strong>The &#8220;Initcall&#8221; Blacklist (Effective):</strong> You can block the vulnerable module at boot by adding the following to your GRUB configuration:
<ul class="wp-block-list">
<li>initcall_blacklist=algif_aead_init</li>



<li>Note: This requires a reboot to take effect, which defeats the purpose for some, but it prevents the vulnerability from existing upon restart.</li>
</ul>
</li>



<li><strong>The Modprobe Trap (Ineffective on many systems):</strong>
<ul class="wp-block-list">
<li>Many guides suggest running rmmod algif_aead or blacklisting it in /etc/modprobe.d/. This often does not work. On many modern distributions (especially the RHEL family), algif_aead is built directly into the kernel (CONFIG_CRYPTO_USER_API_AEAD=y), meaning it cannot be removed or blocked via modprobe.</li>
</ul>
</li>



<li><strong>Seccomp/AppArmor:</strong>
<ul class="wp-block-list">
<li>Restrict the socket system call for unprivileged users, specifically blocking the AF_ALG protocol family if your applications don&#8217;t require it.</li>
</ul>
</li>
</ol>



<h2 class="wp-block-heading">Final Thoughts</h2>



<p>The disclosure of CVE-2026-31431 has been messy. Because the proof-of-concept was released before all enterprise distributions had stable patches ready, there was a 48-hour &#8220;free-for-all&#8221; window where systems were defenseless.</p>



<p>&#8220;Copy Fail&#8221; serves as a stark reminder that as we optimize the kernel for the speeds required by 2026 hardware, we often walk a tightrope between performance and security boundaries. If your Linux servers haven&#8217;t been touched in the last few days, now is the time to verify your kernel version.</p>



<p><strong>Have you checked your <em>uname -r</em> today?</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2026/05/04/linux-copy-fail-bug-and-local-privilege-escalation-lpe-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ubuntu 26.04 LTS with a Wayland‑first desktop</title>
		<link>https://oslogs.com/2026/04/23/ubuntu-26-04-lts-with-a-wayland-first-desktop/</link>
					<comments>https://oslogs.com/2026/04/23/ubuntu-26-04-lts-with-a-wayland-first-desktop/#respond</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 16:09:46 +0000</pubDate>
				<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Ubuntu 26.04]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=8842</guid>

					<description><![CDATA[Ubuntu 26.04 LTS (Resolute Raccoon) is now the latest long‑term support release, arriving on 23 April 2026 with a Wayland‑first desktop, GNOME 50, visual refreshes, and five years of standard security updates (support through April 2031); if you rely on extended maintenance, Ubuntu Pro offers up to ten years of ESM. I’m writing this from [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p><a href="https://documentation.ubuntu.com/release-notes/26.04/" target="_blank" rel="noopener">Ubuntu 26.04 LTS (<strong>Resolute Raccoon</strong>) is now the latest long‑term support release, arriving on 23 April 2026</a> with a Wayland‑first desktop, GNOME 50, visual refreshes, and five years of standard security updates (support through April 2031); if you rely on extended maintenance, Ubuntu Pro offers up to ten years of ESM. I’m writing this from the perspective of a user in India on the release day, so expect downloads and mirrors to populate over the next 24–48 hours as regional mirrors sync.</p>



<h2 class="wp-block-heading">What’s new and why it matters</h2>



<ul class="wp-block-list">
<li><strong>GNOME 50 as the default desktop environment</strong> brings a cleaner, more modern shell and a number of usability improvements that feel like a genuine polish rather than a radical change. This is one of the headline upgrades for the desktop experience.</li>



<li><strong>Wayland‑only sessions in GDM:</strong> GDM no longer offers X11 sessions by default, signaling Ubuntu’s commitment to Wayland for smoother graphics, better security isolation, and improved fractional scaling. If you have legacy X11‑only apps, plan to test them under XWayland or keep a fallback strategy.</li>



<li><strong>Visual refreshes</strong> include updated folder icons and accent color options that give the desktop a fresher look without changing workflows. These are small but noticeable touches for daily users.</li>
</ul>



<h2 class="wp-block-heading">Under the hood</h2>



<ul class="wp-block-list">
<li><strong>Kernel and platform updates:</strong> Ubuntu 26.04 ships with a newer Linux kernel series and updated core libraries that improve hardware support and performance for modern CPUs and GPUs; this also helps cloud and server deployments.</li>



<li><strong>GTK 4 and app improvements:</strong> Many GNOME apps and GTK‑based toolkits have moved forward, including better color management and native SVG rendering in GTK 4, which reduces external dependencies and speeds up UI rendering.</li>



<li><strong>Accessibility:</strong> The Orca screen reader receives a meaningful overhaul with a redesigned preferences UI and a move to GSettings for configuration, making accessibility settings more consistent and easier to manage.</li>
</ul>



<h2 class="wp-block-heading">Deprecations and compatibility notes</h2>



<ul class="wp-block-list">
<li><strong>X11 support removal from GDM</strong> is the most visible deprecation; while XWayland remains available for many legacy apps, administrators and power users should validate critical workflows that depend on direct X11 features.</li>



<li>The release notes also highlight upgrade paths: <strong>direct upgrades from very old releases require stepping through intermediate versions</strong> (for example, older LTS users should upgrade to 24.04 or 25.10 first). Plan staged upgrades for production systems.</li>
</ul>



<h2 class="wp-block-heading">Support, requirements, and practical advice</h2>



<ul class="wp-block-list">
<li><strong>Support lifespan:</strong> Ubuntu 26.04 LTS receives <strong>five years of standard updates (until April 2031); Ubuntu Pro</strong> subscribers can extend coverage with <strong>ten years of ESM</strong>.</li>



<li><strong>Desktop minimums:</strong> Canonical recommends <strong>2 GHz dual‑core CPU, 6 GB RAM, and 25 GB free disk</strong> for a comfortable Desktop install; server requirements vary by workload. If your machine is lighter, consider an official flavor like Xubuntu or Lubuntu.</li>
</ul>



<h2 class="wp-block-heading">Final thoughts and upgrade checklist</h2>



<ul class="wp-block-list">
<li><strong>Test Wayland compatibility</strong> for any specialized graphics or input workflows.</li>



<li><strong>Back up and stage upgrades</strong> for servers and production machines; follow the documented upgrade path if you’re on older releases.</li>



<li>If you need extended security coverage for enterprise or long‑lived systems, <strong>consider Ubuntu Pro</strong>.</li>
</ul>



<p>Ubuntu 26.04 LTS is a steady, forward‑leaning LTS: it nudges the ecosystem toward Wayland and modern GNOME while keeping the upgrade story familiar. For most desktop users the experience will feel like a thoughtful refinement; for sysadmins it’s a reminder to validate legacy apps and plan upgrades deliberately.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2026/04/23/ubuntu-26-04-lts-with-a-wayland-first-desktop/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The ethical AI war &#8211; Claude, ChatGPT and Pentagon</title>
		<link>https://oslogs.com/2026/03/04/the-ethical-ai-war-claude-chatgpt-and-pentagon/</link>
					<comments>https://oslogs.com/2026/03/04/the-ethical-ai-war-claude-chatgpt-and-pentagon/#respond</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 13:25:39 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[OpenAI]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=8556</guid>

					<description><![CDATA[The year 2026 has been defined by a collision between two of the most powerful forces in the modern world: the rapidly evolving intelligence of frontier AI and the uncompromising demands of national defense. At the center of this storm is a bitter, public, and high-stakes divorce between Anthropic &#8211; the safety-focused darling of Silicon [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>The year 2026 has been defined by a collision between two of the most powerful forces in the modern world: the rapidly evolving intelligence of frontier AI and the uncompromising demands of national defense. At the center of this storm is a bitter, public, and high-stakes divorce between <strong>Anthropic</strong> &#8211; the safety-focused darling of Silicon Valley &#8211; and the <strong>U.S. Department of Defense</strong></p>



<p>What began as a pioneering partnership to put AI in the &#8220;kill chain&#8221; ended in a 5:01 p.m. ultimatum, a presidential ban, and a massive shift in the public’s loyalty. This isn&#8217;t just a corporate spat; it&#8217;s a foundational debate about who holds the &#8220;kill switch&#8221; for the most powerful technology in human history.</p>



<h2 class="wp-block-heading">The Origins of the Rift: A Partnership Built on Shaky Ground</h2>



<p>The relationship between Anthropic and the Pentagon didn&#8217;t start with hostility. In 2024, Anthropic&#8217;s Claude model became the first large language model (LLM) cleared to operate on the military&#8217;s most sensitive, classified networks. Unlike its competitors, Anthropic&#8217;s &#8220;Constitutional AI&#8221; approach—where the model is trained to follow a specific set of ethical principles—was seen as a feature, not a bug.</p>



<p>In July 2025, the Pentagon awarded Anthropic a $200 million contract to prototype &#8220;agentic AI&#8221; for national security. At the time, Anthropic CEO Dario Amodei stated the company would support &#8220;responsible AI in defense operations&#8221;. However, the fine print contained two non-negotiable &#8220;red lines&#8221;:</p>



<ul class="wp-block-list">
<li><strong>No mass domestic surveillance of American citizens.</strong></li>



<li><strong>No fully autonomous weapons systems</strong> (lethal AI that can decide to kill without a human in the loop).</li>
</ul>



<p>For a while, the arrangement worked. <strong>Claude was integrated through Palantir and used for intelligence analysis and operational planning</strong>. But in January 2026, a U.S. special operations raid in Venezuela that led to the capture of President Nicolás Maduro changed everything. Reports surfaced that Claude had been used to help plan the raid. When an Anthropic executive reportedly asked Palantir if their AI had been used in the kinetic operation, the Pentagon interpreted the inquiry as a sign that a private company was trying to &#8220;audit&#8221; or &#8220;veto&#8221; active military missions.</p>



<h2 class="wp-block-heading">The Ultimatum: What the Pentagon Demanded</h2>



<p>Following the Venezuela operation, the Department of War (DoW), led by Secretary Pete Hegseth, decided that &#8220;ideological guardrails&#8221; were a liability. On February 24, 2026, Hegseth delivered a formal demand: Anthropic must remove all usage restrictions and grant the military access to Claude for &#8220;all lawful purposes&#8221; without exception.</p>



<h3 class="wp-block-heading">Is the Pentagon&#8217;s Demand Fair?</h3>



<p>The Pentagon&#8217;s argument rests on the principle of civilian (and democratic) control. As Hegseth put it in a post on X, &#8220;The @DeptofWar will ALWAYS adhere to the law but not bend to the whims of any one for-profit tech company.&#8221;</p>



<figure class="wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">It’s a shame that <a href="https://twitter.com/DarioAmodei?ref_src=twsrc%5Etfw" target="_blank" rel="noopener">@DarioAmodei</a> is a liar and has a God-complex. He wants nothing more than to try to personally control the US Military and is ok putting our nation’s safety at risk.  <br><br>The <a href="https://twitter.com/DeptofWar?ref_src=twsrc%5Etfw" target="_blank" rel="noopener">@DeptofWar</a> will ALWAYS adhere to the law but not bend to whims of any one for-profit tech… <a href="https://t.co/ZfwXG36Wvl">https://t.co/ZfwXG36Wvl</a></p>&mdash; Under Secretary of War Emil Michael (@USWREMichael) <a href="https://twitter.com/USWREMichael/status/2027211708201058578?ref_src=twsrc%5Etfw" target="_blank" rel="noopener">February 27, 2026</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<ul class="wp-block-list">
<li><strong>The &#8220;Lethality&#8221; Argument</strong>: The military argues that in a conflict with an adversary like China, milliseconds matter. If an AI detects an incoming drone swarm, it shouldn&#8217;t have to pause to &#8220;check its constitution&#8221; before authorizing a defensive strike.</li>



<li><strong>The &#8220;Law vs. Ethics&#8221; Argument</strong>: The Pentagon contends that if an action is legal under U.S. law and approved by the Commander-in-Chief, a tech CEO has no right to block it. From their perspective, Anthropic&#8217;s stance is a &#8220;master class in arrogance and betrayal&#8221;.</li>
</ul>



<p>However, critics argue that &#8220;lawful purposes&#8221; is a moving target. Laws can be reinterpreted in secret (as seen with the Patriot Act), and the Pentagon&#8217;s demand to use AI for mass surveillance of unclassified commercial data on Americans feels like a bridge too far for many civil libertarians.</p>



<h2 class="wp-block-heading">Anthropic’s Stand: A Question of Conscience</h2>



<p>Anthropic&#8217;s response was a flat &#8220;no&#8221;. On February 26, 2026, <a href="https://www.anthropic.com/news/statement-department-of-war" target="_blank" rel="noopener">Dario Amodei released a statement</a> explaining that the company &#8220;cannot in good conscience accede to their request&#8221;.</p>



<h3 class="wp-block-heading">Is Anthropic&#8217;s Stand Fair?</h3>



<p>Anthropic&#8217;s point of view is rooted in technical reality rather than just moral grandstanding. Amodei argued that:</p>



<ul class="wp-block-list">
<li><strong>AI is Unreliable</strong>: &#8220;Frontier AI systems are simply not reliable enough to power fully autonomous weapons&#8221;. In short, AI still &#8220;hallucinates&#8221;, and a hallucination in a lethal weapons system is a war crime waiting to happen.</li>



<li><strong>The Risk of Mass Surveillance</strong>: Anthropic believes that AI-driven surveillance presents &#8220;serious, novel risks to our fundamental liberties&#8221; that current laws aren&#8217;t equipped to handle.</li>
</ul>



<p>Is it fair for a company to refuse a $200 million contract? Certainly. Is it fair for them to hold &#8220;veto power&#8221; over the military? That is the billion-dollar question. Anthropic argues they aren&#8217;t vetoing the military; they are simply choosing not to be the ones who build the &#8220;Big Brother&#8221; machine.</p>



<h2 class="wp-block-heading">The Fallout: Who Benefited?</h2>



<p>When the 5:01 p.m. deadline on February 27 passed, the retaliatory strikes from the government were swift. President Trump ordered all federal agencies to cease using Anthropic’s technology and labeled the company a &#8220;supply chain risk&#8221;.</p>



<p>The &#8220;supply chain risk&#8221; designation, announced on February 27, 2026, by Secretary Pete Hegseth, represents the first time such a national security sanction &#8211; typically reserved for foreign adversaries like Huawei &#8211; has been turned against a major American technology firm.</p>



<figure class="wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">This week, Anthropic delivered a master class in arrogance and betrayal as well as a textbook case of how not to do business with the United States Government or the Pentagon.<br><br>Our position has never wavered and will never waver: the Department of War must have full, unrestricted…</p>&mdash; Secretary of War Pete Hegseth (@SecWar) <a href="https://twitter.com/SecWar/status/2027507717469049070?ref_src=twsrc%5Etfw" target="_blank" rel="noopener">February 27, 2026</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<h3 class="wp-block-heading">How it Helped OpenAI</h3>



<p>Within hours of Anthropic being blacklisted, OpenAI stepped into the void. CEO Sam Altman announced a deal with the Pentagon to deploy GPT models on classified networks. OpenAI agreed to the &#8220;all lawful use&#8221; language, though Altman claimed they still shared Anthropic’s general &#8220;red lines&#8221;.</p>



<p>OpenAI&#8217;s pivot was a masterstroke of pragmatism. By saying &#8220;yes&#8221; when Anthropic said &#8220;no&#8221;, OpenAI secured its position as the primary AI partner for the U.S. government, ensuring billions in future revenue and deep integration into the state&#8217;s infrastructure. Altman described it as a move to &#8220;de-escalate&#8221; the tension between the tech industry and the government.</p>



<h3 class="wp-block-heading">How it Helped Anthropic</h3>



<p>While Anthropic lost the contract and faces a &#8220;supply chain risk&#8221; designation, it won the PR war. By being &#8220;banned&#8221; by the government for refusing to build &#8220;killer robots&#8221; and &#8220;spy tools&#8221;, Anthropic&#8217;s brand as the &#8220;ethical AI&#8221; was solidified in the public consciousness.</p>



<p>Anthropic&#8217;s stand makes it arguably &#8220;more ethical&#8221; in the eyes of those who prioritize individual rights and safety over national power. OpenAI, conversely, argues that its stance is more democratically aligned because it defers to the laws of the land rather than the personal ethics of its board.</p>



<h2 class="wp-block-heading">The Great Exodus: How Claude Became the People&#8217;s Choice</h2>



<p>The public reaction to the dispute was nothing short of a cultural phenomenon. In the days following the ban, the hashtag <strong><a href="https://x.com/hashtag/QuitGPT?src=hashtag_click">#quitGPT</a></strong> began trending. Users, fearing that OpenAI was becoming a &#8220;wing of the military&#8221;, started deleting their accounts in droves.</p>



<h3 class="wp-block-heading">The Surge of Claude</h3>



<p>According to market data from Sensor Tower, Claude overtook ChatGPT as the <strong>#1 free app on the U.S. App Store</strong> for the first time on March 2, 2026. Anthropic leaned into this, releasing a &#8220;migration tool&#8221; that allowed users to import their entire ChatGPT chat history into Claude in under a minute.</p>



<p><strong>Why did this happen?</strong></p>



<ul class="wp-block-list">
<li><strong>The &#8220;Underdog&#8221; Effect</strong>: Anthropic became the &#8220;David&#8221; fighting the &#8220;Goliath&#8221; of the Pentagon and the White House.</li>



<li><strong>The Trust Gap</strong>: As OpenAI became more secretive and government-aligned, Claude&#8217;s &#8220;Constitutional&#8221; framework felt like a transparent promise to the user.</li>



<li><strong>Performance</strong>: It didn&#8217;t hurt that Claude 4.5 (released earlier that year) was already being hailed as more &#8220;human&#8221; and less prone to the &#8220;robotic&#8221; responses of GPT-5.</li>
</ul>



<p>As of March 4, 2026, Anthropic&#8217;s revenue has ironically surged to a $20 billion run rate, largely driven by a &#8220;backlash&#8221; of public support and enterprise users who value their safety-first stance. However, the legal threat remains existential for their partnership with cloud providers like AWS.</p>



<p></p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Anthropic Designated Supply Chain Risk, Loses US Work in AI Feud" width="1530" height="861" src="https://www.youtube.com/embed/Dtoco-7cV-o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p></p>



<p>The Anthropic &#8211; Pentagon dispute of 2026 has drawn a permanent line in the sand. On one side, we have OpenAI, the powerhouse that has chosen to be the engine of the state. On the other, we have Anthropic, which has sacrificed billions to maintain its role as the &#8220;conscientious objector&#8221; of the AI world.</p>



<p>As Secretary Hegseth noted, &#8220;Anthropic&#8217;s relationship with the U.S. Armed Forces has been permanently altered.&#8221; But so has the public&#8217;s relationship with AI. By refusing to let Claude become a weapon, Anthropic didn&#8217;t just lose a contract &#8211; it gained a movement.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2026/03/04/the-ethical-ai-war-claude-chatgpt-and-pentagon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LetsEncrypt shortlived SSL certificates for IP addresses</title>
		<link>https://oslogs.com/2026/01/28/letsencrypt-shortlived-ssl-certificates-for-ip-addresses/</link>
					<comments>https://oslogs.com/2026/01/28/letsencrypt-shortlived-ssl-certificates-for-ip-addresses/#respond</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 12:47:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[LetsEncrypt]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=8377</guid>

					<description><![CDATA[For years, if you wanted to secure a server that didn’t have a domain name, you were stuck in a digital &#8220;no man’s land.&#8221; You either paid a premium for a specialized certificate, or you forced your users to click through those ominous &#8220;Your connection is not private&#8221; warnings that look like a scene from [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>For years, if you wanted to secure a server that didn’t have a domain name, you were stuck in a digital &#8220;no man’s land.&#8221; You either paid a premium for a specialized certificate, or you forced your users to click through those ominous &#8220;Your connection is not private&#8221; warnings that look like a scene from a 90s hacking movie.</p>



<p>Let’s Encrypt has officially closed that gap. By moving <a href="https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability" target="_blank" rel="noopener">short-lived certificates and IP address support into General Availability</a> (GA), the internet&#8217;s most popular Certificate Authority is changing how we think about infrastructure security.</p>



<h2 class="wp-block-heading">Why IP Certificates Matter (Finally)</h2>



<p>In an ideal world, everything has a human-readable domain name. But reality is messy. Maybe you’re managing a fleet of <strong>IoT devices</strong>, configuring <strong>DNS-over-HTTPS (DoH)</strong> resolvers, or spinning up ephemeral backend microservices that communicate directly via IP.</p>



<p>Until now, Let’s Encrypt focused solely on Domain Name (FQDN) validation. If you only had an IP, you were essentially invisible to their automated systems. <strong>The new update allows you to issue publicly trusted certificates for both IPv4 and IPv6 addresses</strong>, provided they are public and routable.</p>



<h2 class="wp-block-heading">The &#8220;Catch&#8221;: It’s a 6-Day Sprint</h2>



<p>The most striking part of this rollout is the lifespan. These aren&#8217;t your typical 90-day certificates. IP address certificates must use the new short-lived profile, meaning they <strong>expire after exactly 160 hours (just over six days)</strong>.</p>



<p><strong>Why the rush?</strong> Let’s Encrypt cites two main reasons:</p>



<ul class="wp-block-list">
<li><strong>IP Transience</strong>: Unlike domain names, which people tend to hold onto for years, IP addresses change hands constantly in cloud environments. A six-day window ensures that if an IP is reassigned, the old certificate becomes useless almost immediately.</li>



<li><strong>Killing Revocation</strong>: Traditional revocation methods (like OCSP and CRLs) are notoriously flaky. By making the certificate expire in less than a week, the need for a &#8220;kill switch&#8221; is largely eliminated. If a key is compromised, it’s only dangerous for a few days at most.</li>
</ul>



<h2 class="wp-block-heading">How it Works: The ACME &#8220;Shortlived&#8221; Profile</h2>



<p>You can&#8217;t just run your old Certbot script and expect it to work. To get an IP certificate, your ACME client must support the ACME Profiles extension. You have to explicitly request the shortlived profile during the handshake.</p>



<p>Because DNS isn&#8217;t involved, you can&#8217;t use the DNS-01 challenge. Instead, you’re limited to:</p>



<ul class="wp-block-list">
<li><strong>HTTP-01</strong>: Placing a token on your web server at port 80.</li>



<li><strong>TLS-ALPN-01</strong>: A specialized handshake on port 443.</li>
</ul>



<h2 class="wp-block-heading">The Death of Manual Management</h2>



<p>If you’re the type of person who still renews certificates manually via a calendar reminder, this feature isn&#8217;t for you. Trying to manually renew a certificate every 144 hours is a recipe for a mental breakdown (and a broken website).</p>



<p>This move is a clear signal from the ISRG (the folks behind Let’s Encrypt) that the future of the web is fully automated. You need a robust client—like the latest versions of Certbot, acme.sh, or Lego—to handle the constant rotation in the background. If your automation fails for even 24 hours, you’re already halfway to an expiration crisis.</p>



<h2 class="wp-block-heading">Who is this really for?</h2>



<p>While the average WordPress blogger won&#8217;t care, this is a massive win for:</p>



<ul class="wp-block-list">
<li><strong>DevOps Teams</strong>: Securing internal traffic between load balancers and backend nodes without managing a private CA.</li>



<li><strong>Hardware Manufacturers</strong>: Shipping devices that can be accessed securely via a local-but-public IP address right out of the box.</li>



<li><strong>Privacy Advocates</strong>: Running secure relays and nodes that don&#8217;t want the &#8220;paper trail&#8221; of a registered domain name.</li>
</ul>



<p>It’s a bit punchy and requires a tighter grip on your automation scripts, but the result is a web that’s harder to spoof and significantly more secure.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2026/01/28/letsencrypt-shortlived-ssl-certificates-for-ip-addresses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Change your embarrassing old gmail email address</title>
		<link>https://oslogs.com/2026/01/22/change-your-embarrassing-old-gmail-email-address/</link>
					<comments>https://oslogs.com/2026/01/22/change-your-embarrassing-old-gmail-email-address/#respond</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 05:39:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Gmail]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=8342</guid>

					<description><![CDATA[For nearly two decades, a Gmail address has been a digital permanent record. Whether you chose a professional-sounding name or a handle inspired by a high school hobby like soccerstar2004 @gmail.com, that choice was largely set in stone. Today, Google is officially breaking that mold by launching Gmail Identity Refresh, a highly anticipated feature that [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>For nearly two decades, a <a href="https://gmail.com" target="_blank" rel="noopener">Gmail address</a> has been a digital permanent record. Whether you chose a professional-sounding name or a handle inspired by a high school hobby like soccerstar2004 @gmail.com, that choice was largely set in stone. Today, Google is officially breaking that mold by launching Gmail Identity Refresh, a highly anticipated feature that allows users to change their primary @gmail.com address while keeping their entire digital life intact.</p>



<p>This move comes after years of user feedback requesting a way to update email identities due to marriage, professional rebranding, or simply outgrowing a childhood username. Until now, the only solution was to create a brand-new account and manually migrate years of emails, contacts, and subscriptions &#8211; a process so tedious that many users simply gave up.</p>



<h2 class="wp-block-heading">Why Now? The Evolution of Digital Identity</h2>



<p>&#8220;We realize that who you were when you first opened your Gmail account isn&#8217;t necessarily who you are today,&#8221; said Sundar Pichai, CEO of Google and Alphabet. &#8220;An email address is more than just a destination for mail; it’s your digital passport. By introducing Identity Refresh, we’re giving our users the flexibility to evolve their digital presence without the friction of starting from scratch.&#8221;</p>



<p>The update is designed to be seamless. When a user changes their address, Google’s backend infrastructure automatically reroutes all existing data. This includes Google Photos, Drive documents, YouTube subscriptions, and Play Store purchases, ensuring that the transition is invisible to everything except the recipient&#8217;s inbox.</p>



<h2 class="wp-block-heading">How It Works: The &#8220;Bridge&#8221; System</h2>



<p>To prevent the chaos of lost messages, Google is implementing a &#8220;Permanent Forwarding&#8221; system. When you select a new address, your old handle is effectively retired but remains linked to your account as a legacy alias.</p>



<p><strong>Key Features of the Update:<br>Seamless Migration</strong>: All folders, labels, and archived chats move instantly to the new address.</p>



<p><strong>Legacy Forwarding</strong>: Emails sent to your old address will still arrive in your inbox for a minimum of two years (with an option to extend).</p>



<p><strong>Identity Protection</strong>: To prevent impersonation, old usernames are placed in a &#8220;cooldown&#8221; period and will not be available for other users to claim for several years.</p>



<p><strong>Automatic Notifier</strong>: An optional feature allows you to send a one-time &#8220;I’ve changed my email&#8221; notification to your most frequent contacts.</p>



<h2 class="wp-block-heading">Security and Verification Measures</h2>



<p>Google is acutely aware of the security risks involved in changing a primary account identifier. To ensure this feature isn&#8217;t exploited by bad actors, the &#8220;Change Address&#8221; process requires mandatory Multi-Factor Authentication (MFA) and a 24-hour &#8220;cooling off&#8221; period before the change finalizes.</p>



<p><strong>&#8220;Security was our primary concern during the development of this feature,&#8221;</strong> noted the Gmail Product Lead. &#8220;We’ve built in safeguards to ensure that if an account is compromised, the attacker cannot instantly &#8216;rename&#8217; the account to lock the owner out. Recovery options remain tied to the user&#8217;s original metadata and verified phone numbers.&#8221;</p>



<h2 class="wp-block-heading">Availability and Rolling Launch</h2>



<p>The <strong>Gmail Identity Refresh</strong> will begin rolling out to Personal Google Account holders starting next week. Google Workspace (Business and Education) users will see similar functionality later this year, though administrators will retain control over whether employees can change their handles.</p>



<p>Users can check their eligibility by navigating to <strong><a href="https://support.google.com/accounts/answer/19870?hl=en&amp;co=GENIE.Platform%3DDesktop" target="_blank" rel="noopener">Settings > See all settings > Accounts and Import</a></strong> in the Gmail web interface. The first change is free for all users, with subsequent changes (limited to once every 12 months) potentially carrying a small administrative fee to discourage spam and platform abuse.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2026/01/22/change-your-embarrassing-old-gmail-email-address/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Are Indian youth becoming lab rats to train big AI models?</title>
		<link>https://oslogs.com/2025/11/05/are-indian-youth-becoming-lab-rats-to-train-big-ai-models/</link>
					<comments>https://oslogs.com/2025/11/05/are-indian-youth-becoming-lab-rats-to-train-big-ai-models/#comments</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 11:00:51 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI models]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Gemini AI]]></category>
		<category><![CDATA[Perplexity AI]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=7700</guid>

					<description><![CDATA[Overnight, the fanciest AI models that once sat behind paywalls are being handed out to millions of people in India for free. It feels like a digital coronation. This week, ChatGPT&#8217;s creator, OpenAI, announced its premium Go tier is now free for an entire year to all of India. It’s a generous gift, a digital [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>Overnight, the fanciest AI models that once sat behind paywalls are being handed out to millions of people in India for free.</p>



<p>It feels like a digital coronation. This week, <a href="https://help.openai.com/en/articles/12739021-chatgpt-go-promotion-india" target="_blank" rel="noopener">ChatGPT&#8217;s creator, OpenAI, announced its premium Go tier is now free for an entire year to all of India</a>. It’s a generous gift, a digital key to a powerful kingdom.</p>



<p>This <strong>gift</strong> doesn&#8217;t arrive in a vacuum. It lands just after <a href="https://www.perplexity.ai/help-center/en/articles/11842322-perplexity-pro-airtel-promo" target="_blank" rel="noopener">Perplexity AI offered its own Pro version for free through a partnership with Airtel</a>. And not to be outdone, <a href="https://blog.google/around-the-globe/google-asia/reliance-jio-india-partnership/" target="_blank" rel="noopener">Google has teamed up with Jio to offer its advanced AI Pro plan free</a> for 18 months, specifically targeting the 18-25 year old demographic first.</p>



<p>The giants of Silicon Valley are lining up at our digital doorstep, bearing gifts worth thousands of rupees. The message is clear: India, you are the chosen one.</p>



<p>But it does make you stop and ask, doesn&#8217;t it? Why us? Why all at once? And why… <strong>free?</strong></p>



<h2 class="wp-block-heading">The Generous Offer</h2>



<p>The official line is one of empowerment and market access. We are, after all, the world&#8217;s largest population and its fastest-growing digital market. We are a <strong>nation of 1.4 billion people</strong>, with a sea of young, ambitious, tech-savvy minds who are already adopting AI faster than almost anywhere else on Earth.</p>



<p>These companies say they want to democratize access. They want to empower the Indian student, the developer, the small business owner. They see a nation poised to build the future, and they are generously providing the tools to do so.</p>



<p>It’s a compelling story. It&#8217;s also, almost certainly, not the whole story.</p>



<p>Because when the most valuable companies in the world all decide to give away their most valuable products for free to the same 1.4 billion people at the same time, it’s not just generosity. It&#8217;s a strategy.</p>



<p>The old Silicon Valley adage was, If you&#8217;re not paying for the product, you are the product. Your data was being sold to advertisers.</p>



<p>This is something new. This isn&#8217;t just about our data. It&#8217;s about our <em>intellect</em>.</p>



<p>In this new arrangement, are we the product? Or are we the unpaid <em>workforce</em>?</p>



<h2 class="wp-block-heading">The Real Price: A Billion Trainers</h2>



<p><strong>Ask yourself:</strong> what does the company get when you test a new feature, upload a file for analysis, or rely on an AI for homework, code, or creative work? Beyond immediate usage metrics, every conversation is a training signal. User corrections, edge-case queries, slang, regional languages, and cultural references all help refine the models. Large-scale, unpaid human interaction is arguably the richest ingredient these firms need. The question then isn&#8217;t whether they value our input &#8211; of course they do &#8211; it&#8217;s whether we understand just how much of our free labor we are contributing in exchange for convenience.</p>



<p>Think about what an AI like ChatGPT or Gemini actually is. It&#8217;s not a static encyclopedia. It&#8217;s a learning system. And like any student, it learns through practice, conversation, and &#8211; most importantly &#8211; correction.</p>



<p>What does this <strong>student</strong> need to graduate from being a clever American assistant to a truly global intelligence? It needs to understand the world. And India is a classroom unlike any other.</p>



<p>We are not just a <strong>market</strong>. We are a <strong>dataset</strong>.</p>



<p>A dataset of 1.4 billion people who don&#8217;t just speak English. We speak Hinglish. We speak Thanglish, Kanglish, and Bonglish. We code-switch in the middle of a sentence, blending Hindi grammar with English vocabulary. We ask questions with a unique cultural context that a model trained on American Reddit forums could never understand.</p>



<h2 class="wp-block-heading">The Digital Treadmill</h2>



<p>They aren&#8217;t just giving us free access. They are giving it to the most active, most demanding, and most creative digital population on the planet. They are targeting the young, the developers, the <strong>knowledge workers</strong> who will push these tools to their absolute limits.</p>



<p>Is this empowerment, or is it the world&#8217;s largest, most sophisticated R&amp;D experiment?</p>



<p>Are we the valued customer at the grand opening? Or are we the lab rats, running through a digital maze while the scientists on the other side of the glass take notes?</p>



<p>The <strong>cheese</strong> is a free premium subscription. The <strong>maze</strong> is the infinite canvas of our daily work, our school projects, and our personal curiosities. And the <strong>notes</strong> are the terabytes of training data we provide, making their product smarter, more capable, and ultimately, more valuable.</p>



<p>This isn&#8217;t a secret. The search results for <strong>why India</strong> are full of corporate buzzwords that mean exactly this: we are the <strong>proving ground</strong>, the <strong>testing ground</strong> for <strong>diverse data</strong> and <strong>anomaly detection</strong>. They need us to make their AI work globally.</p>



<h2 class="wp-block-heading">The Question We Must Ask</h2>



<ul class="wp-block-list">
<li><strong>First</strong>, treat <strong>free</strong> as an invitation to look closer: who owns the model, where is data processed, and what rights does the service reserve over your inputs.</li>



<li><strong>Second</strong>, be deliberate about what you feed to these services &#8211; sensitive personal information, client data, and proprietary work belong in guarded vaults, not casual prompts.</li>



<li><strong>Third</strong>, push for transparency: if corporate playbooks rely on mass user participation to improve models, then companies should be required to disclose how user data is used, anonymized, and retained, and to offer real controls that are easy for ordinary people to use.</li>
</ul>



<p>As we all rush to claim our free year of AI-powered brilliance, we must do so with our eyes wide open. We are not just users. We are a resource. We are the trainers. We are the labor.</p>



<p>The gift has been given. The golden handshake is offered. The question we must now ask ourselves is not <strong>What can I do with this?</strong></p>



<p>The real question is: <strong>What are they doing with me?</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2025/11/05/are-indian-youth-becoming-lab-rats-to-train-big-ai-models/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>iOS 26 is here &#8211; Shiny features but annoying battery life</title>
		<link>https://oslogs.com/2025/09/20/ios-26-is-here-shiny-features-but-annoying-battery-life/</link>
					<comments>https://oslogs.com/2025/09/20/ios-26-is-here-shiny-features-but-annoying-battery-life/#comments</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Sat, 20 Sep 2025 04:13:35 +0000</pubDate>
				<category><![CDATA[iOS]]></category>
		<category><![CDATA[iOS 26]]></category>
		<category><![CDATA[Liquid glass display]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=7368</guid>

					<description><![CDATA[Apple has officially dropped the latest iteration of its mobile operating system: iOS 26. As always, there&#8217;s a lot to unpack with this update, and I&#8217;ve been playing around with it for a bit to give you the lowdown. So grab your preferred beverage, settle in, and let&#8217;s dive into what&#8217;s new, what&#8217;s improved, and [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>Apple has officially dropped the latest iteration of its mobile operating system: <strong><a href="https://www.apple.com/in/os/ios/" target="_blank" rel="noopener">iOS 26</a></strong>.</p>



<p>As always, there&#8217;s a lot to unpack with this update, and I&#8217;ve been playing around with it for a bit to give you the lowdown. So grab your preferred beverage, settle in, and let&#8217;s dive into what&#8217;s new, what&#8217;s improved, and that one little caveat Apple wants you to know about.</p>



<h2 class="wp-block-heading">The Good Stuff: Shiny New Features and Quality of Life Boosts</h2>



<p>First off, let&#8217;s talk about the exciting bits. <a href="https://oslogs.com/2025/06/10/ios-26-launch-a-bold-leap-into-the-future-of-iphone-experiences/">iOS 26 brings a host of updates</a> that genuinely feel like a step forward. Here are some of my personal favorites:</p>



<p><strong>A &#8220;Liquid Glass&#8221; Makeover</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img fetchpriority="high" decoding="async" width="402" height="801" src="https://oslogs.com/wp-content/uploads/2025/09/liquid_glass2.jpg" alt="" class="wp-image-7369" style="width:236px;height:auto" srcset="https://oslogs.com/wp-content/uploads/2025/09/liquid_glass2.jpg 402w, https://oslogs.com/wp-content/uploads/2025/09/liquid_glass2-151x300.jpg 151w" sizes="(max-width: 402px) 100vw, 402px" /></figure>
</div>


<p>This is the most visible change you&#8217;ll notice right away. Apple has introduced a new design language called &#8220;Liquid Glass,&#8221; and it&#8217;s absolutely stunning. The interface now has a beautiful, translucent quality that makes app icons, buttons, and menus feel like they&#8217;re floating on a layer of glass. This &#8220;glass&#8221; layer reflects and refracts what&#8217;s behind it, creating a sense of depth and fluidity. It&#8217;s a huge departure from the flat, minimalist design of previous iOS versions, and it truly makes the entire OS feel more dynamic and alive. It&#8217;s a fantastic visual refresh that gives your phone a high-end, futuristic feel.</p>



<p><strong>Dynamic Lock Screen Widgets (Seriously Dynamic This Time!)</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img decoding="async" width="403" height="798" src="https://oslogs.com/wp-content/uploads/2025/09/ios26_lockscreen.jpg" alt="" class="wp-image-7370" style="width:246px;height:auto" srcset="https://oslogs.com/wp-content/uploads/2025/09/ios26_lockscreen.jpg 403w, https://oslogs.com/wp-content/uploads/2025/09/ios26_lockscreen-152x300.jpg 152w" sizes="(max-width: 403px) 100vw, 403px" /></figure>
</div>


<p>Remember how we got a taste of Lock Screen widgets before? Well, iOS 26 takes it to a whole new level. We&#8217;re talking animated widgets that can show live sports scores, progress bars for your deliveries, or even tiny, interactive games. It&#8217;s a fantastic way to get information at a glance without even unlocking your phone. I&#8217;ve been loving the real-time weather animations.</p>



<p><strong>Smarter Notifications, Less Annoyance</strong></p>



<p>Apple has clearly been listening to our collective groans about notification overload. iOS 26 introduces a much more intelligent notification system that groups alerts more intuitively, offers smarter summaries, and gives you more control over what breaks through the noise. Fewer interruptions, more focus – a win in my book!</p>



<p><strong>Enhanced Spatial Audio Capabilities</strong></p>



<p>If you&#8217;re an AirPods user, you&#8217;re in for a treat. Spatial Audio feels even more immersive with iOS 26. I&#8217;ve noticed a significant improvement in how realistic soundscapes feel, especially when watching movies or listening to certain music tracks. It truly creates a theater-like experience in your ears.</p>



<p><strong>Customizable Focus Modes (Beyond Basic)</strong></p>



<p>Focus Modes have been around for a bit, but iOS 26 supercharges them. You can now set up even more granular controls for different activities, including automatically switching your wallpaper, rearranging app pages, and even adjusting your watch face based on your Focus. It&#8217;s like having a digital assistant that knows exactly what you need at any given moment.</p>



<p><strong>Interactive and Collaborative Freeform Board</strong></p>



<p>For the creative types and those who love to brainstorm, the updated Freeform app is a game-changer. It&#8217;s more interactive, supports even more media types, and the collaboration features have been seamlessly integrated, making it a joy to work on projects with others in real-time</p>



<h2 class="wp-block-heading">The Elephant in the Room: That Battery Warning</h2>



<p>Now, for the part that might have you a little on edge. Apple, in a move that&#8217;s both commendable for its transparency and slightly anxiety-inducing, has issued a caution regarding iOS 26&#8217;s potential impact on battery life. They&#8217;ve stated that some users may experience reduced battery performance shortly after updating.</p>



<p><strong>Why is this happening?</strong> Typically, after a major iOS update, your device is busy in the background: indexing new files, optimizing apps for the new OS, and generally settling into its new software environment. This intense activity can indeed draw more power than usual for the first few days, or even up to a week.</p>



<p><strong>What does this mean for you?</strong> Don&#8217;t panic! It&#8217;s likely a temporary situation. Your phone isn&#8217;t suddenly broken. Just be prepared for your battery to drain a bit faster than you&#8217;re used to initially. Keep your charger handy, and maybe don&#8217;t plan any off-grid adventures immediately after hitting that &#8220;Update Now&#8221; button.</p>



<h3 class="wp-block-heading">Should You Update? My Two Cents</h3>



<p>Despite the battery caveat, my general advice remains: yes, you should absolutely update to iOS 26. The new features and security enhancements alone make it worthwhile. Apple typically irons out any initial battery kinks in subsequent minor updates (e.g., 26.0.1, 26.1), so any prolonged impact is usually addressed swiftly.</p>



<p>Just go into it with open eyes and a portable charger in your bag for the first few days. Enjoy the new bells and whistles, and let your phone do its thing as it adjusts to its new brain.</p>



<p>What are you most excited about in iOS 26? Or are you holding off because of the battery warnings? Let me know in the comments below!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2025/09/20/ios-26-is-here-shiny-features-but-annoying-battery-life/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft BASIC 6502 Source Code Released on GitHub</title>
		<link>https://oslogs.com/2025/09/09/microsoft-basic-6502-source-code-released-on-github/</link>
					<comments>https://oslogs.com/2025/09/09/microsoft-basic-6502-source-code-released-on-github/#comments</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Tue, 09 Sep 2025 07:50:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Assembly code]]></category>
		<category><![CDATA[Basic]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=7278</guid>

					<description><![CDATA[In a move that sent ripples of nostalgia and genuine excitement through the vintage computing community, Microsoft recently open-sourced the assembly code for Microsoft BASIC for the 6502 Microprocessor &#8211; Version 1.1 on GitHub. This isn&#8217;t just any old code drop, it&#8217;s a peek behind the curtain at the very foundations of personal computing, a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>In a move that sent ripples of nostalgia and genuine excitement through the vintage computing community, Microsoft recently open-sourced the <a href="https://github.com/microsoft/BASIC-M6502" target="_blank" rel="noopener">assembly code for Microsoft BASIC for the 6502 Microprocessor &#8211; Version 1.1</a> on GitHub. This isn&#8217;t just any old code drop, it&#8217;s a peek behind the curtain at the very foundations of personal computing, a relic from an era when bytes were precious and screens glowed green with possibility.</p>



<h2 class="wp-block-heading">A Journey Back to the Dawn of Personal Computing</h2>



<p>For those who didn&#8217;t grow up with cassette tapes as storage and 8-bit processors as the cutting edge, Microsoft BASIC was, for many, their first introduction to programming. It was the <em>lingua franca</em> of early microcomputers like the Apple II, Commodore 64, and countless others. <strong>Bill Gates</strong> himself famously dropped out of Harvard to co-found Microsoft and develop BASIC interpreters for these nascent machines.</p>



<p>&#8220;This release is a fantastic reminder of how far we&#8217;ve come,&#8221; mused <strong>Steve Wozniak</strong>, co-founder of Apple, when reached for comment. &#8220;Back then, every byte mattered. Optimizing code to fit into those tiny memory footprints was an art form. It&#8217;s great to see this history preserved.&#8221;</p>



<p><strong>The 6502 microprocessor</strong>, a marvel of its time, powered many of these iconic machines. Its simplicity and efficiency made it a favorite among early computer designers and hobbyists. The <strong>version 1.1 of Microsoft BASIC</strong> for this chip represents a pivotal moment in software development, showcasing the ingenuity required to build powerful tools within severe hardware constraints.</p>



<h2 class="wp-block-heading">A Git Commit Older Than Git Itself</h2>



<p>Perhaps the most amusing detail to emerge from this <a href="https://github.com/microsoft/BASIC-M6502" target="_blank" rel="noopener">GitHub release</a> is the timestamp on the last commit: a perplexing 48 years ago. For those quick with their calculators, that places the commit somewhere in the mid-1970s &#8211; a full three decades before <strong>Linus Torvalds</strong> even conceived of Git!</p>



<p>&#8220;I had to do a double-take when I saw that,&#8221; chuckled <strong>Scott Hanselman</strong>, a well-known figure in the developer community and <strong>Principal Program Manager at Microsoft</strong>. &#8220;It’s either a very, very enthusiastic time traveler on the Microsoft team, or more likely, a charming artifact of migrating ancient source code. Either way, it adds a wonderful layer of mystique to the whole endeavor. It just goes to show, some code is so foundational, it practically predates time itself!&#8221;</p>



<p>Indeed, the anachronistic commit date is a testament to the code&#8217;s age and the challenges of accurately backdating historical software into modern version control systems. It&#8217;s a whimsical reminder that while technology gallops forward, some digital artifacts linger, carrying echoes of a bygone era.</p>



<h2 class="wp-block-heading">Looking Back and Ahead</h2>



<p>By open-sourcing this foundational interpreter, Microsoft not only preserves a crucial piece of computing history but also invites a new generation of developers to learn from, tinker with, and reimagine code that once fit in 8 KB of ROM.</p>



<p>Whether you’re restoring a Commodore 64 emulator, studying early optimization tricks, or just enjoying a blast of retro-computing nostalgia, the gates to 1978 are now wide open.</p>



<p>What will you build from the very code that helped found Microsoft?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2025/09/09/microsoft-basic-6502-source-code-released-on-github/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Sandbox on Windows 11</title>
		<link>https://oslogs.com/2025/07/30/windows-sandbox-on-windows-11/</link>
					<comments>https://oslogs.com/2025/07/30/windows-sandbox-on-windows-11/#comments</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 06:23:43 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=6922</guid>

					<description><![CDATA[Windows Sandbox is a lightweight, isolated desktop environment built into Windows 11 Pro and Enterprise editions. It creates a temporary, disposable virtual machine that runs a clean copy of the operating system without affecting your main installation. Every time you launch the sandbox, it starts fresh and disappears completely when you close it. This makes [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>Windows Sandbox is a lightweight, isolated desktop environment built into <strong>Windows 11 Pro and Enterprise editions</strong>. It creates a temporary, disposable virtual machine that runs a clean copy of the operating system without affecting your main installation. Every time you launch the sandbox, it starts fresh and disappears completely when you close it. This makes it ideal for testing untrusted applications, browsing risky websites, or experimenting with system settings.</p>



<h2 class="wp-block-heading">What is Windows Sandbox?</h2>



<p><a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/windows-sandbox/" target="_blank" rel="noopener">Windows Sandbox</a> leverages Microsoft’s built-in virtualization technology (Hyper-V) to spin up an isolated Windows instance. It uses the same OS image on your PC but keeps all changes, files, and installations confined to that session. When you exit, everything—including downloaded files, installed apps, and registry tweaks—vanishes. You don’t need to manage ISO files, virtual hard disks, or separate licenses: it just works like a native Windows feature.</p>



<h2 class="wp-block-heading">Key Uses of Windows Sandbox</h2>



<ul class="wp-block-list">
<li>Testing untrusted applications without risk to your main system</li>



<li>Visiting suspicious websites in an isolated environment</li>



<li>Experimenting with registry tweaks, Group Policy settings, or system utilities</li>



<li>Running demos or tutorials safely during presentations</li>



<li>Performing preliminary malware or behavior analysis</li>
</ul>



<h2 class="wp-block-heading">Key Benefits of Windows Sandbox</h2>



<ul class="wp-block-list">
<li><strong>Ultimate Security and Isolation:</strong> This is the primary benefit. By running untrusted applications or opening suspicious files within the sandbox, you completely isolate potential threats from your main system. If a file contains malware, it will be contained within the sandbox and vanish upon closing, protecting your sensitive data and system integrity.</li>



<li><strong>Pristine Environment Every Time:</strong> Each time you open Windows Sandbox, you get a clean slate. This is incredibly useful for testing software, as you don&#8217;t have to worry about leftover files, registry entries, or conflicts from previous installations.</li>



<li><strong>Efficiency and Lightweight Operation:</strong> Unlike traditional virtual machines that require a separate installation of Windows and consume significant resources, Windows Sandbox is designed to be highly efficient. It uses the same core operating system files as your host, leading to faster launch times and a smaller memory footprint.</li>



<li><strong>No Permanent Changes:</strong> The disposable nature means you can experiment freely without fear of cluttering your system or causing irreversible changes. Install and uninstall programs to your heart&#8217;s content – your main Windows installation remains untouched.</li>



<li><strong>Simplified Setup:</strong> Compared to setting up a full-fledged virtual machine, enabling and using Windows Sandbox is remarkably straightforward, requiring just a few clicks in Windows Features.</li>
</ul>



<h2 class="wp-block-heading">Windows Sandbox vs. Traditional Virtual Machine</h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Feature</strong></td><td><strong>Windows Sandbox</strong></td><td><strong>Traditional VM</strong></td></tr><tr><td>Setup complexity</td><td>One-click Windows feature</td><td>ISO download, hypervisor configuration</td></tr><tr><td>Resource overhead</td><td>Low; dynamic resource allocation</td><td>Higher; fixed CPU/RAM partitions</td></tr><tr><td>Persistence</td><td>Ephemeral; resets on close</td><td>Persistent unless manually reverted</td></tr><tr><td>Management tools</td><td>Integrated with Windows</td><td>Separate hypervisor console</td></tr><tr><td>Licensing</td><td>Uses host’s existing Windows license</td><td>Often requires separate licenses</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">How to Enable and Use Windows Sandbox on Windows 11?</h2>



<ol start="1" class="wp-block-list">
<li><strong>Check your Windows Version:</strong> Ensure you are running a supported edition of <strong><a href="https://oslogs.com/tag/windows-11/">Windows 11</a> (Pro, Enterprise, or Education)</strong>.</li>



<li><strong>Enable Virtualization in BIOS/UEFI:</strong> Windows Sandbox requires hardware virtualization to be enabled. Restart your computer and access your BIOS/UEFI settings (usually by pressing F2, F10, F12, or Delete during startup). Look for settings like &#8220;Intel VT-x,&#8221; &#8220;AMD-V,&#8221; or &#8220;Virtualization Technology&#8221; and enable them. Save changes and exit.</li>



<li><strong>Enable Windows Sandbox Feature:</strong>
<ul class="wp-block-list">
<li>Search for &#8220;Turn Windows features on or off&#8221; in the Start Menu and open it.</li>



<li>Scroll down the list and check the box next to &#8220;Windows Sandbox.&#8221;</li>



<li>Click &#8220;OK&#8221; and restart your computer if prompted.</li>
</ul>
</li>
</ol>



<p>Once enabled, you can launch Windows Sandbox from the Start Menu by searching for &#8220;Windows Sandbox.&#8221;<sup></sup> A new, clean Windows desktop will appear in a separate window, ready for your secure explorations. You can easily drag and drop files from your host machine into the sandbox, or download them directly within the sandbox&#8217;s browser.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2025/07/30/windows-sandbox-on-windows-11/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 10 support extended till October 2026</title>
		<link>https://oslogs.com/2025/06/27/windows-10-support-extended-till-october-2026/</link>
					<comments>https://oslogs.com/2025/06/27/windows-10-support-extended-till-october-2026/#comments</comments>
		
		<dc:creator><![CDATA[Nishant Kaushal]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 06:40:13 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[ESU]]></category>
		<category><![CDATA[Extended Support Updates]]></category>
		<guid isPermaLink="false">https://oslogs.com/?p=6637</guid>

					<description><![CDATA[For many of us, the October 2025 end-of-life date for Windows 10 has been a quiet anxiety in the back of our minds. The thought of losing vital security updates, leaving our trusty machines vulnerable, was a less-than-ideal prospect, especially for those whose hardware doesn&#8217;t quite make the cut for Windows 11. Well, take a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div>
<p>For many of us, the <a href="https://www.microsoft.com/en-in/windows/end-of-support" target="_blank" rel="noopener">October 2025 end-of-life date for Windows 10</a> has been a quiet anxiety in the back of our minds. The thought of losing vital security updates, leaving our trusty machines vulnerable, was a less-than-ideal prospect, especially for those whose hardware doesn&#8217;t quite make the cut for Windows 11. Well, take a deep breath and relax – Microsoft has heard our collective sigh of concern!</p>



<p>In a move that’s sure to bring relief to millions, <strong>Microsoft has announced an extension of security updates for Windows 10 all the way to October 2026</strong>. And here&#8217;s the really good news: they&#8217;re not just offering a paid path. There are now flexible options, including a surprising free route, to keep your Windows 10 PC protected for another year.</p>



<p>This is a significant development, as Windows 10 still powers a substantial portion of the world&#8217;s PCs. While Microsoft continues to encourage the upgrade to Windows 11, they clearly recognize that a hard cutoff would leave a massive number of users in a precarious position.</p>



<p>Earlier, we had also covered a way to <a href="https://oslogs.com/2025/04/21/how-to-upgrade-to-windows-11-and-bypass-hardware-requirements/">bypass hardware requirements to install Windows 11</a> on a PC that does not support Windows 11 hardware requirements.</p>



<p>So, what are your options to keep those crucial security updates flowing? Let&#8217;s break it down:</p>



<h2 class="wp-block-heading">Option 1: The Paid Path – Extended Security Updates (ESU) Program</h2>



<p>For those who prefer a straightforward solution or have specific business needs, the <a href="https://learn.microsoft.com/en-us/windows/whats-new/extended-security-updates" target="_blank" rel="noopener">Extended Security Updates (ESU) program</a> remains a viable choice. This is the traditional route Microsoft has offered for past Windows versions reaching their end-of-life.</p>



<ul class="wp-block-list">
<li><strong>What it is:</strong> The ESU program provides continued access to &#8220;Critical&#8221; and &#8220;Important&#8221; security updates as defined by Microsoft. It&#8217;s important to note that this doesn&#8217;t include new features, non-security updates, or technical support beyond issues related to the ESU itself.</li>



<li><strong>Cost:</strong> For individual consumers, the cost for one year of ESU is set at $30 USD. Businesses and organizations will find slightly different pricing structures, typically starting at $61 per device for the first year, with costs increasing annually for up to three years of coverage.</li>



<li><strong>Who it&#8217;s for:</strong> This option is ideal for those who need guaranteed, direct access to security updates without any additional conditions, or for businesses managing a fleet of Windows 10 devices.</li>



<li><strong>How to enroll:</strong> Microsoft is rolling out an enrollment wizard through system notifications and within the Settings app (under Update &amp; Security > Windows Update). This wizard is expected to become widely available to all Windows 10 users in July 2025, with full rollout by mid-August.</li>
</ul>



<h2 class="wp-block-heading"><strong>Option 2: The Unexpected Free Ride – How to Claim Your Free ESU Year</strong></h2>



<p>This is the real game-changer! Microsoft has introduced two ways for individual consumers to snag a year of Extended Security Updates without shelling out a dime. This demonstrates a clear understanding that many users simply aren&#8217;t ready or able to transition to Windows 11 just yet.</p>



<p><strong>Here&#8217;s how you can potentially get your free year of Windows 10 security updates:</strong></p>



<ol class="wp-block-list">
<li><strong>Syncing PC Settings with Windows Backup:</strong> This is arguably the easiest and most accessible free option. If you enable <a href="https://support.microsoft.com/en-us/windows/back-up-and-restore-with-windows-backup-87a81f8a-78fa-456e-b521-ac0560e32338#id0ebh=windows_10" target="_blank" rel="noopener">Windows Backup and sync your PC settings to the cloud via your Microsoft account</a> (which uses OneDrive), you&#8217;ll be eligible for the free ESU.
<ul class="wp-block-list">
<li><strong>The Catch (if any):</strong> While Windows Backup is free and includes 5GB of free OneDrive storage with your Microsoft account, some larger backups might exceed this limit, potentially requiring you to consider a paid OneDrive plan. However, even a low-cost OneDrive subscription is likely cheaper than the $30 ESU fee.</li>



<li><strong>How to do it:</strong> When the ESU enrollment wizard rolls out, you&#8217;ll see this as an option. If you already have your settings synced, it should be a seamless enrollment. If not, the wizard will guide you to enable this feature.</li>
</ul>
</li>



<li><strong>Redeem Microsoft Rewards Points:</strong> For those who are active in the Microsoft ecosystem, you can redeem 1,000 <a href="https://rewards.bing.com/" target="_blank" rel="noopener">Microsoft Rewards points</a> for a year of ESU.
<ul class="wp-block-list">
<li><strong>How it works:</strong> Microsoft Rewards points are earned through various activities like using Bing for searches, making purchases in the Microsoft Store, and other engagements with Microsoft services.</li>



<li><strong>Is it truly &#8220;free&#8221;?</strong> While it doesn&#8217;t involve direct cash, it does require accumulated points. For some, 1,000 points might be readily available, while for others, it could mean a bit of extra Browse or shopping to reach the threshold.</li>



<li><strong>How to do it:</strong> This option will also be presented within the ESU enrollment wizard.</li>
</ul>
</li>
</ol>



<p><strong>Important Notes for the Free Options:</strong></p>



<p><strong>Microsoft Account Required:</strong> Both free options necessitate logging in with a Microsoft account to enroll and receive the updates. The ESU license is tied to your Microsoft account and then applied to your PC.</p>



<p><strong>Consumer Devices Only:</strong> These free options are specifically for consumer devices (Home, Professional, Pro Education, or Workstation editions of Windows 10, version 22H2). Commercial devices, those joined to an Active Directory domain, or enrolled in Mobile Device Management (MDM) solutions are not eligible for the free tiers and must pursue the paid ESU program.</p>



<p><strong>One Year at a Time:</strong> The free options currently provide one year of extended security updates, lasting until October 13, 2026. Microsoft has not yet indicated if or how further free extensions will be offered beyond that.</p>



<h2 class="wp-block-heading">What This Means for You</h2>



<p>This extension is a welcome reprieve for many. It offers peace of mind, ensuring your Windows 10 PC remains secure against emerging threats for at least another year. However, it&#8217;s crucial to understand that this is ultimately a temporary solution.</p>



<p>While you now have more time, Microsoft&#8217;s long-term vision clearly points towards Windows 11. This extended support is designed to give users a softer landing, allowing them ample time to:</p>



<ul class="wp-block-list">
<li><strong>Upgrade to Windows 11:</strong> If your PC meets the minimum system requirements, upgrading to Windows 11 remains the recommended path for the latest features, performance improvements, and ongoing support.</li>



<li><strong>Consider a new PC:</strong> For older machines that can&#8217;t handle Windows 11, this extra year provides an opportunity to save up and invest in a new device that&#8217;s fully compatible with Microsoft&#8217;s latest operating system.</li>



<li><strong>Explore alternatives:</strong> For those who are fundamentally opposed to Windows 11 or simply want a change, this could be the ideal window to investigate other operating systems like Linux.</li>
</ul>



<p>Ultimately, Microsoft&#8217;s decision to extend Windows 10 support with accessible options, including a free tier, is a smart move that prioritizes user security and provides much-needed flexibility. It’s a testament to the enduring popularity of Windows 10 and a recognition of the diverse needs of its vast user base. So, take advantage of the extra time, weigh your options, and make the best decision for your computing future!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://oslogs.com/2025/06/27/windows-10-support-extended-till-october-2026/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
