Sr. Content Developer at Microsoft, working remotely in PA, TechBash conference organizer, former Microsoft MVP, Husband, Dad and Geek.
148117 stories
·
33 followers

Privacy researcher debunks Microsoft Edge’s free VPN marketing, says it’s “NOT a VPN”

1 Share

Microsoft recently drew the attention of a privacy researcher to one of Edge’s lesser-known features through a post on X, describing Edge Secure Network VPN as a free, built-in privacy tool that requires no additional apps or subscriptions.

The post, by the official Microsoft Edge handle, positioned the feature as a simple way to add an extra layer of protection while browsing, particularly on public Wi-Fi networks, and encouraged users to turn it on directly from Edge’s settings.

Microsoft Edge social media team posts about the Edge Secure Network VPN
Microsoft Edge social media team posts about the Edge Secure Network VPN

The feature is called Edge Secure Network VPN, and in theory, it could free you from installing third-party VPN services, as it is already baked into Edge, but it does have a limited monthly data allowance.

Microsoft Edge Secure Network VPN turned on

Not long after, a privacy researcher responded with a detailed technical critique, arguing that the feature operates very differently from what most people associate with a traditional VPN. That reply quickly gained traction and shifted the conversation to a debate about how browser-integrated privacy tools should be described and what level of protection users should realistically expect.

“Edge Secure Network is NOT a VPN. It’s an HTTP CONNECT proxy built on Cloudflare’s Privacy Proxy Platform. It only tunnels traffic inside the Edge browser”, says Sooraj Sathyanarayanan, a Privacy Researcher & Security Strategist, who works at Brave Browser.

We have reached out to Microsoft for additional clarification on how it characterizes Edge Secure Network VPN and will update this story if we hear back.

Sooraj’s claims are largely true, but to understand where the disagreement comes from, it helps to first look at how Microsoft itself explains what Edge Secure Network VPN is meant to do.

Microsoft says Edge Secure Network VPN adds built-in encrypted browsing protection with a 5GB monthly limit

According to Microsoft’s feature documentation, Edge Secure Network VPN is a lightweight, browser-level protection feature that uses “VPN technology” to encrypt traffic generated inside Microsoft Edge, helping shield browsing activity from third parties, trackers, or malicious actors.

If you are browsing from a public network, like a coffee shop or airport, Edge can route that browser traffic through an encrypted tunnel so sensitive data, such as logins, payment details, or form submissions, cannot be intercepted. Microsoft also says the feature obscures the user’s IP address from websites, adding an additional layer of privacy while browsing.

To turn on Edge Secure Network VPN, click the three dots in Edge, select More tools, and click Secure Network. Click Get VPN for free, and sign in to your Microsoft account.

Edge Secure Network is available at no extra cost, but only for users signed into Edge with a personal Microsoft account. The free tier includes a 5GB monthly data allowance, after which the protection stops until the quota resets. To conserve that data, certain high-bandwidth scenarios, including video streaming services like Netflix, Hulu, HBO, and more, are excluded from routing through the feature.

Note that some people use VPN services exclusively to bypass streaming platforms’ filtering of content for certain regions.

Edge Secure Network VPN has some other limitations, too. The feature is currently unavailable on managed or enterprise devices and does not work in certain regions. It also does not support manual server selection, which Microsoft confirmed in response to a user question on X, noting that Secure Network automatically connects to a geographically nearby server rather than allowing users to choose a country or region.

Microsoft's reply to a user asking if they can change the server location manually

However, Microsoft describes the system as being smart enough to activate automatically in situations it considers higher risk, such as when visiting sites that are not fully secured. Users can also manually control how it behaves, choosing whether to enable it selectively or expand coverage to more browsing sessions.

From Microsoft’s perspective, Edge Secure Network VPN is a built-in safeguard designed to add baseline protection without requiring users to install or configure third-party tools. It is not marketed in official documentation as a full replacement for standalone VPN services, although the company does use phrases like “free VPN data protection every month” and “uses VPN technology”.

The clever marketing wasn’t enough to deter a security analyst from critiquing the feature.

Security researcher says Edge Secure Network functions closer to a browser proxy than a traditional VPN

Privacy Researcher debunks Microsoft's claim about Edge Secure Network VPN service
Part of the reply by a privacy researcher

The promotional language around Edge Secure Network VPN prompted a detailed response from Sooraj Sathyanarayanan, a Privacy Researcher and Brave Browser employee, who argues that the feature behaves very differently from what most users expect when they hear the word “VPN.”

According to the analysis, Edge Secure Network operates as a browser-level tunneling mechanism rather than a system-wide virtual private network. So, only traffic generated inside Microsoft Edge is routed through the protected channel. Activity from other applications, background services, email clients, operating system updates, and even DNS queries would continue to use the regular network path.

He describes the feature as an HTTP CONNECT proxy built on Cloudflare’s Privacy Proxy infrastructure, designed to secure browsing sessions within Edge itself, not to create a device-wide encrypted tunnel. Note that many commercial VPN tools route all system traffic through a secure endpoint, with kill switches and user-configurable server locations.

Microsoft Edge security features
Source: Microsoft

The analysis also notes that Edge Secure Network ships in what Microsoft calls an “Optimized” mode by default, meaning the protection may only activate under certain conditions, such as when using public Wi-Fi or visiting non-HTTPS sites, unless users manually change the configuration to cover all browsing scenarios.

Another point raised is the requirement to sign in with a personal Microsoft account to enable the feature. Microsoft says this is necessary to enforce the 5GB monthly usage cap, but the researcher argues that it connects the protection layer to an authenticated identity and not an anonymous usage.

Sathyanarayanan further describes the architecture as a two-party trust model, where Microsoft manages account identity while network routing is handled by Cloudflare.

Microsoft assures that Cloudflare does not see account identities, and Cloudflare states it does not inspect user traffic, but the researcher points out that the system relies on trusting both parties’ claims without an independent public audit.

The critique also notes concerns about the lack of manual region selection, limited transparency into routing behavior, and the absence of certain protections that full-device VPN software provides.

Built-in browser protection is common, but it is not the same as a full VPN

Microsoft is not alone in the quest to add network protection directly into the browser. Opera, for example, has long shipped a built-in VPN feature inside the browser, setting it as an integrated privacy layer.

Opera Browser
Source: Opera

These built-in tools are set for a convenience-first world. They turn on automatically in certain situations, require minimal setup, and reduce obvious risks like unsecured Wi-Fi connections. They also avoid the performance impact that system-wide VPN software introduces.

At the same time, browser-integrated protections are not meant to be a replacement for traditional VPN services.

Clarity about what these features do and do not cover is increasingly important for user trust. Whether the feature is seen as a useful safeguard or something overstated will likely depend on how Microsoft continues to explain its role and limitations.

The post Privacy researcher debunks Microsoft Edge’s free VPN marketing, says it’s “NOT a VPN” appeared first on Windows Latest

Read the whole story
alvinashcraft
2 hours ago
reply
Pennsylvania, USA
Share this story
Delete

The Strange Emotional Shift of Working Alongside a Machine That “Thinks”

1 Share

It was close to midnight and the system was not behaving the way it should. CPU was hovering around 85 percent, PAGEIOLATCH waits were climbing steadily, and one particular stored procedure had suddenly become the villain of the evening. I had the actual execution plan open. A Hash Match that clearly did not belong there. A Key Lookup that was blowing up row counts. An estimated versus actual row mismatch that was almost embarrassing to look at. Let us talk about The Strange Emotional Shift of Working Alongside a Machine That “Thinks”.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme1-800x533

The Night a Query Finished Before I Did

I have seen this pattern before. Cardinality estimation gone wrong. Parameter sniffing, maybe. Or outdated statistics. This is the kind of puzzle I have solved for decades. You start with sys.dm_exec_query_stats. You check wait stats. You glance at missing index DMVs, but you do not trust them blindly. You think about workload patterns, concurrency, memory grant pressure. It is not just technical analysis. It is instinct, built from years of late-night production calls and early-morning postmortems.

Out of curiosity more than need, I pasted the query and some surrounding details into an AI assistant.

Within seconds, it responded with structured reasoning. It pointed out the Key Lookup and suggested a covering nonclustered index. It mentioned parameter sniffing and recommended OPTIMIZE FOR or OPTION (RECOMPILE). It even explained the row estimate mismatch in plain, simple language.

I stared at the screen.

Not because it was revolutionary. But because it was fast.

And in that speed, something inside me felt unsettled.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme2-800x533

When Your Brain Has Always Been the Optimizer

For most of my career, I have joked that my brain is the real query optimizer. Before SQL Server decides on a plan, I have already predicted what it might choose. If a table has skewed data distribution, I can almost sense where the plan will break. If the memory grant is too generous, I anticipate spills to tempdb. If CXPACKET waits suddenly spike, I am already thinking about parallelism thresholds and cost threshold for parallelism before anyone opens sp_configure.

This ability did not come from reading documentation alone. It came from nights spent firefighting blocking chains. From watching deadlocks unfold in Profiler. From tuning queries where a missing index was not the answer because the entire data model needed to be rethought. That kind of thinking was never mechanical. It was deeply personal. It was the craft of performance tuning. Messy, hard-won, and irreplaceable.

So when a machine begins to replicate parts of that thinking, even partially, it touches something beyond convenience.

It makes you question whether what you believed was uniquely earned can now be simulated.

That is not an easy feeling to sit with.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme3-800x533

The Execution Plan of the Ego

There is a quiet comparison that happens when you read AI-generated analysis of a complex SQL Server issue. You read it and instinctively measure it against your own thinking. You ask yourself, would I have explained the memory grant issue this way? Would I have pointed at the Nested Loops operator first? Sometimes you feel reassured because you spot the gaps. The AI suggests creating an index without considering write overhead on a busy OLTP system. It does not understand that this database runs 24×7 and cannot afford heavy index maintenance windows. It does not factor in the fragmentation that a wide nonclustered index will introduce on tables with high insert rates.

But sometimes, and this is the uncomfortable part, the explanation is clean. Logical. Structured. It reads like something you would confidently present in a performance review meeting.

And in that moment, your ego runs its own little execution plan. It calculates your value. It estimates your uniqueness. It checks its own cost model.

If clarity can be generated in seconds, what exactly is your edge now?

That question is not really about job security. It is about identity.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme4-800x533

Information Is Not the Same as Judgment

AI can scan massive volumes of SQL Server documentation in an instant. It can explain the differences between READ COMMITTED SNAPSHOT and SERIALIZABLE isolation levels. It can talk about fragmentation thresholds, fill factor adjustments, statistics update strategies, and Query Store baselines. It can even walk through troubleshooting steps using DMVs in a way that sounds remarkably competent.

But it does not sit in the room when a wrong index decision causes write latency to climb across the entire OLTP workload. It does not remember the production outage three years ago where a well-intentioned index change triggered unexpected lock escalation during peak hours. It does not feel the weight of looking a business leader in the eye and telling them that their reporting query is fundamentally flawed, and that the fix is a redesign, not a hardware upgrade.

Experience changes how you think. Not just what you know, but how carefully you apply it.

When I recommend creating an index, I am not thinking about that one query alone. I am thinking about write overhead, maintenance windows, fragmentation behaviour, rebuild strategy, storage impact, and long-term scalability. That layered thinking comes from consequence. From having made decisions that went wrong and learning from them in real time, under real pressure.

Consequence cannot be simulated.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme5-800x533

The Danger of Relying on Instant Answers

There is another uncomfortable truth here. AI reduces friction. And friction is exactly where expertise gets sharpened.

When I first learned performance tuning, I manually inspected execution plans operator by operator. I traced each arrow. I looked at estimated subtree cost and compared it against actual runtime behaviour. I learned, slowly and painfully, to correlate wait stats with workload patterns. That struggle built instinct. It trained my internal model of how SQL Server behaves under stress.

If I now rely entirely on AI-generated summaries to interpret execution plans, I will certainly save time. But will my internal model stay sharp? Will I still be able to diagnose a complex concurrency issue without outside help? Or will my brain slowly offload pattern recognition to an external system, the way muscles weaken when you stop using them?

This is not about rejecting AI. I am not arguing for that.

It is about protecting cognitive depth.

Because output can remain high while depth quietly decreases. And depth is what makes expertise resilient, especially in the moments that matter most.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme6-800x533

From Solver to Strategist

Over time, I have started to see this shift differently. AI is not replacing my thinking. It is changing my role.

Earlier, I was the primary solver. I was the one who found the answer. Now, I am increasingly the strategist. AI can suggest ten tuning options. It can propose query rewrites, index additions, MAXDOP adjustments, changes to cost threshold for parallelism. It can generate those recommendations quickly and coherently.

But I decide which lever to pull.

I decide whether a plan guide makes sense for this particular scenario. I decide whether forcing a plan through Query Store is safe given this workload’s volatility. I decide whether the right answer is a configuration change, an architectural redesign, or an honest conversation with the development team about how their code interacts with data.

Decision-making under uncertainty remains deeply human. And as the number of available options multiplies, judgement does not become less important. It becomes more critical.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme7-800x533

The Real Evolution

The strange emotional shift of working alongside a machine that “thinks” is not dramatic or loud. It does not arrive in a single moment. It is gradual and deeply personal. It forces you to sit quietly with yourself and examine what part of your expertise is information and what part is wisdom.

When I look at a slow SQL Server today, I still open the execution plan manually. I still examine wait stats. I still think carefully about memory grants, parallelism, index design, and workload patterns. Those habits are not going anywhere.

But I also allow myself to collaborate. I use AI to pressure-test my assumptions, to explore alternate approaches I might not have considered, to draft structured explanations faster than I could on my own. And then I layer my experience on top of it.

The machine may suggest an index. But it does not carry the responsibility of implementing it in production at 2 AM when hundreds of users are active. It may produce reasoning about deadlocks or blocking chains. But it does not carry the memory of past incidents that make you cautious. The ones that taught you to pause before acting, even when you are confident.

The Strange Emotional Shift of Working Alongside a Machine That "Thinks" aiandme8-800x533

It does not feel the pressure of accountability. That remains entirely human.

In the end, this shift is not really about machines becoming intelligent. It is about us becoming more intentional about how we think. If we use AI carelessly, it will slowly replace depth with convenience. If we use it consciously, it will amplify decades of hard-earned experience into something even more powerful.

The choice is not technical. It is psychological.

And that choice still belongs to us.

Reference: Pinal Dave (https://blog.sqlauthority.com), X (twitter). 

First appeared on The Strange Emotional Shift of Working Alongside a Machine That “Thinks”

Read the whole story
alvinashcraft
2 hours ago
reply
Pennsylvania, USA
Share this story
Delete

What Is Imagery & How Do You Use It In Fiction Writing?

1 Share

What is imagery and how do you use it in fiction writing? We define imagery and explain how fiction writers can use it in their stories.

What Is Imagery?

“Description composed of sensory detail penetrates layers of consciousness, engaging your reader emotionally as well as intellectually…” ~Rebecca McClanahan

Imagery is a literary device that allows us to immerse ourselves in the stories we read. It is a type of description – one of the most effective ways to show and not tell, where we are able to experience fiction in someone else’s shoes. As writers, we use the five senses (sound, taste, smell, touch, sight) to create these unforgettable scenes. The writing is so vivid that we feel as if we are part of the story. The use of motifs is also a powerful way to use the senses.

Using imagery also includes figurative language like metaphors and similes to convey emotions, setting, and mood.

How To Use Imagery In Fiction Writing

There are five types of imagery:

  1. Auditory imagery. Writers use techniques like onomatopoeia (bees buzz, pigs oink, leaves crackle and crunch), repetition, and alliteration to create sounds for the reader. Onomatopoeia is the most common and it means using words to imitate sounds. It creates a sound effect that mimics the thing described, making the description more expressive and interesting. Use these words in your writing.
  2. Gustatory imagery. Writers use words like acidic, brackish, bitter, ripe, and sour when characters eat or taste something. Click here for more information and words on taste.
  3. Olfactory imagery. Writers help you to smell freshly baked bread, lavender, smoke from a fire, a cloying perfume, a sweaty shirt, and newly ironed laundry. “Smell is one of the most powerful senses. It can transport us back in time in a moment. The sense of smell is more closely linked with memory than any of the other senses. It also evokes emotions. It is one of our most important survival mechanisms. A bad smell warns us that we are in danger, for example, when we smell smoke or rotten food.” (Source)
  4. Tactile imagery. Writers make you feel the stones or dry grass beneath your feet. They make you touch the sleek fur of a cat. Your fingers feel the warm sunlight on your skin. “The sense of touch is so important because touch confirms that our eyes aren’t deceiving us. Readers identify with characters who interact with their worlds.” (Source)
  5. Visual imagery. Writers describe scenes with textures, colours, contrasts, shapes, sizes, movement, patterns, tones, and light to create a picture in the reader’s mind. For example, a character who lives in a colourful home is very different to one who lives in a monochromatic home.

Examples of Imagery

  1. Visual Imagery: “A forest fire was making its way along the tinderbox ridges above them, flaring and shimmering against the overcast like the northern lights. Cold as it was he stood there a long time. The colour of it moved something in him long forgotten.” ~Cormac McCarthy, The Road.
  2. Tactile and Auditory Imagery: “Something stung his left hand. He slapped at it, expecting to see an insect. He looked down to see a pale yellow leaf. It fell to the ground with a rustle. On the back of his hand, a veining of red, wet blood welled up. The wood whispered about them.” ~Neil Gaiman, Stardust
  3. Olfactory Imagery: “The dry reek of cigarettes has become the scent of burning leaves; the sweet and simple bonfire scent of autumn nights by the fireside.” ~Joanne Harris, The Strawberry Thief
  4. Visual and Auditory Imagery: “Now small fowls flew screaming over the yet yawning gulf; a sullen white surf beat against its steep sides; then all collapsed, and the great shroud of the sea rolled on as it rolled five thousand years ago.” ~Herman Melville, Moby Dick
  5. Olfactory Imagery: “There were strange, rare odours abroad—a tangle of the sea smell and of weeds and damp, new-plowed earth, mingled with the heavy perfume of a field of white blossoms somewhere near.” ~Kate Chopin, The Awakening
  6. Gustatory Imagery: “I have eaten the plums that were in the icebox and which you were probably saving for breakfast Forgive me they were delicious so sweet and so cold.” ~William Carlos Williams, ‘This Is Just To Say‘ poem.

The Last Word

The use of imagery (the five senses) is important when we create a character’s world. If we do it well, the reader will experience it in real time as they soak in the words.

Top Tip: The Visual Storytelling Workbook may also be useful to you.


by Amanda Patterson
© Amanda Patterson

If you liked this blogger’s writing, you may enjoy:

  1. How To Deal With A Writer’s Inner Critic
  2. What Is Exposition In A Story?
  3. The Death Trap – A Plot Device
  4. Why You Don’t Need To Put Everything In Your Book
  5. How To Write Hardboiled Fiction
  6. 12 Types Of Memoirs – Which One Is Yours?
  7. How Many Suspects Do You Need In A Crime Novel?
  8. Writing Is An Act Of Courage
  9. A Quick Start Guide To Writing An Inciting Incident
  10. A Quick Start Guide To Foreshadowing

Top Tip: Find out more about our workbooks and online courses in our shop.

The post What Is Imagery & How Do You Use It In Fiction Writing? appeared first on Writers Write.

Read the whole story
alvinashcraft
2 hours ago
reply
Pennsylvania, USA
Share this story
Delete

The Claude C Compiler: What It Reveals About the Future of Software

1 Share

The Claude C Compiler: What It Reveals About the Future of Software

On February 5th Anthropic's Nicholas Carlini wrote about a project to use parallel Claudes to build a C compiler on top of the brand new Opus 4.6

Chris Lattner (Swift, LLVM, Clang, Mojo) knows more about C compilers than most. He just published this review of the code.

Some points that stood out to me:

  • Good software depends on judgment, communication, and clear abstraction. AI has amplified this.
  • AI coding is automation of implementation, so design and stewardship become more important.
  • Manual rewrites and translation work are becoming AI-native tasks, automating a large category of engineering effort.

Chris is generally impressed with CCC (the Claude C Compiler):

Taken together, CCC looks less like an experimental research compiler and more like a competent textbook implementation, the sort of system a strong undergraduate team might build early in a project before years of refinement. That alone is remarkable.

It's a long way from being a production-ready compiler though:

Several design choices suggest optimization toward passing tests rather than building general abstractions like a human would. [...] These flaws are informative rather than surprising, suggesting that current AI systems excel at assembling known techniques and optimizing toward measurable success criteria, while struggling with the open-ended generalization required for production-quality systems.

The project also leads to deep open questions about how agentic engineering interacts with licensing and IP for both open source and proprietary code:

If AI systems trained on decades of publicly available code can reproduce familiar structures, patterns, and even specific implementations, where exactly is the boundary between learning and copying?

Tags: c, compilers, open-source, ai, ai-assisted-programming, anthropic, claude, nicholas-carlini, coding-agents

Read the whole story
alvinashcraft
4 hours ago
reply
Pennsylvania, USA
Share this story
Delete

EVs Are Already Making Your Air Cleaner, Research Shows

2 Shares
Fossil fuels produce NO2, which is linked to asthma attacks, bronchitis, and higher risks of heart disease and stroke, according the EV news site Electrek. But the nonprofit news site Grist.org notes a new analysis showing that those emissions decreased by 1.1% for every increase of 200 electric vehicles — across nearly 1,700 ZIP codes. "A pretty small addition of cars at the ZIP code level led to a decline in air pollution," said Sandrah Eckel, a public health professor at the University of Southern California's Keck School of Medicine and lead author of the study. "It's remarkable." The study was done at the University of Southern California's medical school, by researchers using high-resolution satellite data, reports Electrek: The study, just published in The Lancet Planetary Health and partly funded by the National Institutes of Health, adds rare real-world evidence to a claim that's often taken for granted — that EVs don't just cut carbon over time, they also improve local air quality right now... The researchers ran multiple checks to make sure the trend wasn't driven by unrelated factors. They accounted for pandemic-era changes by excluding 2020 in some analyses and controlling for gas prices and work-from-home patterns. They also saw the expected counterexample: neighborhoods that added more gas-powered vehicles experienced increases in pollution. The findings were then replicated using updated ground-level air monitoring data dating back to 2012... Next, the researchers plan to compare EV adoption with asthma-related emergency room visits and hospitalizations. If those trends line up, it could provide some of the clearest evidence yet of what we already know: that electrifying transportation doesn't just clean the air on paper; it improves public health in practice. Thanks to long-time Slashdot reader jhoegl for sharing the article.

Read more of this story at Slashdot.

Read the whole story
alvinashcraft
5 hours ago
reply
Pennsylvania, USA
Share this story
Delete

Week in Review: Most popular stories on GeekWire for the week of Feb. 15, 2026

1 Share

Get caught up on the latest technology and startup news from the past week. Here are the most popular stories on GeekWire for the week of Feb. 15, 2026.

Sign up to receive these updates every Sunday in your inbox by subscribing to our GeekWire Weekly email newsletter.

Most popular stories on GeekWire

Read the whole story
alvinashcraft
5 hours ago
reply
Pennsylvania, USA
Share this story
Delete
Next Page of Stories