diff --git a/_posts/2019-11-14-origin-os-bypass.md b/_posts/2019-11-14-origin-os-bypass-r2.md
similarity index 96%
rename from _posts/2019-11-14-origin-os-bypass.md
rename to _posts/2019-11-14-origin-os-bypass-r2.md
index 777f0bb..25e30e8 100644
--- a/_posts/2019-11-14-origin-os-bypass.md
+++ b/_posts/2019-11-14-origin-os-bypass-r2.md
@@ -3,6 +3,13 @@ title: "Origin OS Version Bypass"
 subtitle: "revision 2, %pub"
 date: 2019-11-14
 commentid: 1
+
+permalink: /post/origin-os-bypass/revision-2
+hidden: true
+
+breadcrumbs:
+  - revlatest: /post/origin-os-bypass
+  - revcurrent: 2
 ---
 
 This guide shows how to hex-edit Origin to disable operating system check, which allows NFS Heat to download and install on Windows 7.
diff --git a/_posts/2019-12-13-origin-os-bypass.md b/_posts/2019-12-13-origin-os-bypass.md
new file mode 100644
index 0000000..bc9c4e5
--- /dev/null
+++ b/_posts/2019-12-13-origin-os-bypass.md
@@ -0,0 +1,66 @@
+---
+title: "Origin OS Version Bypass"
+subtitle: "revision 3, %pub"
+date: 2019-12-13
+commentid: 1
+---
+
+This guide shows how to hex-edit Origin to disable operating system check, which allows NFS Heat to download and install on Windows 7.
+
+If this works for you, I'd appreciate if you [bought me a coffee](https://ko-fi.com/chylex).
+
+# Prerequisites
+
+Get a hex editor that can handle big files. I'm using [HxD](https://mh-nexus.de/en/hxd/) (Portable).
+
+**Check your Origin.exe version:**
+- For **10.5.56.33908**, this revision should work
+- For **10.5.55.33574**, see [previous revision]({% post_url 2019-11-14-origin-os-bypass-r2 %})
+- For **10.5.52.32372**, see [previous revision]({% post_url 2019-11-12-origin-os-bypass-r1 %})
+
+Other versions may or may not work. However, it seems that after the game is downloaded and installed, Origin stops giving a shit about your OS, so you only need to do it once.
+
+At some point I want to make a video tutorial showcasing and explaining the disassembly process, so that you can do it yourself more reliably whenever Origin updates.
+
+# Edits
+
+Open each file in the hex editor. Go to each offset, make sure the sequence of bytes at that offset is the same as what's in the **Old** column, change it to what's in the **New** column.
+
+In HxD, use *Search - Go to...* (Ctrl+G), paste in the offset, click OK, **make sure your cursor is inside the hex section and not the decoded text section**, and type in the new hex values.
+
+## Origin.exe
+
+| Offset | Old | New |
+| ------ | --- | --- |
+| 1FEA0 | 75 | EB |
+| 1FF11 | 75 | EB |
+| 1FF7B | 0F 85 92 00 00 00 | E9 93 00 00 00 90 |
+| 1FFCA | 75 | EB |
+| 29C10 | 0F 8F 07 01 00 00 | E9 08 01 00 00 90 |
+| 29D1F | 74 | EB |
+| 29F2C | 74 | EB |
+
+## OriginClient.dll
+
+| Offset | Old | New |
+| ------ | --- | --- |
+| 3CCE75 | 0F 84 37 01 00 00 | E9 38 01 00 00 90 |
+| 3CCFFA | 0F 84 4B 01 00 00 | E9 4C 01 00 00 90 |
+
+## OriginClientService.exe
+
+| Offset | Old | New |
+| ------ | --- | --- |
+| 2EEA0 | 75 | EB |
+| 346D6 | 75 4D 68 4C 03 00 00 | E9 7C 03 00 00 90 90 |
+| 34752 | 75 | EB |
+| 348AF | 0F 84 46 01 00 00 | E9 47 01 00 00 90 |
+| 349BF | 0F 84 79 00 00 00 | E9 7A 00 00 00 90 |
+
+# Explanation
+
+If you want a very brief explanation, hex `74`/`75` are conditional jumps, and we turn them into `EB`, which is a forced jump, to skip over a bunch of code. Sequences `0F 8x` are generally variants of jumps that can jump further, and their forced jump equivalent is `E9` which takes 1 byte less, so whatever follows after the jump destination (4 bytes) is turned into `90`, a no-op instruction that does nothing but prevents shifting everything by a byte.
+
+In all cases, we skip over code that either acts upon the result of an OS version check, or the result of a signature check. Most of it is signature checks that *throw a fit* (technical term) when one of the exe/dll files is modified. It's so effective that you need to modify 3 files instead of 1 to get this working (although it's probably a good idea to be validating exe files because parts of Origin run with SYSTEM level privileges, more privileged than your *poweruser* administrator account).
+
+HxD also has a handy Data Inspector panel where, if you select one or more bytes, you can see the x86-64 instruction it represents.