On Thu, 2014-04-10 at 10:20 -0600, Joshua Thorp wrote: > according to > https://www.schneier.com/blog/archives/2014/04/heartbleed.html > http://security.stackexchange.com/questions/55382/heartbleed-read-only-the-next-64k-and-hyping-the-threat > > > apparently the bug gives access to 64K chunk of ram on the server. > The private key might be in that chunk, but probably won’t be… > however you will get different chunks over time so if you wait long > enough you might end up with a chunk that has a private key or > someone’s password. >
Not just fraud or identity theft are risks, but lives could be at risk too... https://blog.torproject.org/ ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com