On Thu, 2014-04-10 at 10:20 -0600, Joshua Thorp wrote:
> according to 
> https://www.schneier.com/blog/archives/2014/04/heartbleed.html
> http://security.stackexchange.com/questions/55382/heartbleed-read-only-the-next-64k-and-hyping-the-threat
> 
> 
> apparently the bug gives access to 64K chunk of ram on the server.
>  The private key might be in that chunk,  but probably won’t be…
>  however you will get different chunks over time so if you wait long
> enough you might end up with a chunk that has a private key or
> someone’s password.
> 

Not just fraud or identity theft are risks, but lives could be at risk
too...

https://blog.torproject.org/



============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to