{"id":32782,"date":"2014-04-14T13:02:44","date_gmt":"2014-04-14T13:02:44","guid":{"rendered":"http:\/\/rafaelfajardo.com\/portfolio\/heartbleed\/"},"modified":"2014-04-14T13:02:44","modified_gmt":"2014-04-14T13:02:44","slug":"heartbleed","status":"publish","type":"post","link":"https:\/\/rafaelfajardo.com\/portfolio\/heartbleed\/","title":{"rendered":"Heartbleed"},"content":{"rendered":"<p><a href='https:\/\/www.schneier.com\/blog\/archives\/2014\/04\/heartbleed.html'>Heartbleed<\/a><\/p>\n<div class=\"link_description\">\n<blockquote>\n<p>Basically, an attacker can grab 64K of memory from a server. The attack leaves no trace, and can be done multiple times to grab a different random 64K of memory. This means that anything in memory \u2014 SSL private keys, user keys, anything \u2014 is vulnerable. And you have to assume that it is all compromised. All of it.<\/p>\n<p>&ldquo;Catastrophic&rdquo; is the right word. On the scale of 1 to 10, this is an 11.<\/p>\n<p>Half a million sites are <a href=\"http:\/\/news.netcraft.com\/archives\/2014\/04\/08\/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html\">vulnerable<\/a>, including my own. Test your vulnerability <a href=\"http:\/\/filippo.io\/Heartbleed\/\">here<\/a>.<\/p>\n<\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Heartbleed Basically, an attacker can grab 64K of memory from a server. The attack leaves no trace, and can be done multiple times to grab a different random 64K of memory. This means that anything in memory \u2014 SSL private keys, user keys, anything \u2014 is vulnerable. And you have to assume that it is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"link","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[],"tags":[1539],"class_list":["post-32782","post","type-post","status-publish","format-link","hentry","tag-emergent-digital-practices","post_format-post-format-link"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p6PWot-8wK","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts\/32782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/comments?post=32782"}],"version-history":[{"count":0,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts\/32782\/revisions"}],"wp:attachment":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/media?parent=32782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/categories?post=32782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/tags?post=32782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}