
NSA Knew About Heartbleed and Exploited It For At Least Two Years
Comments
Posted April 11, 2014 at 9:05pm · 8 comments · Add Comment
qba - April 17, 2014 at 4:15pm
Shame in you America/NSA that's why smart hackers and security experts should not work for you at all because you don't know better, you just used us like you have from centuries.
Reply · Like · Mark as Spam
AaronL - April 14, 2014 at 7:24pm
The whole point of the Heartbleed bug was to exploit a bug in OpenSSL, so this would affect all servers that used that protocol.
If you set complex passwords to start off with then your login details should be OK. By advising users to change the passwords takes away some of the legal responsibility in the interim.
Although I can't believe this has been known for nearly two years and nobody cared enough to patch it.
Reply · Like · Mark as Spam
nitays - April 14, 2014 at 8:36am
These NSA People... True bastards.
Reply · Like · Mark as Spam
AaronnL - April 12, 2014 at 8:46pm
The NSA are a bunch of ***** really. Do I as I say, not do as I do.
Reply · Like · Mark as Spam
Great! - April 12, 2014 at 7:04am
I'm sorry but declining to comment in this case just shows me that they are guilty as charged.
Reply · Like · Mark as Spam
mifki - April 11, 2014 at 11:57pm
Heartbeat code has been added in version 1.0.1 released 14 Mar 2012. Taking into account that only two years total passed since then and that some time was required to update to that version, it seems somewhat unlikely that they could exploit it "for at least two years".
Reply · Like · Mark as Spam
mifki - April 12, 2014 at 12:02am
...even if they knew about the vulnerability from the beginning, which I don't believe a well.
Reply · Like · Mark as Spam
Wee Willy Spunker - April 11, 2014 at 9:16pm
Are they trying to target an os not immune to malware or heartbleed forcing people off of it?
Reply · Like · Mark as Spam