AmberCutie's Forum
An adult community for cam models and members to discuss all the things!

Heartbleed

  • ** WARNING - ACF CONTAINS ADULT CONTENT **
    Only persons aged 18 or over may read or post to the forums, without regard to whether an adult actually owns the registration or parental/guardian permission. AmberCutie's Forum (ACF) is for use by adults only and contains adult content. By continuing to use this site you are confirming that you are at least 18 years of age.
Status
Not open for further replies.

zippypinhead

V.I.P. AmberLander
Jan 21, 2013
2,548
4,807
213
Heads up on a new server vulnerability that affects many common services. It's called Heartbleed. Bottom line is that it's probably time to update your passwords. The recommendation is to wait until there has been a verified patch applied to a given site. CNET has compiled a list of common services, and whether they've been patched. I've spent the afternoon updating my passwords, which needed it anyway.

My question is whether or not MFC or any other cam sites have this vulnerability, and whether or not they have been or will be patched.
 
Link to the original on xkcd.com.

QFQzqwI.png
 
I don't think MFC even use HTTPS. At least for members, they do not.

I've just checked and they send the password in clear over the wire, they don't even try to hash it before, what a joke!
I hope nobody here uses that password for anything else.

Don't worry about Heartbleed on MFC, it's unprotected by defaut.
 
eclipse76 said:
I don't think MFC even use HTTPS. At least for members, they do not.

I've just checked and they send the password in clear over the wire, they don't even try to hash it before, what a joke!
I hope nobody here uses that password for anything else.

Don't worry about Heartbleed on MFC, it's unprotected by defaut.
Well, the payment processors are what you really want to be sure about, since MFC doesn't handle money itself. And yeah, not using the same password on multiple sites is base-level security.
 
Well, now there is a report on Bloomberg saying that the NSA has been aware of and exploiting this vulnerability for a couple of years. And here we are getting all worried.
 
eclipse76 said:
I've just checked and they send the password in clear over the wire, they don't even try to hash it before, what a joke!
Personally I believe that MFC's passwords are not even stored encrypted due to the fact they are not case sensitive.

Your confusing hashing and encryption. Encryption is reversible given you have the key which would allow them to send you your password in plain text while hashing is one way and cannot be un-hashed. This also means that any site that uses encryption can see your password.

JerryBoBerry said:
i like that none of the banks were ever affected.
Probably because they are running software linked against older version of OpenSSL, Banks are notorious for running outdated software, same as governments.
 
CallMeWilliam said:
JerryBoBerry said:
i like that none of the banks were ever affected.
Probably because they are running software linked against older version of OpenSSL, Banks are notorious for running outdated software, same as governments.

My credit union sent a reassuring email this week that they weren't affected by the OpenSSL vulnerability. However, if you test the online banking portal using SSL Labs' server testing utility, they use a bunch of outdated protocols and get an immediate failing grade for using SSL 2, which is obsolete.
 
Status
Not open for further replies.