<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Deanstyles</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Deanstyles"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Deanstyles"/>
		<updated>2026-04-17T17:35:25Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1353:_Heartbleed&amp;diff=64980</id>
		<title>1353: Heartbleed</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1353:_Heartbleed&amp;diff=64980"/>
				<updated>2014-04-09T19:42:03Z</updated>
		
		<summary type="html">&lt;p&gt;Deanstyles: The mouseover shows a list of could be in 64Kb...then adds that even replicant memory could be found in it&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1353&lt;br /&gt;
| date      = April 9, 2014&lt;br /&gt;
| title     = Heartbleed&lt;br /&gt;
| image     = heartbleed.png&lt;br /&gt;
| titletext = I looked at some of the data dumps from vulnerable sites, and it was ... bad. I saw emails, passwords, password hints. SSL keys and session cookies. Important servers brimming with visitor IPs. Attack ships on fire off the shoulder of Orion, c-beams glittering in the dark near the Tannhäuser Gate. I should probably patch OpenSSL.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&amp;quot;Heartbleed&amp;quot; refers to a critical bug in the OpenSSL security library. This bug was publicly revealed on Monday, April 7th, 2014.&lt;br /&gt;
Due to a programming error in OpenSSL versions 1.0.1 through 1.0.1f (inclusive, i.e., the bug has existed for two years), attackers could read random server memory by sending specially prepared HeartbeatRequest messages to an affected server.&lt;br /&gt;
&lt;br /&gt;
OpenSSL is a very commonly used library to implement {{w|SSL/TLS}}, a web protocol that encrypts web traffic such that only the user and the server can read the communication. This is the protocol behind http'''s''':// (HTTP Secure) connections. SSL is often used to protect sensitive web traffic, such as login requests, which contains the usernames and passwords in the requests.&lt;br /&gt;
&lt;br /&gt;
A vulnerability that lets an attacker read random clumps of memory on the server would possibly let an attacker find recent username/password requests, allowing them to gain unauthorized access to user accounts. Even worse, this vulnerability could read the server's private key, enabling anyone to impersonate the server and/or decrypt any future traffic that relies on that key, and any previously-obtained prior traffic also, unless a &amp;quot;perfect forward secrecy&amp;quot; ciphers is used, which is currently rare. Furthermore, the hearbleed exploit occurs during the handshake phase of setting up a connection, so no traces of it are logged, i.e. you can be attacked and never be the wiser.&lt;br /&gt;
&lt;br /&gt;
More information is available at [http://heartbleed.com heartbleed.com] or under CVE-2014-0160, [https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160 CVE-2014-0160 at nvd.nist.gov]&lt;br /&gt;
&lt;br /&gt;
The mouseover text cites the {{w|Tears in rain soliloquy}}, the dying words of the replicant and main antagonist Roy Batty (played by {{w|Rutger Hauer}}) in the 1982 film ''{{w|Blade Runner}}'', implying that the 64Kb HeartBleed buffer is so complete it includes memories from replicant brains.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:Megan: Heartbleed must be the worst web security lapse ever.&lt;br /&gt;
:Cueball: Worst so far. Give us time.&lt;br /&gt;
:Megan: I mean, this bug isn't just broken encryption.&lt;br /&gt;
:Megan: It lets website visitors make a server dispense random memory contents.&lt;br /&gt;
:Megan: It's not just keys. It's traffic data. Emails. Passwords. Erotic fanfiction.&lt;br /&gt;
:Cueball: Is '''everything''' compromised?&lt;br /&gt;
:Megan: Well, the attack is limited to data stored in computer memory.&lt;br /&gt;
:Cueball: So paper is safe. And clay tablets.&lt;br /&gt;
:Megan: Our imaginations, too.&lt;br /&gt;
:Cueball: See, we'll be fine.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>Deanstyles</name></author>	</entry>

	</feed>