Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

If you used the internet this week you should change all your passwords

This is about right.
This is about right.
This is about right.
Archive Photos/Getty Images

The more we learn about the Heartbleed bug, the gaping security flaw in the widely-used encryption software OpenSSL, the grimmer it gets. Here’s just some of the unhappy facts that have come clear in the last 24 hours.

We’ll never know for sure who was compromised

52012361

JOHN T. BARR/AFP/Getty Images

The hours after Heartbleed was announced represented a huge window of opportunity for the bad guys. Software to exploit the vulnerability was widely available, and a lot of websites hadn’t protected themselves until recently.

Unfortunately, the Heartbleed attack leaves few fingerprints. So we may never know how many sites were attacked and whose private information was exposed. That’s why changing your password is a good precaution even if you haven’t seen any sign of your account being attacked. Someone might have captured your password and be waiting for the right moment to strike.

Lots and lots of websites were affected

107713705

KAREN BLEIER/AFP/Getty Images

We don’t have precise statistics on how many websites were affected, but the researchers who discovered the vulnerability note that two popular web servers, Apache and nginx, both used the affected version of OpenSSL. Together, these two servers account for almost two thirds of all sites on the web.

That means almost everyone on the web likely logged into a vulnerable website on Monday or Tuesday may have had their information exposed. Indeed, OpenSSL has had the vulnerability for about 2 years, so you could be at risk even if you haven’t used the Internet this week.

There’s no way to protect yourself from a vulnerable website

74391581

Photo by Archive Photos/Getty Images

There are online services that let you check to see whether a website is running insecure encryption software. But if a website shows up as unsafe, the only way to protect your confidential information is not to log in.

Even if the test shows a website is safe, that doesn’t necessarily mean you’re in the clear. If an attacker previously captured a website’s encryption keys, then it may be able to eavesdrop on users even after the insecure software has been updated. So the only way to be sure you’re safe is if a website announces that it has updated its software and changed its encryption keys.

To make things worse, if you change your password while a site you’ve is still vulnerable, the bad guys might just get ahold of the new password. So you should change your passwords now, and then change them all again in a few weeks. That’s good practice anyway — and a good time to invest in a password manager like 1Password or LastPass.

This won’t be the last time users’ privacy is compromised

159167665

Gavin Roberts/PC Plus Magazine via Getty Images

This has been a bad year for SSL encryption software, which underlies almost all secure sites on the web — it’s the code that makes the lock symbol appear in your browser’s menu bar. In February, a serious bug was discovered in Apple’s implementation of SSL. A serious bug was found in another SSL implementation in March. It’s a near-certainty that other vulnerabilities will be discovered in the future.

All complex software has bugs. But the stakes are higher for encryption software than most other types of software because a single error can compromise the privacy of millions of users.

We under-invest in basic security infrastructure

104509225

JIM WATSON/AFP/Getty Images

The Heartbleed story highlights just how central to online security the OpenSSL library has become. Thousands of organizations use it to protect the privacy of millions of users. Yet the software is developed by a small, volunteer-driven organization. The project lists just 15 developers as responsible for maintaining the software. As one security expert puts it, the team does “a hard job with essentially no pay.”

With so many organizations depending on a small, under-resourced project, mistakes were inevitable. It will cost companies and governments millions of dollars to clean up the mess created by Heartbleed. It would be good if some of those deep-pocketed organizations invested resources in helping to improve the OpenSSL code so it’s less likely to happen again.

Unfortunately, there’s a huge collective action problem. The risk of any specific company or policymaker being blamed for a security breach is low, so everyone assumes that someone else will do something about it.

See More:

More in archives

archives
Ethics and Guidelines at Vox.comEthics and Guidelines at Vox.com
archives
By Vox Staff
Supreme Court
The Supreme Court will decide if the government can ban transgender health careThe Supreme Court will decide if the government can ban transgender health care
Supreme Court

Given the Court’s Republican supermajority, this case is unlikely to end well for trans people.

By Ian Millhiser
archives
On the MoneyOn the Money
archives

Learn about saving, spending, investing, and more in a monthly personal finance advice column written by Nicole Dieker.

By Vox Staff
archives
Total solar eclipse passes over USTotal solar eclipse passes over US
archives
By Vox Staff
archives
The 2024 Iowa caucusesThe 2024 Iowa caucuses
archives

The latest news, analysis, and explainers coming out of the GOP Iowa caucuses.

By Vox Staff
archives
The Big SqueezeThe Big Squeeze
archives

The economy’s stacked against us.

By Vox Staff