{"id":803,"date":"2014-04-10T18:08:43","date_gmt":"2014-04-10T18:08:43","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/berkmannews\/?p=803"},"modified":"2014-04-10T18:08:43","modified_gmt":"2014-04-10T18:08:43","slug":"heartbleed-bugs-security-impact-may-not-be-fully-known-for-years-financial-post-9-april-2014","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/2014\/04\/10\/heartbleed-bugs-security-impact-may-not-be-fully-known-for-years-financial-post-9-april-2014\/","title":{"rendered":"Heartbleed bug\u2019s security impact may not be fully known for years | Financial Post, 9 April 2014"},"content":{"rendered":"<p>\u201cBasically, an attacker can grab 64K of memory from a server. The attack leaves no trace, and can be done multiple times to grab a different random 64K of memory,\u201d Bruce Schneier, a well known cryptologist and a fellow at Harvard\u2019s Berkman Center for Internet &amp; Society, wrote in a blog post.<\/p>\n<p>via <a href=\"http:\/\/business.financialpost.com\/2014\/04\/09\/heartbleed-bugs-security-impact-may-not-be-fully-known-for-years\/?__lsa=7ff3-d83e&amp;utm_source=News%40Law+subscribers&amp;utm_campaign=a9331fc97f-News_Law_Thursday_April_10_2014_4_10_2014&amp;utm_medium=email&amp;utm_term=0_856982f9c6-a9331fc97f-259577617\">Heartbleed bug\u2019s security impact may not be fully known for years | Financial Post<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cBasically, an attacker can grab 64K of memory from a server. The attack leaves no trace, and can be done multiple times to grab a different random 64K of memory,\u201d Bruce Schneier, a well known cryptologist and a fellow at &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/berkmannews\/2014\/04\/10\/heartbleed-bugs-security-impact-may-not-be-fully-known-for-years-financial-post-9-april-2014\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1681,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-803","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts\/803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/users\/1681"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/comments?post=803"}],"version-history":[{"count":1,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts\/803\/revisions"}],"predecessor-version":[{"id":804,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/posts\/803\/revisions\/804"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/media?parent=803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/categories?post=803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/berkmannews\/wp-json\/wp\/v2\/tags?post=803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}