So, it turns out that there's a pretty serious vulnerability in OpenSSL, and a large section of the web is affected. Until this morning, so was TR.
We've updated the version of OpenSSL running on TR to address the problem. According to the Heartbleed test, we are no longer vulnerable.
However, if you have an account here, we strongly recommend updating your password. We cannot guarantee that some user passwords haven't been sniffed. If you use the same password on another site, it may be a good idea to change it there, too—so long as that other site doesn't fail the Heartbleed test.
Credit card information for subscribers was not compromised. That information never traveled through our servers, nor was it ever stored there. All credit card information for TR subscriptions was and will continue to be handled solely by our payment processor, Stripe. When we offer to "save" your credit card information, we're simply saving a reference to the card in Stripe's database.
|1. GKey13 - $650||2. JohnC - $600||3. davidbowser - $501|
|4. cmpxchg - $500||5. DeadOfKnight - $400||6. danny e. - $375|
|7. the - $360||8. rbattle - $350||9. codinghorror - $326|
|10. Ryu Connor - $325|
|Friday night topic: Driverless cars||39|
|Friday Night Shortbread||2|
|Toxikk will let you 'frag like it's 1999'||8|
|Report: Haswell-E is epoxied to its heat spreader||25|
|Deal of the week: A terabyte SSD for $417, plus memory, graphics, and more||4|
|Blacked-out MSI X99S SLI motherboard looks menacing||11|
|Rumor: Tonga GPU to power Radeon R9 285||20|
|AMD's A10-7800 processor reviewed||59|
|Thursday Night Shortbread||24|