This is probably too geeky for most people, but for the sake of transparency I wanted to let you know what our status is in regards to the recently popularized "Heartbeat" security threat. "Heartbeat" is a flaw in OpenSSL, a protocol that manages the secure connections of the servers that run 2/3 of the websites in the world. Essentially it allows hackers to theoretically view 64KB of the current memory space (that's a lot of data). This random, raw data, but it could contain secure information like passwords and private SSL keys.
Lots of servers had implemented other protocols that made them secure against the vulnerability. And other servers, like Gutensite, are theoretically vulnerable to the attack, but since each connection has it's own resources the only user information an attacker could get was their own information, e.g. not other users passwords.
As soon as news broke about the vulnerability, and a patch was issued, we immediately updated all our servers. You can check our servers with this tool and see they are secure.
This vulnerability has been present since 2012, and it would not surprise anyone to learn that the NSA engineered it themselves, given the stream of revelations regarding their misbehavior to undermine all sorts of public security protocols in the past decade. But it's not clear that it was known by hackers during any of this time.
Although we aren't a large target like Yahoo!, it is possible that Gutensite's private key for our SSL Certificate could have been compromised, although only a select group of of operators like the network operators, the NSA, or criminals with a few million dollars of equipment in the right locations, could use that information. But just to be safe we reissued the certificate after the patch was in place. Everything should be as secure as possible now.
We also implemented Forward Secrecy, which essentially generates a new key for every connection, which make SSL far more secure than it was even before. If someone somehow steals your ssl key from one connection, it won't decrypt data from another connection.
We recommend that clients who use SSL ask us to resissue their certificates as well, just to be safe. And it's a good idea to change your password (something you should do regularly anyway).
—Sarah Nguyen