Last week, a serious security hole was discovered and corrected in the OpenSSL, the open-source cryptography library which is used to secure encrypted internet connections.
Ever since, the various different operating systems and software have issued security updates. (See more: heartbleed, eff)
The said security hole existed for over two years and affected a very large number of systems and services on the internet.
All this time, it is possible that malicious hackers (see e-cops) knew of the vulnerability and took advantage of the situation.
This is why we upgraded to the latest version of the OpenSSL and we changed our SSL certificates.
Make sure that you connect to our services with the correct certificates by checking the SHA1 fingerprints.
To verify the SHA1 fingerprints on HTTPS secure pages, you go to the address bar where a padlock icon can be seen on the left, you press the padlock, and then you select “more information…” and press the button “view certificate”.
For *.espiv.net addresses you should be viewing:
SHA1 Fingerprint=6D:C3:AE:C1:ED:64:32:17:DB:B3:14:FE:B2:C3:01:D3:16:E6:6C:84
For *.espivblogs.net addresses you should be viewing:
SHA1 Fingerprint=AE:A1:20:C0:1C:8E:87:BD:3A:B1:2A:77:2A:3A:02:59:FE:70:0E:93
The next necessary step for everyone is to change all of their passwords for all espiv services. This means you should change passwords on emails, websites, forums, blogs, etc. — on any HTTPS page.