funkylogik
share the love peeps ;)
Unfortunately, even though there are a few (unimportant) typos in the above post, I can't get any text when I try to edit it, so please excuse the "nodule" for "module" and things like that.
No!

Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Unfortunately, even though there are a few (unimportant) typos in the above post, I can't get any text when I try to edit it, so please excuse the "nodule" for "module" and things like that.

Since your phone doesn't run OpenSSL (it just connects to the SSL port of a server that uses SSL - and might be using the affected version of one single SSL program, OpenSSL, without having been patched against the bug), whoever wrote that has to go back to school and learn what software is and how it works.
It's like saying that XYZ Sail Manufacturing Company sent out a defective load of sails, so you should check your car's tires to make sure that they aren't using defective sails. Phones and computers (laptops and desktops) run by individuals usually don't run SSL, since it's a nodule or object file used by the web server - which your phone doesn't run (at least not open to the public - Airdroid runs a web server, but it's not secure at all, because only people on your wifi network can access it). Your laptop or desktop MAY be running a web server - but if it is, and you've graduated beyond having to read the xampp documentation every time you want to run it, you've made sure that, IF you run SSL, AND the version you run is OpenSSL, you've deleted the old file and replaced it with the corrected one.
The ONLY "vulnerability: here is that when you send OpenSSL a 1k request, you get back 1k of data FROM THE SERVER.n (The data sent is the same amount as the data received.) With the bug you can send a 1k request requesting the last 5 GB uploaded to the server, so you get all the data people have been uploading to it for hours. Whether you use a phone, a laptop or a mainframe makes no difference. The hacker can still get dsata you've put on a server running unpatched OpenSSL.
Since just about no banking the US runs OpenSSL for security, no banks are vulnerable. No HTTP site is vulnerable. (OpenSSL requires that you use HTTPS as the protocol.) And no site that's replaced or patched their OpenSSL file (which is just about all of them by now, except for people running their own web servers and not really knowing anything about running web servers) is vulnerable.
All the rest of this nonsense (including most of what you quoted) is FUDD.
Affected devices are apparently “vulnerable to a hack described as ‘reverse Heartbleed’ — where a malicious server would be able to exploit the flaw in OpenSSL to grab data from the phone’s browser, which could include information about part sessions and logins,” according to*The Guardian.
Furthermore, Lookout’s principal security researcher Marc Rogers told*Bloomberg*that a Heartbleed-based attack against Android would be a complex task.
“Given that the server attack affects such a larger number of devices and is so much easier to carry out, we don’t expect to see any attacks against devices until after the server attacks have been completely exhausted,” he said.
All versions of Android are immune to CVE-2014-0160 (with the limited exception of Android 4.1.1; patching information for Android 4.1.1 is being distributed to Android partners
OpenSSL Library Present in Android 4.1.1 and Certain Mobile Apps
We have information that although the buggy OpenSSL is integrated with the Android system, only the*Android 4.1.1 version*is affected by Heartbleed vulnerability. For devices with that version, any app installed with OpenSSL which is then used to establish SSL/TLS connections is possibly affected and can be compromised to get user information from the device memory.
However, even if your device is not using the affected version, there is still the matter of the apps themselves. We have found 273 in Google Play which are bundled with the standalone affected OpenSSL library, which means those apps can be compromised in any device.
...
A reverse client-side Heartbleed attack is possible if the remote servers those apps connect to are compromised. A reverse Heartbleed can of course also expose user device memory to a cybercriminal.
The OpenSSL Heartbleed vulnerability “allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read” [1]. Heartbleed surprised the public by allowing attackers to steal sensitive information from vulnerable websites by sending crafted SSL heartbeat messages. However, due to the fact that servers can send heartbeats to clients as well, malicious servers can, in turn, attack vulnerable clients and steal sensitive information. For the Android platform, we find that roughly 150M downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed.
Currently there are about 17 antivirus apps on Google Play branded as “Heartbleed detectors”. Six of them scan the OpenSSL library belonging to the Android platform for vulnerabilities. Unfortunately, this method isn’t sufficient for detecting the Heartbleed vulnerability on Android. Except in limited Android versions (mainly 4.1.0-4.1.1), the majority of Android platforms are not vulnerable, as most versions use OpenSSL libraries that are not vulnerable or simply have the OpenSSL heartbeat functionality disabled.
However, Android apps frequently use native libraries, which either directly or indirectly leverage vulnerable OpenSSL libraries. Therefore, even though the Android platform itself is not vulnerable, attackers can still attack those vulnerable apps. They can hijack the network traffic, redirect the app to a malicious server and then send crafted heartbeats messages to the app to steal sensitive memory contents.
We studied apps with vulnerable OpenSSL libraries and confirmed this attack.
From that I conclude:On April 10th, we scanned more than 54K Google Play apps (each with over 100K downloads) and found that there were at least 220 million downloads affected by the Heartbleed vulnerability.