We mentioned in our prior post the potential legal issues that The Heartbleed Bug will create from the standpoint of data breach and safe harbor, especially given the prospect of compromised keys. A number of people, however, have asked how the vulnerability works from a practical standpoint. We caught up with Jesper Jurcenoks from Critical Watch on Twitter, and JJ had this excellent graphical depiction of Heartbleed that he has graciously allowed us to share here:

Click here to view image.

For more technical details regarding the vulnerability, including a list of products, footnotes and a video, Jesper and Critical Watch have some other excellent materials.