(This is an UPDATE to my recent post in the threads asking about this. This is the latest news.)
As widely reported online, there's a serious bug in an incredibly widely used core component of web security. (See http://www.theregister.co.uk/2014/04/08/aws_heartbleed/ and many other places.)
Logos does not use this vulnerable OpenSSL implementation on www.logos.com or our core commerce sites, where credit card transactions happen.
Logos did use OpenSSL for Amazon Web Load Balancing, which our Proclaim in-app purchasing and statistical use data servers went through.
Everything is patched and updated. We addressed the issue very quickly.
Below is more detail from our development team. Please keep in mind that this bug (in a core, open source tool) is estimated to have affect one third of the Internet. So the chances that the vulnerability was being exploited specifically at Logos' servers is slim. Still, because of how widespread the issue was, you'll want to pay attention to transaction histories and credit card charges for cards you have used for e-commerce anywhere. (Which is always a good practice!)
We apologize for the inconvenience and uncertainty that this introduces.
From our developers:
For 99% of credit cards–those entered via www.logos.com or vyrso.com, I can say with a high degree of confidence that we didn't leak credit card data.
Credit cards entered when creating a new billing profile via Procliam's in app purchasing were vulnerable during transmission to the server. The certificate that was used on Amazon Web Services is also the same certificate used for the commerce web service that Proclaim uses for in-app purchasing.
Further, if someone managed to compromise the keys in use on our services hosted at Amazon, it's possible that they were able to compromise some usernames and passwords. The signin/signout web services also use the same certificate that was used at Amazon.
These are the two most glaring/obvious potential vulnerabilities from Heartbleed for us.
We have no reason to believe that anything has, in fact, been compromised.