Messente avatar logo

Security Notification – SSLv3 POODLE Vulnerability

- 5 MIN READ - 20 Oct 2014

On 14th October the OpenSSL team reported that version 3 of Secure Sockets Layer (SSLv3) is vulnerable at protocol level – called Phttp://en.wikipedia.org/wiki/POODLE OODLE attack (Padding Oracle On Downgraded Legacy Encryption).

As a security precaution Messente has disabled SSLv3 in our servers therefore Messente HTTP API is no more vulnerable to the POODLE exploit.

In most cases your Messente https:// API integration should already support secure TLS protocol and no action is needed for Messente HTTP API users.

You can also take a look at Scott Helme’s step-by-step guide on mitigating this vulnerability on multiple platforms, web servers and clients.

If you notice any issues with the API calls to Messente servers, please let us know at support@messente.com and we will help you with integration to new and secure TLS protocol.

Jaanus Rõõmus

Jaanus Rõõmus - CTO

Jaanus is co-founder and CTO of Messente and makes sure its wheels keep spinning and Messente always has a full tank of fuel.

Underlying reasons for trends in SMS traffic

25 Apr 2017

In a recent article (it's in Estonian, but you'll get the gist of it in this blog,) Tele2 - a local mobile network operator in the Baltics - highlighted a few interesting trends about the growth or decline of certain types of messaging traffic.

Lauri Kinkar

Lauri Kinkar

Underlying drivers of GLobal SMS traffic

25 Apr 2017

In a recent article (it's in Estonian, but you'll get the gist of it in this blog,) Tele2 - a local mobile network operator in the Baltics - highlighted a few interesting trends about the growth and decline of certain types of SMS messaging traffic.

Lauri Kinkar

Lauri Kinkar

Digging for gold part 2

22 Mar 2017

This is a continuation from the previous article and focuses on the methods of research and how to find leads.
Uku Tomikas

Uku Tomikas

Start sending messages to

for € N/A

Contact us