The fact that they're <i>able</i> to "double your password" is a bad sign. Here's what this implies to me:<p>* McGill had a database of everyone's password in plaintext at the time of Heartbleed<p>* McGill is concerned about mitigating possible security compromises due to Heartbleed, including these plaintext passwords, which if they were compromised were compromised all at once<p>* Despite this concern, McGill <i>still</i> has a database of everyone's password in plaintext. Oh, and a large proportion of them are still the possibly-compromised ones.<p>* They're comfortable announcing this fact to the Web, for some reason.<p>I really hope the first thing they do after doubling the password is put it into a password-hashing function and throw away the plaintext, and then make those users change them anyway, because the doubled passwords are still compromised. It sounds unlikely.