You are incorrect on almost everything you've said.
1) Only specific versions of OpenSSL are affected by this vulnerability. They are 1.0.1, 1.0.1a through to 1.0.1f inclusive. 1.0.2-beta is also affected but this isn't a stable release. 1.0.1g is the fixed version. Many sites running OpenSSL are absolutely fine by virtue of the fact they are not, and never were, using a vulnerable version.
2) There is a very specific test which can be performed that shows precisely whether a web server using OpenSSL is vulnerable to this. That is, quite simply, trying to send a malformed SSL heartbeat packet and observing the server's response.
I'm hardly "incorrect," whether "almost everything" or not. I was speaking in a very broad sense about "running OpenSSL," because most on this forum don't need or don't care about the particulars. Do you note the original question? It wasn't about whether Origin or EA are running vulnerable versions of OpenSSL, but the broad question that 99.9% of users are asking. It's a rare home user will ask, "Hey, has the admin patched the latest fixed version of OpenSSL?"
That web-based test, and any others, merely look for, ahem,
if a server is running potentially affected software. Which do you think a home user is going to do, run a script (David Grant from the EFF has one to test multiple servers), or do a relatively simple web-based test? If a site has been "possibly" affected, then someone can go through the routine of changing passwords, checking any statements, and so on. Similarly, only high risk factors for HIV warrant the expense of a genuine test.
But in the end, the only way to determine if a site has indeed been compromised, not just has been vulnerable, is by its admins themselves. I seem to remember saying something about that.