{"id":63929,"date":"2023-02-23T10:07:30","date_gmt":"2023-02-23T09:07:30","guid":{"rendered":"https:\/\/blog.mailfence.com\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/"},"modified":"2025-12-10T20:32:34","modified_gmt":"2025-12-10T19:32:34","slug":"criptografia-simetrica-x-assimetrica-qual-e-a-diferenca","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/","title":{"rendered":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"63929\" class=\"elementor elementor-63929 elementor-15363\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-516e20df e-flex e-con-boxed e-con e-parent\" data-id=\"516e20df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a13cb6b elementor-widget elementor-widget-text-editor\" data-id=\"6a13cb6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Neste artigo, explicaremos as principais diferen\u00e7as entre criptografia sim\u00e9trica e assim\u00e9trica e quando utilizar cada destes m\u00e9todos.<\/p>\n\n<h2 class=\"wp-block-heading\">Diferentes m\u00e9todos de criptografia<\/h2>\n\n<p>Os golpistas e criminosos est\u00e3o cada vez mais presentes no mundo digital. Entre esquemas de engenharia social e softwares maliciosos cada vez mais sofisticados, a melhor forma de se proteger contra o roubo de informa\u00e7\u00f5es online \u00e9 criptografar tudo. Felizmente, existem tr\u00eas m\u00e9todos de criptografia bastante utilizados: <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica\/\">criptografia sim\u00e9trica<\/a>, <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-e-mail-ponta-a-ponta-como-funciona\/\">criptografia assim\u00e9trica<\/a> e fun\u00e7\u00f5es hash (sem chave).<\/p>\n\n<p>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"98650\" class=\"elementor elementor-98650 elementor-96253 elementor-96253\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b44a55c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b44a55c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3795981\" data-id=\"3795981\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-907509e elementor-widget elementor-widget-text-editor\" data-id=\"907509e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Receba as \u00faltimas novidades sobre privacidade no seu e-mail<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-838b7ca elementor-widget elementor-widget-text-editor\" data-id=\"838b7ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Inscreva-se na Newsletter da Mailfence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e81452d elementor-button-align-end elementor-widget elementor-widget-form\" data-id=\"e81452d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;button_width&quot;:&quot;20&quot;,&quot;step_next_label&quot;:&quot;Pr\\u00f3ximo&quot;,&quot;step_previous_label&quot;:&quot;Anterior&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"newsletter_signup\" name=\"Novo formul\u00e1rio\" aria-label=\"Novo formul\u00e1rio\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"98650\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"e81452d\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Gmail vs Mailfence: Um guia de compara\u00e7\u00e3o completo (2026)\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"99692\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-60 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-lg  elementor-field-textual\" placeholder=\"E-mail\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-20 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inscreva-se<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/p>\n\n<p>Neste artigo, falaremos sobre as duas primeiras op\u00e7\u00f5es, deixando a terceira (fun\u00e7\u00f5es de hash) para mais tarde.<\/p>\n\n<p>O <a href=\"https:\/\/mailfence.com\/pt\/\">Mailfence<\/a> utiliza tanto a criptografia sim\u00e9trica quanto a criptografia assim\u00e9trica. Ambas as op\u00e7\u00f5es t\u00eam vantagens e desvantagens (voc\u00ea vai aprender tudo sobre eles a seguir), mas a principal diferen\u00e7a entre elas \u00e9 que a criptografia sim\u00e9trica usa a mesma chave para criptografar e descriptografar informa\u00e7\u00f5es, enquanto a criptografia assim\u00e9trica utiliza duas chaves diferentes.<\/p>\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" title=\"Criptografia sim\u00e9trica x assim\u00e9trica\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/02\/Symmetric-vs-Asymmetric-encryption-2.png\" alt=\"Criptografia sim\u00e9trica x assim\u00e9trica.\" \/>\n<figcaption class=\"wp-element-caption\">Criptografia sim\u00e9trica x assim\u00e9trica.<\/figcaption>\n<\/figure>\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Criptografia Sim\u00e9trica<\/strong><\/td>\n<td><strong>Criptografia assim\u00e9trica<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Utiliza uma \u00fanica chave para criptografar e descriptografar informa\u00e7\u00f5es<\/td>\n<td>Utiliza duas chaves diferentes para criptografar e descriptografar informa\u00e7\u00f5es<\/td>\n<\/tr>\n<tr>\n<td>Processo de criptografia mais r\u00e1pido<\/td>\n<td>Processo de criptografia mais lento<\/td>\n<\/tr>\n<tr>\n<td>Chaves de 128 a 256 bits<\/td>\n<td>Chaves de 2048 bits ou mais<\/td>\n<\/tr>\n<tr>\n<td>N\u00e3o utiliza muitos recursos<\/td>\n<td>Utiliza mais recursos<\/td>\n<\/tr>\n<tr>\n<td>O texto cifrado \u00e9 menor ou do mesmo tamanho que o texto simples original<\/td>\n<td>O texto cifrado \u00e9 maior ou do mesmo tamanho que o texto cifrado original<\/td>\n<\/tr>\n<tr>\n<td>Oferece autenticidade<\/td>\n<td>Oferece autenticidade e irretratabilidade<\/td>\n<\/tr>\n<tr>\n<td>Exemplo de algoritmos incluem AES, DES, 3DES, IDEA e Blowfish<\/td>\n<td>Exemplo de algoritmos incluem RSA, ECC, DSA e El Gamal<\/td>\n<\/tr>\n<tr>\n<td>Melhor para lidar com grandes quantidades de dados<\/td>\n<td>Melhor para lidar com quantidades menores de dados<\/td>\n<\/tr>\n<tr>\n<td>A chave pode ser roubada se n\u00e3o for armazenada de forma segura<\/td>\n<td>A chave privada n\u00e3o pode ser recuperada se for perdida<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n\n<h3 id=\"h-o-que-e-criptografia-simetrica\" class=\"wp-block-heading\">O que \u00e9 criptografia sim\u00e9trica?<\/h3>\n\n<p>Mas afinal, o que \u00e9 criptografia sim\u00e9trica? Este tipo de criptografia, tamb\u00e9m conhecido como criptografia de chave sim\u00e9trica, utiliza apenas uma chave para criptografar e descriptografar informa\u00e7\u00f5es. Esta chave deve ser ent\u00e3o compartilhada com o destinat\u00e1rio.\u00a0<\/p>\n\n<p>Por exemplo, digamos que voc\u00ea queira enviar um email com a mensagem \u201cEu te amo\u201d para a sua m\u00e3e. Voc\u00ea s\u00f3 precisa redigir o email e definir uma chave secreta ou senha para criptograf\u00e1-lo. Quando a sua m\u00e3e receber o email, ela dever\u00e1 utilizar a mesma chave secreta para descriptograf\u00e1-lo.<\/p>\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" title=\"Criptografia sim\u00e9trica\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/02\/Symmetric-encryption-pic-2.png\" alt=\"Criptografia assim\u00e9trica.\" \/>\n<figcaption class=\"wp-element-caption\">Criptografia sim\u00e9trica.<\/figcaption>\n<\/figure>\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n<h3 class=\"wp-block-heading\">Pr\u00f3s e contras da criptografia sim\u00e9trica<\/h3>\n\n<p>Aqui est\u00e3o os principais pr\u00f3s e contras da criptografia sim\u00e9trica:<\/p>\n\n<p><strong>Pr\u00f3s:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Mais f\u00e1cil de implementar e usar<\/li>\n\n<li>Mais r\u00e1pida do que a criptografia assim\u00e9trica<\/li>\n\n<li>S\u00e3o necess\u00e1rios menos recursos<\/li>\n\n<li>Ideal para lidar e transferir grandes quantidades de dados<\/li>\n<\/ul>\n\n<p><strong>Contras:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Se a chave sim\u00e9trica for perdida, os dados criptografados com ela podem ser comprometidos<\/li>\n\n<li>A chave sim\u00e9trica deve ser compartilhada de forma segura com a outra parte<\/li>\n<\/ul>\n\n<h3 id=\"h-como-o-mailfence-incorpora-chaves-simetricas\" class=\"wp-block-heading\">Como o Mailfence incorpora chaves sim\u00e9tricas?<\/h3>\n\n<p>O Mailfence oferece mensagens criptografadas por senha (PEM) com base em criptografia sim\u00e9trica. A solu\u00e7\u00e3o permite a defini\u00e7\u00e3o de uma dica para ajudar o destinat\u00e1rio a descriptografar a mensagem, assim como o compartilhamento da senha via SMS, chamada telefonica ou pessoalmente.<\/p>\n\n<p>O recurso tamb\u00e9m permite definir uma data de validade para o email. Ap\u00f3s a data de expira\u00e7\u00e3o, o e-mail n\u00e3o pode mais ser descriptografado. Al\u00e9m disso, armazenamos mensagens criptografadas por senha em um ambiente de prova de conhecimento zero protegido por senha. Dessa forma, apenas o destinat\u00e1rio pode acessar a mensagem.<\/p>\n\n<p>Visite a nossa <a href=\"https:\/\/kb.mailfence.com\/categories\/password-encryption\/\">base de conhecimento<\/a> para saber mais.<\/p>\n\n<p>Aqui est\u00e3o algumas boas pr\u00e1ticas para manter a sua senha (PEM) ainda mais protegida:<\/p>\n\n<ol class=\"wp-block-list\">\n<li>N\u00e3o utilize a frase de seguran\u00e7a do OpenPGP<\/li>\n\n<li>N\u00e3o utilize a senha da sua conta Mailfence<\/li>\n\n<li>Ao enviar mensagens confidenciais, defina uma senha forte e dif\u00edcil de adivinhar<\/li>\n<\/ol>\n\n<p>Existem muitos algoritmos de criptografia sim\u00e9trica, como AES, DES, 3DES, IDEA. O Mailfence utiliza o AES em combina\u00e7\u00e3o com outras cifras.<\/p>\n\n<h2 class=\"wp-block-heading\">O que \u00e9 criptografia assim\u00e9trica?<\/h2>\n\n<p>E o que \u00e9 criptografia assim\u00e9trica? Como j\u00e1 mencionamos, a criptografia de chave assim\u00e9trica precisa de duas chaves diferentes para funcionar. Uma <a href=\"https:\/\/blog.mailfence.com\/pt\/como-compartilhar-chave-publica-openpgp\/\">chave p\u00fablica<\/a> \u00e9 utilizada para criptografar os dados, enquanto uma chave privada \u00e9 utilizada para descriptograf\u00e1-los. Parece complicado, mas este recurso \u00e9 <a href=\"https:\/\/kb.mailfence.com\/kb\/how-to-generate-your-openpgp-key-pair-or-a-personal-key\/\">mais simples do que parece<\/a>.<\/p>\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" title=\"Criptografia assim\u00e9trica\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/02\/Asymmetric-encryption-pic.png\" alt=\"Criptografia assim\u00e9trica\" \/>\n<figcaption class=\"wp-element-caption\">Criptografia assim\u00e9trica.<\/figcaption>\n<\/figure>\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n<p>Embora n\u00e3o sejam a mesma coisa, as chaves p\u00fablica e privada est\u00e3o relacionadas. Basicamente, voc\u00ea escreve sua mensagem e utiliza a chave p\u00fablica do destinat\u00e1rio para criptograf\u00e1-la. Depois disso, se o destinat\u00e1rio quiser descriptografar a mensagem, ele ter\u00e1 que faz\u00ea-lo com sua pr\u00f3pria chave privada.<\/p>\n\n<p>Como voc\u00ea pode perceber, a chave privada deve ser mantida em seguran\u00e7a, de prefer\u00eancia em um dispositivo local. A criptografia assim\u00e9trica tamb\u00e9m exige um pouco mais de conhecimento t\u00e9cnico para ser utilizada.<\/p>\n\n<p>Na maioria dos casos, o software de e-mail do destinat\u00e1rio ser\u00e1 capaz de autenticar a chave privada automaticamente, garantindo que ela seja correspondente \u00e0 chave p\u00fablica. Tudo o que o destinat\u00e1rio precisa fazer ent\u00e3o \u00e9 confirmar a sua senha para descriptografar a mensagem.<\/p>\n\n<p>Aqui est\u00e3o algumas boas pr\u00e1ticas para manter as sua chaves assim\u00e9tricas protegidas:<\/p>\n\n<ol class=\"wp-block-list\">\n<li>Utilize chaves de 2048-bits ou mais<\/li>\n\n<li>Armazene a sua chave privada em um dispositivo local, para evitar esquec\u00ea-la<\/li>\n\n<li>N\u00e3o compartilhe a sua chave privada<\/li>\n<\/ol>\n\n<p>A cria\u00e7\u00e3o de chaves fortes \u00e9 a base da criptografia assim\u00e9trica. No entanto, nem todo mundo tem o conhecimento t\u00e9cnico necess\u00e1rio para utilizar esta op\u00e7\u00e3o. Por este motivo, \u00e9 sempre uma boa ideia utilizar mais de um m\u00e9todo de criptografia.<\/p>\n\n<p>O Mailfence utiliza criptografia assim\u00e9trica baseada no algoritmo RSA para chaves baseadas em OpenPGP. Tamb\u00e9m oferecemos suporte para o algoritmo ECC (Curve 25519).<\/p>\n\n<h3 class=\"wp-block-heading\">Pr\u00f3s e contras da criptografia assim\u00e9trica<\/h3>\n\n<p>Aqui est\u00e3o os principais pr\u00f3s e contras da criptografia assim\u00e9trica:<\/p>\n\n<p><strong>Pr\u00f3s:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Os dados s\u00f3 podem ser descriptografados com a chave privada do propriet\u00e1rio<\/li>\n\n<li>Se a chave p\u00fablica for perdida ou roubada, os dados n\u00e3o ser\u00e3o comprometidos<\/li>\n\n<li>Permite confidencialidade e autentica\u00e7\u00e3o sem retratabilidade<\/li>\n<\/ul>\n\n<p><strong>Contras:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>\u00c9 mais lenta do que a criptografia assim\u00e9trica<\/li>\n\n<li>Utiliza mais recursos<\/li>\n\n<li>A chave privada n\u00e3o pode ser recuperada caso seja perdida<\/li>\n<\/ul>\n\n<h2 id=\"h-qual-metodo-de-criptografia-voce-deve-utilizar\" class=\"wp-block-heading\">Qual m\u00e9todo de criptografia voc\u00ea deve utilizar?<\/h2>\n\n<p>Agora que voc\u00ea sabe o que \u00e9 criptografia sim\u00e9trica e o que \u00e9 criptografia assim\u00e9trica, \u00e9 hora de decidir qual dessas op\u00e7\u00f5es utilizar.\u00a0<\/p>\n\n<p>A criptografia sim\u00e9trica \u00e9 mais indicada no envio de mensagens r\u00e1pidas. A criptografia assim\u00e9trica, por outro lado, s\u00f3 deve ser usada quando o destinat\u00e1rio possui uma chave p\u00fablica autenticada via OpenPGP. Ela tamb\u00e9m pode ser combinada com assinaturas digitais se voc\u00ea n\u00e3o quiser correr nenhum risco.<\/p>\n\n<p>N\u00e3o sabe como enviar e-mails criptografados? Leia o nosso <a href=\"https:\/\/blog.mailfence.com\/pt\/enviar-e-mails-criptografados\/\">guia completo<\/a> para saber mais. Esperamos ter esclarecido o conceito de criptografia sim\u00e9trica e assim\u00e9trica. Fique ligado, pois planejamos lan\u00e7ar ainda mais\u00a0artigos educacionais sobre o assunto em breve.<\/p>\n\n<h4 id=\"h-perguntas-frequentes\" class=\"wp-block-heading\">Perguntas frequentes<\/h4>\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1605522893763\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Qual \u00e9 a diferen\u00e7a entre a criptografia sim\u00e9trica e assim\u00e9trica?<\/strong>\n<p class=\"schema-faq-answer\">A criptografia sim\u00e9trica utiliza uma \u00fanica chave para criptografar e descriptografar emails. A criptografia assim\u00e9trica, por outro lado, utiliza duas chaves diferentes: uma chave p\u00fablica para criptografar a mensagem e uma chave privada correspondente para descriptograf\u00e1-la.<\/p>\n<\/div>\n<div id=\"faq-question-1605522945799\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>Qual \u00e9 o m\u00e9todo de criptografia mais seguro?<\/strong><\/strong>\n<p class=\"schema-faq-answer\">Em nossa opini\u00e3o, um m\u00e9todo de criptografia n\u00e3o \u00e9 melhor que o outro. Eles s\u00e3o simplesmente diferentes. A melhor forma de se manter protegido \u00e9 ficar atento e seguir as melhores pr\u00e1ticas de seguran\u00e7a sempre que poss\u00edvel.<\/p>\n<\/div>\n<div id=\"faq-question-1677261075465\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Qual a principal desvantagem das chaves sim\u00e9tricas?<\/strong>\n<p class=\"schema-faq-answer\">A maior desvantagem \u00e9 que voc\u00ea precisa compartilhar a chave secreta de alguma forma. Embora existam formas seguras de fazer isso, h\u00e1 sempre a possibilidade de um invasor descobrir sua a chave secreta e utiliz\u00e1-la para comprometer os seus dados.<\/p>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Neste artigo, explicaremos as principais diferen\u00e7as entre criptografia sim\u00e9trica e assim\u00e9trica e quando utilizar cada destes m\u00e9todos.<\/p>\n","protected":false},"author":3,"featured_media":92152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18572,1379],"tags":[],"class_list":["post-63929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacidade-on-line","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Criptografia sim\u00e9trica e assim\u00e9trica: Qual a diferen\u00e7a?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a? | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a? | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T09:07:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T19:32:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2023\/02\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a?\",\"datePublished\":\"2023-02-23T09:07:30+00:00\",\"dateModified\":\"2025-12-10T19:32:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/\"},\"wordCount\":1369,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg\",\"articleSection\":[\"Privacidade on-line\",\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/\",\"name\":\"Criptografia sim\u00e9trica e assim\u00e9trica: Qual a diferen\u00e7a?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg\",\"datePublished\":\"2023-02-23T09:07:30+00:00\",\"dateModified\":\"2025-12-10T19:32:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg\",\"width\":500,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacidade on-line\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/category\\\/privacidade-on-line\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual a diferen\u00e7a?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/","og_locale":"pt_BR","og_type":"article","og_title":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a? | Mailfence Blog","og_description":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a? | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2023-02-23T09:07:30+00:00","article_modified_time":"2025-12-10T19:32:34+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2023\/02\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg","type":"image\/jpeg"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"M Salman Nadeem","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a?","datePublished":"2023-02-23T09:07:30+00:00","dateModified":"2025-12-10T19:32:34+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/"},"wordCount":1369,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2023\/02\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg","articleSection":["Privacidade on-line","Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/","url":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/","name":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual a diferen\u00e7a?","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2023\/02\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg","datePublished":"2023-02-23T09:07:30+00:00","dateModified":"2025-12-10T19:32:34+00:00","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2023\/02\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2023\/02\/Featured-Image-Symmetric-vs-Asymmetric-Encryption.jpeg","width":500,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Privacidade on-line","item":"https:\/\/blog.mailfence.com\/pt\/category\/privacidade-on-line\/"},{"@type":"ListItem","position":3,"name":"Criptografia sim\u00e9trica e assim\u00e9trica: Qual \u00e9 a diferen\u00e7a?"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/pt\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/63929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=63929"}],"version-history":[{"count":7,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/63929\/revisions"}],"predecessor-version":[{"id":98753,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/63929\/revisions\/98753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/92152"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=63929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=63929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=63929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}