{"id":64377,"date":"2019-05-06T14:16:55","date_gmt":"2019-05-06T12:16:55","guid":{"rendered":"https:\/\/blog.mailfence.com\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/"},"modified":"2024-06-04T15:58:21","modified_gmt":"2024-06-04T13:58:21","slug":"mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/","title":{"rendered":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP"},"content":{"rendered":"\n<p>Novas vulnerabilidades em muitos clientes de e-mail com OpenPGP e S\/MIME foram anunciadas em 2019-04-30. Essas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura exploram pontos fracos na maneira como as assinaturas do OpenPGP s\u00e3o verificadas pelos clientes de e-mail e como o resultado da verifica\u00e7\u00e3o \u00e9 apresentado ao usu\u00e1rio. <strong>De acordo com nossa an\u00e1lise, o Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-por-que-o-mailfence-nao-e-afetado-pela-falsificacao-de-assinatura-do-openpgp\">Por que o Mailfence n\u00e3o \u00e9 afetado pela falsifica\u00e7\u00e3o de assinatura do OpenPGP<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-1024x56.png\" alt=\"Signature spoofing\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"239\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-1024x239.png\" alt=\"Signature spoofing\" class=\"wp-image-11055\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-1024x239.png 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-300x70.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-768x180.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-160x37.png 160w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-320x75.png 320w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-520x122.png 520w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-720x168.png 720w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-980x229.png 980w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp.png 1168w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>O modelo do agressor mencionado no <a href=\"https:\/\/github.com\/RUB-NDS\/Johnny-You-Are-Fired\/blob\/master\/paper\/johnny-fired.pdf\">documento t\u00e9cnico<\/a> \u00e9 o seguinte:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>O cabe\u00e7alho &#8216;De:&#8217; do e-mail \u00e9 falsificado pelo invasor usando t\u00e9cnicas de representa\u00e7\u00e3o conhecidas.<\/li>\n\n\n\n<li>O atacante obteve pelo menos uma assinatura v\u00e1lida do <a href=\"https:\/\/blog.mailfence.com\/pt\/praticas-criptografia-openpgp\/\">OpenPGP<\/a> falsificando conversas de e-mail anteriores do usu\u00e1rio.<\/li>\n\n\n\n<li>A v\u00edtima do lado da recep\u00e7\u00e3o j\u00e1 possui uma chave p\u00fablica confi\u00e1vel do remetente falsificado.<\/li>\n<\/ol>\n\n\n\n<p>Aqui est\u00e3o os ataques demonstrados pelos pesquisadores de seguran\u00e7a:<\/p>\n\n\n\n<h3 style=\"padding-left:30px;\">CMS attacks<\/h3>\n\n\n\n<p style=\"padding-left:30px;\">Mailfence does not treat container format used by S\/MIME i.e.., Cryptographic Message Syntax (CMS) and is therefore not impacted by this type of attack.<\/p>\n\n\n\n<h3 style=\"padding-left:30px;\">GPG API specific issue<\/h3>\n\n\n\n<p style=\"padding-left:30px;\">Mailfence does not use GPG engine and as such is not impacted by GnuPG API specific issues.<\/p>\n\n\n\n<h3 style=\"padding-left:30px;\">MIME attacks<\/h3>\n\n\n\n<p style=\"padding-left:30px;\">Mailfence signature verification methodology does not regard partially signed and\/or embedded signed sub-parts within a multipart message as valid. In most cases, such messages will be regarded as invalid. Moreover, any active content is always disabled by default. This means, as you opens a signed message, only the valid (correctly recognized) signature verification is performed.<\/p>\n\n\n\n<h3 style=\"padding-left:30px;\">ID attacks<\/h3>\n\n\n\n<p style=\"padding-left:30px;\">Mailfence does not attempt to bind signature identity with sender address, and only shows the signature verification result. When in doubt, users can always check the the identity of signer by clicking on the signature verification message and match it with the sender address. Concerning displaying the FROM field, Mailfence correctly handles any special characters that might try to manipulate its UI presentation to the user.<\/p>\n\n\n\n<h3 style=\"padding-left:30px;\"><strong>UI Attacks<\/strong><\/h3>\n\n\n\n<p style=\"padding-left:30px;\">Since Mailfence blocks all active content by default, any attempt to mimick the signature verification result using e.g., HTML, CSS, or inline images, will not succeed. In such cases, only the valid (i.e., correctly recognized) signature verification message will be displayed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recomendacoes-para-usuarios-que-usam-clientes-de-e-mail-afetados-por-spoofing-de-assinatura\">Recomenda\u00e7\u00f5es para usu\u00e1rios que usam clientes de e-mail afetados por spoofing de assinatura<\/h2>\n\n\n\n<p> Recomendamos que voc\u00ea execute as seguintes etapas de atenua\u00e7\u00e3o, se estiver usando sua conta do Mailfence com qualquer um dos <a href=\"https:\/\/github.com\/RUB-NDS\/Johnny-You-Are-Fired\/blob\/master\/paper\/johnny-fired.pdf\">clientes de e-mail afetados mencionados<\/a>, a fim de proteger-se contra falsifica\u00e7\u00e3o de assinaturas.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Atualize seu cliente de e-mail e \/ ou plugin habilitado para OpenPGP<br><\/strong>Pesquisadores relataram as descobertas e sugeriram melhorias para os      desenvolvedores dos clientes afetados em um processo que eles chamam de divulga\u00e7\u00e3o coordenada. Isso \u00e9 para garantir que todos os clientes afetados sejam corrigidos antes de divulgar o problema ao p\u00fablico.<\/li>\n\n\n\n<li><strong>Desativar a renderiza\u00e7\u00e3o de HTML e o carregamento de conte\u00fado remoto<br><\/strong>Evite que o seu cliente de e-mail renderize HTML e carregue conte\u00fado ativo. Isso far\u00e1 com que qualquer tentativa de falsifica\u00e7\u00e3o de mensagens de verifica\u00e7\u00e3o de assinatura seja malsucedida. Por favor, consulte a      documenta\u00e7\u00e3o espec\u00edfica do seu cliente de e-mail a este respeito. Por      exemplo. Thunderbird:<\/li>\n<\/ul>\n\n\n\n<p style=\"padding-left:30px;\">1. On the top-right corner, click on the&nbsp;<strong>Menu<\/strong> button.<br>2. Click on <strong>View<\/strong>.<br>3. Under <strong>Message Body As<\/strong>, select&nbsp;<strong>Plain Text.<\/strong><br><em>Disable external content:&nbsp;<\/em><br>1. On the top-right corner, click on the&nbsp;<strong>Menu<\/strong> button.<br>2.&nbsp;Click on <strong>Options.<\/strong><br>2.&nbsp;Under <strong>Privacy<\/strong>, select&nbsp;<strong>Plain Text<\/strong>.<br>3. In the <strong>Mail content<\/strong> section, uncheck <strong>Allow remote content in messages<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Seguir <a href=\"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-privado\/\">boas pr\u00e1ticas<\/a> e manter-se cauteloso \u00e9 sempre recomendado. Com rela\u00e7\u00e3o aos resultados da verifica\u00e7\u00e3o de assinatura, verificar os detalhes da mensagem exibida (para procurar qualquer anormalidade) \u00e9 sempre uma boa ideia.<\/li>\n<\/ul>\n\n\n\n<p>Como uma das su\u00edtes de e-mail mais<a href=\"https:\/\/mailfence.com\/pt\/e-mail-seguro.jsp\"> seguras<\/a> e <a href=\"https:\/\/mailfence.com\/pt\/e-mail-privado.jsp\">privadas<\/a>, levamos a seguran\u00e7a e a privacidade dos dados do usu\u00e1rio muito a s\u00e9rio e nos esfor\u00e7amos para melhorar nosso servi\u00e7o de todas as maneiras poss\u00edveis. Entre em contato conosco caso tenha sugest\u00f5es ou d\u00favidas sobre a falsifica\u00e7\u00e3o de assinaturas do OpenPGP.<\/p>\n\n\n\n<p>Acesse a nossa <a href=\"https:\/\/mailfence.com\/pt\/imprensa.jsp\">p\u00e1gina de imprensa<\/a> para saber mais sobre a Mailfence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Novas vulnerabilidades em muitos clientes de e-mail com OpenPGP e S\/MIME foram anunciadas em 2019-04-30. Essas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura exploram pontos fracos na maneira como as assinaturas do OpenPGP s\u00e3o verificadas pelos clientes de e-mail e como o resultado da verifica\u00e7\u00e3o \u00e9 apresentado ao usu\u00e1rio. De acordo com nossa an\u00e1lise, o Mailfence n\u00e3o [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85860,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18582,1379],"tags":[],"class_list":["post-64377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-do-mailfence","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura<\/title>\n<meta name=\"description\" content=\"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP recentemente divulgadas. Encontrar\u00e1 informa\u00e7\u00f5es\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T12:16:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-04T13:58:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP\",\"datePublished\":\"2019-05-06T12:16:55+00:00\",\"dateModified\":\"2024-06-04T13:58:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"articleSection\":[\"Not\u00edcias do Mailfence\",\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/\",\"name\":\"n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"datePublished\":\"2019-05-06T12:16:55+00:00\",\"dateModified\":\"2024-06-04T13:58:21+00:00\",\"description\":\"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP recentemente divulgadas. Encontrar\u00e1 informa\u00e7\u00f5es\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"width\":600,\"height\":600,\"caption\":\"illustration about signature spoofing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/category\\\/seguranca-de-email\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura","description":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP recentemente divulgadas. Encontrar\u00e1 informa\u00e7\u00f5es","robots":{"index":"noindex","follow":"follow"},"og_locale":"pt_BR","og_type":"article","og_title":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP | Mailfence Blog","og_description":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2019-05-06T12:16:55+00:00","article_modified_time":"2024-06-04T13:58:21+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"M Salman Nadeem","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP","datePublished":"2019-05-06T12:16:55+00:00","dateModified":"2024-06-04T13:58:21+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/"},"wordCount":726,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","articleSection":["Not\u00edcias do Mailfence","Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/","url":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/","name":"n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","datePublished":"2019-05-06T12:16:55+00:00","dateModified":"2024-06-04T13:58:21+00:00","description":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP recentemente divulgadas. Encontrar\u00e1 informa\u00e7\u00f5es","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","width":600,"height":600,"caption":"illustration about signature spoofing"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/mailfence-nao-afetado-pelas-vulnerabilidades-falsificacao-assinatura-openpgp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"O Mailfence n\u00e3o \u00e9 afetado pelas vulnerabilidades de falsifica\u00e7\u00e3o de assinatura do OpenPGP"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/pt\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=64377"}],"version-history":[{"count":4,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64377\/revisions"}],"predecessor-version":[{"id":81283,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64377\/revisions\/81283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/85860"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=64377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=64377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=64377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}