{"id":64448,"date":"2018-05-15T18:34:48","date_gmt":"2018-05-15T16:34:48","guid":{"rendered":"https:\/\/blog.mailfence.com\/vulnerabilidade-efail-openpgp\/"},"modified":"2025-09-16T16:09:10","modified_gmt":"2025-09-16T14:09:10","slug":"vulnerabilidade-efail-openpgp","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/","title":{"rendered":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)"},"content":{"rendered":"\n<p>Novas vulnerabilidades em muitos clientes de correio OpenPGP e S\/MIME <a href=\"https:\/\/efail.de\/\">foram descobertas<\/a> recentemente. Essas vulnerabilidades &#8220;Efail&#8221; atra\u00edram muito interesse na m\u00eddia. De acordo com nossa an\u00e1lise, <strong>o Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)<\/strong>. Al\u00e9m disso, dadas as quest\u00f5es levantadas no documento t\u00e9cnico, <strong>o pr\u00f3prio protocolo OpenPGP \u00e9 seguro<\/strong>, se voc\u00ea n\u00e3o estiver usando um cliente de e-mail com bugs.<\/p>\n\n\n\n<p>Vulnerabilidades do OpenPGP reveladas no documento de vulnerabilidade do Efail: Por que o Mailfence n\u00e3o foi impactado?<\/p>\n\n\n\n<p>H\u00e1 dois ataques perturbadores revelados pelos pesquisadores de seguran\u00e7a. No entanto, para realiz\u00e1-los:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;<strong>o invasor deve ter acesso a e-mails criptografados, por exemplo, comprometendo contas de e-mail, servidores de e-mail, sistemas de backup ou espionando o tr\u00e1fego de rede.<\/strong><\/li>\n\n\n\n<li><strong>&nbsp;o atacante deve enviar ou reproduzir e-mails interceptados\/modificados para o seu destino.<\/strong><\/li>\n<\/ul>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100849\" class=\"elementor elementor-100849 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Sua su\u00edte de produtividade segura<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere sua privacidade com<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensagens<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calend\u00e1rios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/pt\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crie sua conta gratuita no Mailfence<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-vulnerabilidades-de-openpgp-divulgadas-no-documento-de-vulnerabilidade-efail-por-que-mailfence-nao-foi-afetado\">Vulnerabilidades de OpenPGP divulgadas no documento de vulnerabilidade Efail: por que Mailfence n\u00e3o foi afetado<\/h2>\n\n\n\n<p>Existem dois ataques preocupantes demonstrados pelos pesquisadores de seguran\u00e7a. No entanto, para retir\u00e1-lo:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>o invasor precisa acessar os e-mails criptografados, por exemplo, comprometendo contas de e-mail, servidores de e-mail, sistemas de backup ou espionando o tr\u00e1fego da rede.<\/li>\n\n\n\n<li>o invasor precisa enviar ou reproduzir os e-mails interceptados\/codificados em dire\u00e7\u00e3o ao seu destino.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">1. Ataque por \u201cinfiltra\u00e7\u00e3o direta\u201d<\/h3>\n\n\n\n<p>Esse tipo de ataque aproveita o fato de que os programas de e-mail modernos optam por exibir o c\u00f3digo HTML para o usu\u00e1rio. Neste caso, o atacante simplesmente constr\u00f3i o novo e-mail (do antigo\/recuperado) come\u00e7ando com uma parte de texto claro com uma tag &lt;img&gt; ou &lt;style&gt; que inclui o texto cifrado capturado, para finalmente abordar o destinat\u00e1rio. Quando o cliente de e-mail do destinat\u00e1rio exibe toda a mensagem descriptografada, incluindo o texto cifrado incorporado (como texto n\u00e3o criptografado), o conte\u00fado ativo das imagens ou estilos carregados externamente buscar\u00e1 o texto sem formata\u00e7\u00e3o por meio dos URLs necess\u00e1rios para um servidor remoto.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Por que o Mailfence n\u00e3o \u00e9 afetado pelo ataque de &#8220;infiltra\u00e7\u00e3o direta&#8221;?<\/h4>\n\n\n\n<p>Ao receber e-mails criptografados (mensagens ASCII PGP selecionadas) ou e-mails contendo conte\u00fado criptografado aninhado (mistura de texto simples e criptograma), o Mailfence nunca tenta descriptograf\u00e1-los imediatamente ou automaticamente. Isso ocorre porque esse procedimento exige a frase de criptografia da chave privada dos usu\u00e1rios que apenas o usu\u00e1rio conhece.<\/p>\n\n\n\n<p>Assim, quando um usu\u00e1rio abre uma mensagem desse tipo, uma tentativa de ataque desse tipo resultar\u00e1 apenas no envio do texto criptografado para a URL necess\u00e1ria (que o atacante j\u00e1 possui, pela constru\u00e7\u00e3o do ataque), e isso somente se o usu\u00e1rio optar por carregar o conte\u00fado remoto, que est\u00e1 sempre desativado por padr\u00e3o.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"52\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/10\/MF_not_impacted_efail-300x52.jpg\" alt=\"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)\" class=\"wp-image-7215\" style=\"width:642px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/10\/MF_not_impacted_efail-300x52.jpg 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/10\/MF_not_impacted_efail.jpg 587w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n\n\n\n<p>Porque todos os textos criptografados aninhados s\u00e3o descriptografados somente quando o usu\u00e1rio clica explicitamente no prompt &#8220;Decrypt&#8221; (somente para o bloco de texto criptografado aninhado em quest\u00e3o). No entanto, eles s\u00f3 ser\u00e3o descriptografados como texto simples, o que tornar\u00e1 imposs\u00edvel o sucesso desse tipo de ataque.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Ataque do tipo &#8220;gadget de maleabilidade&#8221;<\/h3>\n\n\n\n<p>Esta segunda vulnerabilidade tira proveito da falta de uma verifica\u00e7\u00e3o de integridade do OpenPGP <a href=\"https:\/\/lists.gnupg.org\/pipermail\/gnupg-users\/2018-May\/060334.html\">requerida pela comunidade de desenvolvedores desde 1999<\/a>. Isso corresponde \u00e0 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Malleability_(cryptography)\">apar\u00eancia male\u00e1vel<\/a> do Modo de Feedback de Cifra (CFB), o modo de criptografia usado pelo OpenPGP para suas opera\u00e7\u00f5es de <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica-x-assimetrica-qual-e-a-diferenca\/\">criptografia sim\u00e9trica<\/a>. Como resultado, um invasor pode recuperar texto sem formata\u00e7\u00e3o (fora do texto criptografado capturado) combinando-o com os canais de infiltra\u00e7\u00e3o especificados, usando um ataque de <a href=\"https:\/\/pt.wikipedia.org\/wiki\/Indistinguibilidade_de_textos_cifrados\">texto sem formata\u00e7\u00e3o escolhido<\/a> assim que o cliente de e-mail abrir a mensagem modificada em forma decifrada.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Por que o Mailfence n\u00e3o \u00e9 afetado pelo ataque &#8220;Malleability gadget&#8221;?<\/h4>\n\n\n\n<p>O Mailfence usa a biblioteca <a href=\"https:\/\/openpgpjs.org\/\">openpgpjs<\/a> de c\u00f3digo aberto para sua parte front-end que lida com opera\u00e7\u00f5es de criptografia e descriptografia de ponta a ponta. Essa biblioteca usa o pacote OpenPGP Symmetric Integral Encryption (SEIP), que inclui o uso do Change Detection Code (MDC) para verifica\u00e7\u00f5es de integridade de texto sem formata\u00e7\u00e3o. Se a verifica\u00e7\u00e3o de integridade falhar (ou n\u00e3o existir), a biblioteca se recusar\u00e1 a carregar o conte\u00fado descriptografado. Se o pacote SEIP \u00e9 transformado em um pacote simetricamente criptografado (SE) &#8211; outro m\u00e9todo que os pesquisadores destacaram &#8211; a biblioteca n\u00e3o ir\u00e1 suport\u00e1-lo e considera esta pr\u00e1tica como obsoleta.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Recomenda\u00e7\u00f5es para usu\u00e1rios do OpenPGP usando clientes de e-mail afetados<\/h4>\n\n\n\n<p>Como a vulnerabilidade do Efail n\u00e3o est\u00e1 presente no OpenPGP em si, mas na verdade est\u00e1 associada a clientes de correio com bugs, recomendamos que voc\u00ea fa\u00e7a as seguintes atenua\u00e7\u00f5es se usar sua conta do Mailfence com um dos clientes de e-mail com bugs listados.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;Descriptografar e-mails fora do cliente de e-mail<br>Utilizar um aplicativo separado (baseado em linha de comando) fora do seu cliente de e-mail para descriptografar os e-mails recebidos impedir\u00e1 a abertura dos canais de infiltra\u00e7\u00e3o. Para fazer isso, voc\u00ea precisar\u00e1 salvar a mensagem recebida em um arquivo e, em seguida, abri-lo usando uma linha de comando (link em ingl\u00eas).<\/li>\n\n\n\n<li>&nbsp;Desativar a renderiza\u00e7\u00e3o de HTML e o carregamento de conte\u00fado remoto<br>Impedir que seu cliente de e-mail converta HTML e carregue conte\u00fado remoto impedir\u00e1 a forma predominante de instala\u00e7\u00e3o do canal de infiltra\u00e7\u00e3o. Por favor, consulte a documenta\u00e7\u00e3o espec\u00edfica do seu cliente de e-mail nesta \u00e1rea.<\/li>\n<\/ul>\n\n\n\n<p>Por exemplo, Thunderbird:<\/p>\n\n\n\n<p>Desativar HTML:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>No canto superior direito, clique no bot\u00e3o Menu.<br>2. Clique em <strong>Exibir<\/strong>.<br>3. Em &#8220;<strong>Corpo da mensagem como<\/strong>&#8220;, selecione &#8220;<strong>Texto sem formata\u00e7\u00e3o<\/strong>&#8220;.<br>Desativar conte\u00fado externo:<br>1. No canto superior direito, clique no bot\u00e3o <strong>Menu<\/strong>.<br>2. Clique em <strong>Op\u00e7\u00f5es<\/strong>.<br>2. Em &#8220;Privacidade&#8221;, selecione &#8220;<strong>Texto sem formata\u00e7\u00e3o<\/strong>&#8220;.<br>3. Na se\u00e7\u00e3o &#8220;Conte\u00fado do Mail&#8221;, desmarque &#8220;<strong>Allow remote content in messages<\/strong>&#8220;.<\/li>\n<\/ol>\n\n\n\n<p>Novamente, como as vulnerabilidades n\u00e3o est\u00e3o no pr\u00f3prio protocolo OpenPGP, nem \u00e9 preciso dizer, aplique atualiza\u00e7\u00f5es ao seu cliente de e-mail baseado em OpenPGP assim que estiverem dispon\u00edveis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-outros-pontos-sobre-vulnerabilidade-efail\">Outros pontos sobre vulnerabilidade Efail<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>O OpenPGP continua sendo uma das melhores maneiras de <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografar-email\/\">criptografar<\/a> e-mails e, se implementado corretamente e usado com seguran\u00e7a, pode ser confi\u00e1vel. Os problemas de vulnerabilidade do Efail destacados pelos pesquisadores de seguran\u00e7a correspondem a como <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-e-mail-ponta-a-ponta-como-funciona\/\">criptografia de ponta a ponta<\/a> os protocolos interagem com programas de e-mail modernos que implementam esses protocolos. Isso significa que, se algum destinat\u00e1rio estiver usando o cliente de e-mail com erros, ele poder\u00e1 exfiltrar o texto simples dos e-mails criptografados. Outra raz\u00e3o pela qual voc\u00ea deve encorajar outras pessoas a usar servi\u00e7os de e-mail seguros e privados, como <a href=\"https:\/\/mailfence.com\/\">Mailfence<\/a>.<\/li>\n\n\n\n<li>Na Mailfence, por padr\u00e3o, todos os e-mails criptografados de ponta a ponta s\u00e3o sempre enviados com assinaturas digitais, uma pr\u00e1tica que voc\u00ea deve defender entre seus c\u00edrculos sociais e profissionais. Verifique tamb\u00e9m nosso <a href=\"https:\/\/blog.mailfence.com\/pt\/praticas-criptografia-openpgp\/\">criptografia OpenPGP<\/a> +&nbsp;<a href=\"https:\/\/blog.mailfence.com\/pt\/praticas-assinatura-digital-openpgp\/\">login digital<\/a> postagem do blog de pr\u00e1ticas recomendadas e aplique TFA em suas contas.<\/li>\n<\/ul>\n\n\n\n<p>Como um dos mais <a href=\"https:\/\/mailfence.com\/pt\/e-mail-seguro.jsp\">seguro<\/a>&nbsp;e <a href=\"https:\/\/mailfence.com\/pt\/e-mail-privado.jsp\">privado<\/a> su\u00edtes de e-mail, levamos a seguran\u00e7a e a privacidade dos dados do usu\u00e1rio muito a s\u00e9rio e nos esfor\u00e7amos para melhorar nosso servi\u00e7o de todas as maneiras poss\u00edveis. Contate-nos caso tenha sugest\u00f5es ou d\u00favidas.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Novas vulnerabilidades em muitos clientes de correio OpenPGP e S\/MIME foram descobertas recentemente. Essas vulnerabilidades &#8220;Efail&#8221; atra\u00edram muito interesse na m\u00eddia. De acordo com nossa an\u00e1lise, o Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP). Al\u00e9m disso, dadas as quest\u00f5es levantadas no documento t\u00e9cnico, o pr\u00f3prio protocolo OpenPGP \u00e9 seguro, se voc\u00ea n\u00e3o estiver [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85870,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18582,18572,1379],"tags":[],"class_list":["post-64448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-do-mailfence","category-privacidade-on-line","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail Seguran\u00e7a de e-mail<\/title>\n<meta name=\"description\" content=\"Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP). O protocolo OpenPGP \u00e9 seguro, n\u00e3o usando com um cliente de e-mails com bugs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP) | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP) | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-15T16:34:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T14:09:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/05\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)\",\"datePublished\":\"2018-05-15T16:34:48+00:00\",\"dateModified\":\"2025-09-16T14:09:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/\"},\"wordCount\":1231,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png\",\"articleSection\":[\"Not\u00edcias do Mailfence\",\"Privacidade on-line\",\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/\",\"name\":\"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail Seguran\u00e7a de e-mail\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png\",\"datePublished\":\"2018-05-15T16:34:48+00:00\",\"dateModified\":\"2025-09-16T14:09:10+00:00\",\"description\":\"Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP). O protocolo OpenPGP \u00e9 seguro, n\u00e3o usando com um cliente de e-mails com bugs\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png\",\"width\":600,\"height\":600,\"caption\":\"\\\"\\\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/vulnerabilidade-efail-openpgp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/category\\\/seguranca-de-email\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail Seguran\u00e7a de e-mail","description":"Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP). O protocolo OpenPGP \u00e9 seguro, n\u00e3o usando com um cliente de e-mails com bugs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/","og_locale":"pt_BR","og_type":"article","og_title":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP) | Mailfence Blog","og_description":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP) | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2018-05-15T16:34:48+00:00","article_modified_time":"2025-09-16T14:09:10+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/05\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"M Salman Nadeem","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)","datePublished":"2018-05-15T16:34:48+00:00","dateModified":"2025-09-16T14:09:10+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/"},"wordCount":1231,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/05\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png","articleSection":["Not\u00edcias do Mailfence","Privacidade on-line","Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/","url":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/","name":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail Seguran\u00e7a de e-mail","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/05\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png","datePublished":"2018-05-15T16:34:48+00:00","dateModified":"2025-09-16T14:09:10+00:00","description":"Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP). O protocolo OpenPGP \u00e9 seguro, n\u00e3o usando com um cliente de e-mails com bugs","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/05\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2018\/05\/Mailfence_not_impacted_by_Efail_vulnerabilities1.png","width":600,"height":600,"caption":"\"\""},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/vulnerabilidade-efail-openpgp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"O Mailfence n\u00e3o \u00e9 afetado pela vulnerabilidade do Efail (OpenPGP)"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/pt\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=64448"}],"version-history":[{"count":8,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64448\/revisions"}],"predecessor-version":[{"id":103206,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64448\/revisions\/103206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/85870"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=64448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=64448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=64448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}