{"id":64572,"date":"2016-10-25T09:43:07","date_gmt":"2016-10-25T07:43:07","guid":{"rendered":"https:\/\/blog.mailfence.com\/e-mail-seguro-criptografia-ponta-a-ponta\/"},"modified":"2025-09-16T16:10:46","modified_gmt":"2025-09-16T14:10:46","slug":"e-mail-seguro-criptografia-ponta-a-ponta","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/","title":{"rendered":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso"},"content":{"rendered":"\n<p>Todo mundo quer se apossar de seus dados de uma forma ou de outra. N\u00e3o \u00e9 apenas NSA, Google, Facebook ou seu provedor de telecomunica\u00e7\u00f5es. At\u00e9 mesmo o aplicativo lanterna em seu smartphone e o site de com\u00e9rcio eletr\u00f4nico que voc\u00ea est\u00e1 navegando est\u00e3o tentando acessar suas informa\u00e7\u00f5es particulares. Mas ainda temos que nos comunicar com nossa fam\u00edlia, nossos parentes, colegas ou ag\u00eancias governamentais. E \u00e9 a\u00ed que entra a <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-e-mail-ponta-a-ponta-como-funciona\/\">criptografia de ponta a ponta<\/a> (veja a imagem acima), permitindo que seus dados embaralhem antes mesmo de sair do seu dispositivo. s\u00f3 pode ser lido pelo destinat\u00e1rio certo.<\/p>\n\n\n\n<p>Na pr\u00f3xima se\u00e7\u00e3o, discutiremos os diferentes aspectos de privacidade e seguran\u00e7a em e-mails. Voc\u00ea aprender\u00e1 porque a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o do e-mail seguro.<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100849\" class=\"elementor elementor-100849 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Sua su\u00edte de produtividade segura<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere sua privacidade com<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensagens<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calend\u00e1rios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/pt\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crie sua conta gratuita no Mailfence<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-e-mail-e-comunicacoes-digitais\">E-mail e comunica\u00e7\u00f5es digitais<\/h2>\n\n\n\n<p>N\u00f3s continuamente enviamos e-mails para nossos pais, amigos ou colegas. Em um dia, 215,3 bilh\u00f5es de e-mails s\u00e3o enviados. Este n\u00famero dever\u00e1 aumentar em 17% em 2019. Escusado ser\u00e1 dizer que o e-mail se tornou o centro nervoso (backbone) da comunica\u00e7\u00e3o digital, raz\u00e3o pela qual o e-mail \u00e9 agora muito atraente em termos de vigil\u00e2ncia ou massa de espionagem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-livre-nao-significa-livre\">Livre n\u00e3o significa &#8220;livre&#8221;<\/h2>\n\n\n\n<p>Todos os provedores de email convencionais afirmam que seus servi\u00e7os s\u00e3o gratuitos. N\u00e3o \u00e9 assim. Ao usar esses servi\u00e7os, o pre\u00e7o a pagar \u00e9 o abandono dos pr\u00f3prios dados. \u00c9 realmente muito s\u00e9rio!<\/p>\n\n\n\n<p>Voc\u00ea j\u00e1 pensou em quantas <a href=\"http:\/\/visual.ly\/how-much-does-google-really-know-about-you?utm_content=buffer3deb8&amp;utm_medium=social&amp;utm_source=facebook.com&amp;utm_campaign=buffer\">informa\u00e7\u00f5es o Google tem sobre voc\u00ea?<\/a><\/p>\n\n\n\n<p><strong>Manter a privacidade e a seguran\u00e7a do seu e-mail n\u00e3o \u00e9 algo f\u00e1cil<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">Abaixo est\u00e3o algumas das raz\u00f5es:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-convivialidade-versus-confidencialidade-e-seguranca-de-dados\">Convivialidade versus confidencialidade e seguran\u00e7a de dados<\/h2>\n\n\n\n<p>Muitos servi\u00e7os se concentram na facilidade de uso (o que n\u00e3o \u00e9 ruim em si). Mas essa facilidade resultou em mudan\u00e7as nas pr\u00e1ticas do usu\u00e1rio e no roubo de dados. Os usu\u00e1rios se tornam negligentes quanto \u00e0 confidencialidade de seus dados.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tenta-proibir-a-criptografia\">Tenta proibir a criptografia<\/h2>\n\n\n\n<p>As tentativas perp\u00e9tuas de proibir a criptografia nos Estados Unidos e na Europa e os esfor\u00e7os maci\u00e7os de vigil\u00e2ncia da NSA mostraram o quanto a criptografia pode ser sabotada. O racioc\u00ednio por tr\u00e1s das medidas para proibir a criptografia \u00e9 que a criptografia provavelmente ser\u00e1 usada por criminosos e cibercriminosos. No entanto, tal medida tem t\u00e3o pouco peso quanto o que teria como objetivo proibir telefones porque os criminosos os usam para cometer seus crimes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-uma-falsa-sensacao-de-seguranca\">Uma falsa sensa\u00e7\u00e3o de seguran\u00e7a<\/h2>\n\n\n\n<p>Este \u00e9 um aspecto negligenciado. Por que n\u00e3o h\u00e1 um uso maci\u00e7o de solu\u00e7\u00f5es de mensagens seguras? A causa provavelmente est\u00e1 na falta de consci\u00eancia e conhecimento entre os usu\u00e1rios finais. A maioria das pessoas n\u00e3o sabe o que significa seguran\u00e7a e privacidade online. De certa forma, isso parece bastante l\u00f3gico, porque nossa tarefa \u00e9 fornecer aos usu\u00e1rios solu\u00e7\u00f5es de mensagens seguras e f\u00e1ceis de usar. N\u00f3s n\u00e3o poder\u00edamos pedir aos usu\u00e1rios para mergulhar nos aspectos t\u00e9cnicos. No entanto, muitas organiza\u00e7\u00f5es na Internet abusam de sua confian\u00e7a, colocando backdoors em seus aplicativos, bisbilhotando seus dados ou vendendo-os. Em alguns casos, essas organiza\u00e7\u00f5es fornecem acesso secreto a ag\u00eancias de espionagem sem qualquer ordem legal.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-criptografia-de-ponta-a-ponta-esta-no-centro-da-seguranca-de-e-mail\">A criptografia de ponta a ponta est\u00e1 no centro da seguran\u00e7a de e-mail<\/h2>\n\n\n\n<p>Os usu\u00e1rios devem exigir um certo n\u00edvel de confian\u00e7a de seus fornecedores, independentemente de alegarem &#8220;conhecimento zero&#8221; de seus servi\u00e7os. Esses provedores afirmam &#8220;n\u00e3o saber nada sobre voc\u00ea&#8221;. Mas est\u00e1 absolutamente errado. Temos visto v\u00e1rios casos de mecanismos secretos altamente reputados e s\u00f3lidos, cuja informa\u00e7\u00e3o vaza.<\/p>\n\n\n\n<p>(ie: metadados: para, de, hora, n\u00famero de mensagens, tempo de cria\u00e7\u00e3o da conta, etc.)<\/p>\n\n\n\n<p>Esse tipo de informa\u00e7\u00e3o pode ser anonimizado at\u00e9 certo ponto, seja ocultando, substituindo ou criptografando-a. Infelizmente, ainda n\u00e3o vimos mecanismos que oferecem prote\u00e7\u00e3o completa contra esse tipo de vazamento de dados. No entanto, existem alguns projetos interessantes, como <a href=\"https:\/\/darkmail.info\/downloads\/dark-internet-mail-environment-december-2014.pdf\" rel=\"nofollow\">DIME<\/a> ou <a href=\"https:\/\/leap.se\/\" rel=\"nofollow\">LEAP.<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\">Achamos que o primeiro passo \u00e9 acertar o recorde. No Mailfence, n\u00e3o queremos dar uma falsa impress\u00e3o de &#8220;n\u00e3o sabemos nada sobre voc\u00ea&#8221;, mas sim oferecer um alto n\u00edvel de transpar\u00eancia para atingir expectativas leg\u00edtimas.<\/p>\n\n\n\n<p>Em nossa opini\u00e3o, a criptografia de ponta a ponta desempenha um papel crucial na configura\u00e7\u00e3o de mensagens seguras. Protege o conte\u00fado das mensagens dos usu\u00e1rios, oferecendo-lhes confidencialidade, integridade e autenticidade.<\/p>\n\n\n\n<p>Na Mailfence, acreditamos que proteger a privacidade \u00e9 extremamente importante. Isso \u00e9 para preservar nossos valores fundamentais e liberdade de express\u00e3o. O oposto, a vigil\u00e2ncia de todos os lados, seria simplesmente muito perigoso. Acreditamos que juntos podemos conseguir essa mudan\u00e7a. Para garantir que nossa sociedade n\u00e3o seja mais monitorada 24 horas por dia, sete dias por semana, podemos faz\u00ea-lo atrav\u00e9s de pequenas e eficazes medidas. Se voc\u00ea concordar conosco, participe do movimento de um e-mail seguro e compartilhe nossa mensagem.<\/p>\n\n\n\n<p>Voc\u00ea tem d\u00favidas sobre a criptografia de ponta a ponta? N\u00e3o hesite em contatar o nosso suporte (suporte em mailfence dot com).<\/p>\n\n\n\n<p>Tem perguntas sobre E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso? N\u00e3o hesite em contatar-nos (suporte em mailfence ponto com).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Todo mundo quer se apossar de seus dados de uma forma ou de outra. N\u00e3o \u00e9 apenas NSA, Google, Facebook ou seu provedor de telecomunica\u00e7\u00f5es. At\u00e9 mesmo o aplicativo lanterna em seu smartphone e o site de com\u00e9rcio eletr\u00f4nico que voc\u00ea est\u00e1 navegando est\u00e3o tentando acessar suas informa\u00e7\u00f5es particulares. Mas ainda temos que nos comunicar [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":85905,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1379],"tags":[],"class_list":["post-64572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso<\/title>\n<meta name=\"description\" content=\"A criptografia de ponta a ponta desempenha um papel crucial no e-mail seguro para proteger a confidencialidade, a integridade, autenticidade\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-25T07:43:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T14:10:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/10\/Secure_email1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick De Schutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pdeschutter\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick De Schutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/\"},\"author\":{\"name\":\"Patrick De Schutter\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\"},\"headline\":\"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso\",\"datePublished\":\"2016-10-25T07:43:07+00:00\",\"dateModified\":\"2025-09-16T14:10:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/\"},\"wordCount\":903,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Secure_email1.png\",\"articleSection\":[\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/\",\"name\":\"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Secure_email1.png\",\"datePublished\":\"2016-10-25T07:43:07+00:00\",\"dateModified\":\"2025-09-16T14:10:46+00:00\",\"description\":\"A criptografia de ponta a ponta desempenha um papel crucial no e-mail seguro para proteger a confidencialidade, a integridade, autenticidade\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Secure_email1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Secure_email1.png\",\"width\":600,\"height\":600,\"caption\":\"mailfence secure and private email service\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/e-mail-seguro-criptografia-ponta-a-ponta\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/category\\\/seguranca-de-email\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\",\"name\":\"Patrick De Schutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"caption\":\"Patrick De Schutter\"},\"description\":\"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/pdeschutter\\\/\",\"https:\\\/\\\/x.com\\\/pdeschutter\"],\"gender\":\"male\",\"knowsLanguage\":[\"English\",\"French\",\"Dutch\",\"Swedish\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/author\\\/patrick\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso","description":"A criptografia de ponta a ponta desempenha um papel crucial no e-mail seguro para proteger a confidencialidade, a integridade, autenticidade","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/","og_locale":"pt_BR","og_type":"article","og_title":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso | Mailfence Blog","og_description":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2016-10-25T07:43:07+00:00","article_modified_time":"2025-09-16T14:10:46+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/10\/Secure_email1.png","type":"image\/png"}],"author":"Patrick De Schutter","twitter_card":"summary_large_image","twitter_creator":"@pdeschutter","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Patrick De Schutter","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/"},"author":{"name":"Patrick De Schutter","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28"},"headline":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso","datePublished":"2016-10-25T07:43:07+00:00","dateModified":"2025-09-16T14:10:46+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/"},"wordCount":903,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/10\/Secure_email1.png","articleSection":["Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/","url":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/","name":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/10\/Secure_email1.png","datePublished":"2016-10-25T07:43:07+00:00","dateModified":"2025-09-16T14:10:46+00:00","description":"A criptografia de ponta a ponta desempenha um papel crucial no e-mail seguro para proteger a confidencialidade, a integridade, autenticidade","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/10\/Secure_email1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/10\/Secure_email1.png","width":600,"height":600,"caption":"mailfence secure and private email service"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/e-mail-seguro-criptografia-ponta-a-ponta\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"E-mail seguro: a criptografia de ponta a ponta \u00e9 o cora\u00e7\u00e3o disso"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28","name":"Patrick De Schutter","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","caption":"Patrick De Schutter"},"description":"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.","sameAs":["https:\/\/www.linkedin.com\/in\/pdeschutter\/","https:\/\/x.com\/pdeschutter"],"gender":"male","knowsLanguage":["English","French","Dutch","Swedish"],"url":"https:\/\/blog.mailfence.com\/pt\/author\/patrick\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=64572"}],"version-history":[{"count":7,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64572\/revisions"}],"predecessor-version":[{"id":103225,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64572\/revisions\/103225"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/85905"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=64572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=64572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=64572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}