{"id":64643,"date":"2014-04-08T22:02:03","date_gmt":"2014-04-08T20:02:03","guid":{"rendered":"https:\/\/blog.mailfence.com\/quando-nsa-flagra-espionagem-facebook\/"},"modified":"2024-06-04T17:26:43","modified_gmt":"2024-06-04T15:26:43","slug":"quando-nsa-flagra-espionagem-facebook","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/","title":{"rendered":"Quando a NSA flagra espionagem no Facebook"},"content":{"rendered":"\n<p>Glenn Greenwald, um jornalista pol\u00edtico, advogado e blogueiro, trabalhou com Edward Snowden nas revela\u00e7\u00f5es sobre o programa de vigil\u00e2ncia da Ag\u00eancia Nacional de Seguran\u00e7a Americana (NSA, na sigla em ingl\u00eas). Foi ele quem publicou as informa\u00e7\u00f5es coletadas dos documentos de Snowden no jornal brit\u00e2nico <a href=\"http:\/\/www.theguardian.com\/profile\/glenn-greenwald\">The Guardian<\/a>. Em seu site The Intercept, Greenwald fornece uma lista de t\u00e9cnicas de espionagem usadas pela NSA para observar os usu\u00e1rios.<\/p>\n\n\n\n<p>Algumas semanas atr\u00e1s, durante a s\u00e9rie de confer\u00eancias do festival South by Southwest (SXSW) em Austin (Texas, EUA), Snowden pediu que todos os usu\u00e1rios de internet usassem criptografia (<a href=\"https:\/\/mailfence.com\/\">um servi\u00e7o oferecido gratuitamente por alguns sites de e-mail seguros<\/a>) para para se protegerem das ag\u00eancias de intelig\u00eancia. No entanto, Snowden explicou que a NSA pode ter como alvo um usu\u00e1rio espec\u00edfico e, nesse caso, &#8220;se infiltrar em seu computador&#8221;.<\/p>\n\n\n\n<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"pt\" data-language-to-translate-into=\"auto\" data-phrase-index=\"0\">A NSA est\u00e1 ciente do risco que corre com essas tentativas de prote\u00e7\u00e3o;<\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"pt\" data-language-to-translate-into=\"auto\" data-phrase-index=\"1\">\u00e9 por isso que dedicou fundos importantes (dinheiro dos contribuintes) para tentar bugar em uma escala maci\u00e7a milh\u00f5es de computadores com software malicioso, o que poderia eventualmente tornar a NSA a &#8220;dona da rede&#8221;, de acordo com <\/span><a href=\"http:\/\/www.zerohedge.com\/news\/2014-03-12\/most-evil-and-disturbing-nsa-spy-practices-date-have-just-been-revealed\" target=\"_blank\" rel=\"noopener\">Cobertura Zero<\/a>. \u201cAs t\u00e9cnicas de vigil\u00e2ncia da NSA podem, involuntariamente, colocar em risco a seguran\u00e7a da Internet\u201d, advertiu Mikko Hypponen, um especialista em malware.<\/p>\n\n\n\n<p>A ag\u00eancia ampliou sua capacidade de hacking ao automatizar seus sistemas e reduzir a vigil\u00e2ncia humana. Em alguns casos, a NSA usou um falso servidor do Facebook para roubar a rede social, a fim de us\u00e1-la como uma \u201crampa de lan\u00e7amento\u201d, permitindo que ela infectasse computadores direcionados e extra\u00edsse informa\u00e7\u00f5es de seu hardware. Tamb\u00e9m enviou spams com \u201cimplantes de malware\u201d, que podem invadir um computador de v\u00e1rias maneiras. Esses implantes foram desenvolvidos em um programa automatizado chamado Turbine, que permite a implanta\u00e7\u00e3o de malware em larga escala. Em 2004, est\u00e1vamos falando apenas de 100 a 150 implantes, mas ultimamente seu n\u00famero cresceu para dezenas de milhares. Os relat\u00f3rios de Snowden afirmam que entre 85.000 e 100.000 implantes j\u00e1 foram enviados para computadores e dentro de redes sociais em todo o mundo. Cerca de US $ 67,6 milh\u00f5es foram investidos no desenvolvimento do programa Turbine, a fim de permitir que se estendesse a \u201cuma grande variedade de redes\u201d.<\/p>\n\n\n\n<p>Codinome \u201cUnitedrake\u201d implante pode ser usado com uma variedade de plugins, m\u00f3dulos de extens\u00f5es de software que permitem o controle total do computador infectado. O &#8220;Captive Audience&#8221; grava conversas do microfone do computador. \u201cGumfish\u201d tira fotos da webcam. O \u201cFoggybottom\u201d registra todo o hist\u00f3rico de navega\u00e7\u00e3o e re\u00fane informa\u00e7\u00f5es sobre conex\u00f5es e senhas. &#8220;Grok&#8221; \u00e9 usado para registrar pressionamentos de tecla e todas as atividades do usu\u00e1rio. \u201cSalvagerabbit\u201d rouba dados gra\u00e7as a discos remov\u00edveis conectados ao computador infectado.<\/p>\n\n\n\n<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"pt\" data-language-to-translate-into=\"auto\" data-phrase-index=\"0\">Al\u00e9m disso, esses implantes tamb\u00e9m permitem que a NSA substitua as ferramentas de criptografia usadas para navegar na web anonimamente e <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografar-email\/\">criptografar<\/a> o conte\u00fado do e-mail.<\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"pt\" data-language-to-translate-into=\"auto\" data-phrase-index=\"1\">Isso \u00e9 poss\u00edvel pelo fato de que o malware da ag\u00eancia d\u00e1 acesso ilimitado ao computador-alvo, desde que o usu\u00e1rio n\u00e3o proteja suas comunica\u00e7\u00f5es criptografando-as.<\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"pt\" data-language-to-translate-into=\"auto\" data-phrase-index=\"2\">\u201cQuantumsky\u201d, um malware desenvolvido em 2004, permite bloquear o acesso do computador a determinados sites e \u201cQuantumcopper\u201d testado em 2008, \u00e9 usado para corromper os arquivos baixados do alvo.<\/span><\/p>\n\n\n\n<p>Essas t\u00e9cnicas n\u00e3o s\u00f3 foram usadas para rastrear suspeitos em assuntos de terrorismo. Software mal-intencionado tamb\u00e9m tem sido usado contra administradores de sistemas para fornecedores de servi\u00e7os de telefonia e internet, a fim de acessar \/ espionar as comunica\u00e7\u00f5es secretas da empresa. <a href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/12\/thousands-implants\/\">De acordo com um documento secreto de 2012<\/a>, para implantar esses implantes, a NSA envia milhares de spams, convidando os usu\u00e1rios a clicar nos links que ativam o software mal-intencionado. Uma vez ativado, o computador \u00e9 infectado em 8 segundos. A t\u00e9cnica de ataque &#8220;<a href=\"https:\/\/pt.wikipedia.org\/wiki\/Ataque_man-in-the-middle\">man-in-the-middle<\/a>&#8221; redireciona o navegador de internet do usu\u00e1rio para os servidores da NSA que tentam gerar um bug no computador. A t\u00e1tica \u201c<a href=\"http:\/\/en.wikipedia.org\/wiki\/Side_channel_attack\">man-on-the-side<\/a>\u201d, codinome \u201cQuantumhand\u201d, permite que a NSA se disfarce como um falso servidor do Facebook e transfira dados maliciosos quando o alvo tenta se conectar \u00e0 rede social. Ao usar esse malware que se assemelha a uma p\u00e1gina normal do Facebook, a NSA pode hackear o computador do usu\u00e1rio, acessar dados no hardware e modificar a comunica\u00e7\u00e3o. Isso tudo intensificou a espionagem do Facebook imensamente atrav\u00e9s de t\u00e1ticas t\u00e3o sofisticadas.<\/p>\n\n\n\n<p>Firewalls e outras medidas de seguran\u00e7a convencionais n\u00e3o parecem incomodar a NSA. Na verdade, os hackers da ag\u00eancia parecem confiantes de que podem contornar todas as prote\u00e7\u00f5es e infectar qualquer computador ou rede. &#8220;Se conseguirmos que o computador de destino nos visite em uma esp\u00e9cie de navegador da Web, provavelmente poderemos control\u00e1-lo&#8221;, disse um dos hackers da ag\u00eancia, citado em um dos documentos secretos.<\/p>\n\n\n\n<p><a href=\"http:\/\/thenextweb.com\/insider\/2014\/03\/13\/nsa-denies-reports-impersonating-facebook-infect-pcs-malware\/?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A%20TheNextWeb%20%28The%20Next%20Web%20All%20Stories%29#!Agmcd\">A NSA negou o uso de redes sociais para infectar v\u00e1rios milhares de computadores com softwares maliciosos<\/a>. De acordo com a NSA, suas capacidades t\u00e9cnicas s\u00e3o usadas para opera\u00e7\u00f5es apropriadas e leg\u00edtimas em rela\u00e7\u00e3o \u00e0 intelig\u00eancia estrangeira.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glenn Greenwald, um jornalista pol\u00edtico, advogado e blogueiro, trabalhou com Edward Snowden nas revela\u00e7\u00f5es sobre o programa de vigil\u00e2ncia da Ag\u00eancia Nacional de Seguran\u00e7a Americana (NSA, na sigla em ingl\u00eas). Foi ele quem publicou as informa\u00e7\u00f5es coletadas dos documentos de Snowden no jornal brit\u00e2nico The Guardian. Em seu site The Intercept, Greenwald fornece uma lista [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":85972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"link","meta":{"footnotes":""},"categories":[18572,1379],"tags":[],"class_list":["post-64643","post","type-post","status-publish","format-link","has-post-thumbnail","hentry","category-privacidade-on-line","category-seguranca-de-email","post_format-post-format-link"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NSA bugs Facebook espionagem. Mailfence secure email Blog<\/title>\n<meta name=\"description\" content=\"NSA e Facebook espionando junto com outras m\u00eddias sociais tradicionais. Greenwald fornece uma lista de t\u00e9cnicas de espionagem usadas pela NSA\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quando a NSA flagra espionagem no Facebook | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Quando a NSA flagra espionagem no Facebook | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-08T20:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-04T15:26:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick De Schutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pdeschutter\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick De Schutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/\"},\"author\":{\"name\":\"Patrick De Schutter\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\"},\"headline\":\"Quando a NSA flagra espionagem no Facebook\",\"datePublished\":\"2014-04-08T20:02:03+00:00\",\"dateModified\":\"2024-06-04T15:26:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/\"},\"wordCount\":875,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"articleSection\":[\"Privacidade on-line\",\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/\",\"name\":\"NSA bugs Facebook espionagem. Mailfence secure email Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"datePublished\":\"2014-04-08T20:02:03+00:00\",\"dateModified\":\"2024-06-04T15:26:43+00:00\",\"description\":\"NSA e Facebook espionando junto com outras m\u00eddias sociais tradicionais. Greenwald fornece uma lista de t\u00e9cnicas de espionagem usadas pela NSA\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"width\":600,\"height\":600,\"caption\":\"facebook app icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/quando-nsa-flagra-espionagem-facebook\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/category\\\/seguranca-de-email\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quando a NSA flagra espionagem no Facebook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\",\"name\":\"Patrick De Schutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"caption\":\"Patrick De Schutter\"},\"description\":\"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/pdeschutter\\\/\",\"https:\\\/\\\/x.com\\\/pdeschutter\"],\"gender\":\"male\",\"knowsLanguage\":[\"English\",\"French\",\"Dutch\",\"Swedish\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/author\\\/patrick\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NSA bugs Facebook espionagem. Mailfence secure email Blog","description":"NSA e Facebook espionando junto com outras m\u00eddias sociais tradicionais. Greenwald fornece uma lista de t\u00e9cnicas de espionagem usadas pela NSA","robots":{"index":"noindex","follow":"follow"},"og_locale":"pt_BR","og_type":"article","og_title":"Quando a NSA flagra espionagem no Facebook | Mailfence Blog","og_description":"Quando a NSA flagra espionagem no Facebook | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2014-04-08T20:02:03+00:00","article_modified_time":"2024-06-04T15:26:43+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","type":"image\/png"}],"author":"Patrick De Schutter","twitter_card":"summary_large_image","twitter_creator":"@pdeschutter","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Patrick De Schutter","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/"},"author":{"name":"Patrick De Schutter","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28"},"headline":"Quando a NSA flagra espionagem no Facebook","datePublished":"2014-04-08T20:02:03+00:00","dateModified":"2024-06-04T15:26:43+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/"},"wordCount":875,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","articleSection":["Privacidade on-line","Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/","url":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/","name":"NSA bugs Facebook espionagem. Mailfence secure email Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","datePublished":"2014-04-08T20:02:03+00:00","dateModified":"2024-06-04T15:26:43+00:00","description":"NSA e Facebook espionando junto com outras m\u00eddias sociais tradicionais. Greenwald fornece uma lista de t\u00e9cnicas de espionagem usadas pela NSA","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","width":600,"height":600,"caption":"facebook app icon"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/quando-nsa-flagra-espionagem-facebook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"Quando a NSA flagra espionagem no Facebook"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28","name":"Patrick De Schutter","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","caption":"Patrick De Schutter"},"description":"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.","sameAs":["https:\/\/www.linkedin.com\/in\/pdeschutter\/","https:\/\/x.com\/pdeschutter"],"gender":"male","knowsLanguage":["English","French","Dutch","Swedish"],"url":"https:\/\/blog.mailfence.com\/pt\/author\/patrick\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=64643"}],"version-history":[{"count":4,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64643\/revisions"}],"predecessor-version":[{"id":81351,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64643\/revisions\/81351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/85972"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=64643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=64643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=64643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}