O objetivo desse Blog é apresentar essa fantástica e importante tecnologia, de forma simples, para que pessoas que não dominam aspectos técnicos também possam acompanhar a evolução da adoção da Certificação Digital e o universo que gira ao seu redor:
Certificado Digital para Assinatura e Sigilo, Certificado de Atributo, Carimbo do Tempo, Documentos Eletrônicos, Processos Eletrônicos, Nota Fical Eletrônica, TV Digital, Smart Card, Token, Assinador de Documento, Gerenciador de Identidades etc..Este Blog publica matérias e artigos extraídos da mídia que expressam a opinião dos respectivos autores e artigos escritos por mim que expressam, exclusivamente, minha opinião pessoal sem vínculo a nenhuma organização.
Certificado Digital para Assinatura e Sigilo, Certificado de Atributo, Carimbo do Tempo, Documentos Eletrônicos, Processos Eletrônicos, Nota Fical Eletrônica, TV Digital, Smart Card, Token, Assinador de Documento, Gerenciador de Identidades etc..
Matérias organizadas por data de publicação
- Snowden convoca hackers para atacar a NSA
- A criptografia e a neutralidade da Internet
- Conversando sobre criptografia com Henrique Costab...
- Easier Ways to Protect Email From Unwanted Prying ...
- Safeweb emite Certificados Digitais no âmbito da I...
- Validade de documentos eletrônicos assinados digit...
- ▼ 07/13 (6)
- ► 2013 (174)
- ► 2012 (133)
- ► 2011 (427)
- ► 2010 (302)
sábado, 19 de julho de 2014
A criptografia e a neutralidade da Internet
Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. One of the most contested issues in that battle will be net neutrality, Meinrath said.
The new fight will be even more fierce than the last one, because Internet service providers now see dollars and cents in the details of packets traversing their networks. They want to charge content providers for priority delivery of their packets across the network, something that a controversial Federal Communications Commission proposal could allow under certain conditions. Friday is the filing deadline for the first round of public comments on that plan.
Encrypted traffic can’t be given special treatment because it can’t be identified, Meinrath said. That could eliminate a major revenue source for ISPs, giving them a strong reason to oppose the use of encrypted services and potentially an indirect way to degrade their performance, he said. Meinrath laid out parts of this argument in a recent essay in the June issue of Critical Studies in Media Communication, called “Crypto War II” and written with tech policy activist Sean Vitka.
The U.S. government once sought to keep the country’s cryptographic technology to itself or to hold onto the keys to all encrypted data. Opponents won out and opened the door to encrypted services people use every day, such as shopping and email. But the ability to use encryption is under fire both from government and potentially from ISPs’ new business models, the essay said. The looming cryptography debate will also involve several other hot topics, including government surveillance spreading from networks into individual devices and the privacy of data generated by the “Internet of Things,” the authors wrote.
Net neutrality could be important to the use of encryption in at least two ways, according to Meinrath. For one thing, if broadband capacity is scarce on a busy service-provider network, and some traffic gets paid priority, then other traffic could suffer. Encrypted traffic is likely to get the short end of that deal. For example, a streaming video service that was encrypted and couldn’t be prioritized might stall or have longer buffer times if it had to share a crowded pipe with favored video streams.
In addition, ISPs might start to block encrypted traffic in order to maintain their business model. For example, if carriers can discriminate among applications, they can make some exempt from a user’s data consumption cap. AT&T has already announced plans for such a service, called Sponsored Data, on its cellular data network. Among other things, this could allow content providers to cover the cost of delivering their data to consumers, making their content more attractive.
That concept may get more complicated if encryption comes into play, Meinrath said. For example, in some developing countries, Facebook and mobile operators together are offering cheap mobile data deals that only cover Facebook. There are encrypted services that can tunnel through Facebook to give users access to other service, but carriers will want to know if anyone is circumventing the exclusive Facebook deal.
“The problem is that providers are going to say, ‘We need to be able to know that you’re not doing that, therefore we need to be able to ensure that you are not encrypting,’” he said.
All this doesn’t necessarily spell doom for your favorite banking, health insurance or video chat sites. The implications are deeper and longer term, Meinrath said.
“The problem is usually not the big 50 or big 100 services,” he said. “They always carve out for themselves an exemption.” But if a new competitor comes along that does the same thing better, it may be a different story.
“If you want to create the new Skype, or the new Facebook, or the new Google, you will have a hell of a time getting the same treatment as the incumbents,” Meinrath said.
Because of the way network discrimination could affect encrypted services, guaranteeing net neutrality will be critical to ensuring consumers’ right to privacy online, the authors wrote. They also call for regulators to keep control of communications in the hands of users and in their own devices at the edge of networks, giving consumers the power to encrypt their communications from end to end.
Formada em Publicidade e Propaganda pela PUC Rio, trabalhou em importantes agências de propaganda nas áreas de pesquisa de mercado, planejamento estratégico, atendimento à clientes especiais e planejamento de mídia.
Dirigiu a área comercial de uma produtora de vídeos internacional e trabalhou em duas redes de televisão: TV Globo e Bandeirantes.
Dirigiu sua empresa de marketing político por 6 anos e desde 1995 se dedica ao comércio eletrônico junto à clientes corporativos e varejo em especial no segmento da
CERTIFICAÇÃO DIGITAL.Regina Tupinambá - CCO – Chief Content Officer - Instituto CryptoID.
Se dedica ao comércio eletrônico e em 1999 entrou para o universo da certificação digital.
Dirigiu diversas áreas da Autoridade Certificadora Certisign entre elas: Marketing, Comercial, Produtos, Treinamentos, Suporte Técnico, Licitações e SAC.
Desenvolveu o mercado de SSL no Brasil e criou o mais completo programa de cursos sobre Certificação digital.
No âmbito da ICP-Brasil acompanhou a criação da AC Raiz, além de participar diretamente da homologação de muitas Autoridades Certificadoras e Autoridades de Registro. É autora do Blog Certificação Digital desde 2010.
No momento é CEO da Insania Publicidade e como CCO do Instituto CryptoID, dirige a área de conteúdo do Portal.