{"id":105,"date":"2019-06-19T12:01:11","date_gmt":"2019-06-19T12:01:11","guid":{"rendered":"https:\/\/anlix.io\/?p=105"},"modified":"2025-01-08T16:58:15","modified_gmt":"2025-01-08T16:58:15","slug":"redes-ipv6","status":"publish","type":"post","link":"https:\/\/anlix.io\/en\/redes-ipv6\/","title":{"rendered":"Security and privacy risks in the growth of IPv6 networks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:40px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p>The Internet is present in virtually every aspect of our lives today. People use the network to have fun, work, study, do business, connect with friends and family.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"border-color:#e0dede;border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><span class=\"fusion-dropcap dropcap\">U<\/span>\n<p>ne of the main technologies of the Internet is the Internet Protocol (IP), a set of rules necessary for computers and other devices to \u201ctalk to each other\u201d. This protocol is responsible for giving a unique address to each device connected to the network, allowing data sent from a computer to have a path to its destination.<\/p>\n<p>Since 1983, the Internet has used version 4 of the Internet Protocol (IPv4). This version of the IP protocol allows the connection of up to 4 billion devices on the Internet, but the emergence of new technologies, such as the Internet of Things (IoT \u2013 Internet of Things), demanded an evolution in this protocol.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"imageframe-align-center\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-zoomin\"><img decoding=\"async\" width=\"650\" height=\"328\" title=\"IPv6\" src=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6.jpg\" data-orig-src=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6.jpg\" class=\"lazyload img-responsive wp-image-1374\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27650%27%20height%3D%27328%27%20viewBox%3D%270%200%20650%20328%27%3E%3Crect%20width%3D%27650%27%20height%3D%27328%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6-200x101.jpg 200w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6-400x202.jpg 400w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6-600x303.jpg 600w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6.jpg 650w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 650px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:1.25;\">What is IoT?<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>IoT is a concept that refers to the digital interconnection of everyday devices and objects with the Internet, such as refrigerators, televisions and even light bulbs. Such devices aim to increase, among other reasons, the safety, health and comfort of people in their homes and workplaces, allowing the remote control of these devices via the Internet.<\/p>\n<p>It is estimated that by 2025, more than 75 billion IoT devices will be connected to the network. The need for new unique addresses due to the growing number of devices connected to the Internet required a new version of the IP protocol, IPv6, officially launched in 1998 and used on a large scale from 2012.<\/p>\n<\/div><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:1.25;\">What security risks does IPv6 pose and why can Flashbox help?<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:35px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"border-color:#e0dede;border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p>IPv6 brings, among other benefits, a significant increase in the number of addresses available compared to the previous version, but we need to be aware of \u201cnew\u201d security risks, both for providers and broadband customers.<\/p>\n<p>One of the most latent examples of security risks is the obsolescence of NAT (Network Address Translation) in IPv6 networks as a form of \u201cfirewall\u201d against intruders. NAT allows IPv4 to assign addresses that are not accessible from the Internet to devices. This allows multiple devices to surf the internet using a single address and brings a sense of security as these devices are safe from attacks coming from the internet.<\/p>\n<p>The lack of NAT in IPv6 networks leaves most devices directly accessible from any point on the internet.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_5 1_5 fusion-one-fifth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:20%;width:calc(20% - ( ( 4% + 4% ) * 0.2 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_3_5 3_5 fusion-three-fifth\" style=\"width:60%;width:calc(60% - ( ( 4% + 4% ) * 0.6 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"imageframe-align-center\"><span class=\"fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1052\" height=\"920\" title=\"application\" src=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1.png\" data-orig-src=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1.png\" class=\"lazyload img-responsive wp-image-932\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271052%27%20height%3D%27920%27%20viewBox%3D%270%200%201052%20920%27%3E%3Crect%20width%3D%271052%27%20height%3D%27920%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1-200x175.png 200w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1-400x350.png 400w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1-600x525.png 600w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1-800x700.png 800w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/aplicativo-1.png 1052w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_5 1_5 fusion-one-fifth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:20%;width:calc(20% - ( ( 4% + 4% ) * 0.2 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h3 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:26;line-height:1.3;\">Ie,<\/h3><\/div><div class=\"fusion-text fusion-text-5\"><p>With that, without the presence of NAT, it is necessary to pay attention to firewall rules well configured in each device used in a residence and firewall rules correctly configured in Wi-Fi routers, as this is the great gateway for internet access in home networks.<\/p>\n<p>Unfortunately, many Wi-Fi routers currently do not have the care for a correct firewall configuration, putting the security and privacy of many users at risk. If a broadband user does not have a lock implemented on their device (cell phone, TV, laptop), any communication can pass from within the home network to the internet and vice versa. Ever wondered if an electronic lock with remote access is hacked and home security is exposed? This would be a very serious and real situation in the current scenario.<\/p>\n<p>Fortunately, for providers and users of Flashbox, this security risk has now been addressed. Flashbox has an IPv6 firewall by default and correctly configured, ensuring the security of residential and commercial networks, also blocking any strange communication in IPv6.<\/p>\n<\/div><div class=\"imageframe-align-center\"><span class=\"fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/anlix.io\/en\/flashbox\/\" target=\"_self\" aria-label=\"Banner Flashbox\"><img decoding=\"async\" width=\"600\" height=\"200\" alt=\"Banner Flashbox\" src=\"https:\/\/anlix.io\/wp-content\/uploads\/2022\/07\/Flashbox-1.jpg\" data-orig-src=\"https:\/\/anlix.io\/wp-content\/uploads\/2022\/07\/Flashbox-1.jpg\" class=\"lazyload img-responsive wp-image-3478\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27600%27%20height%3D%27200%27%20viewBox%3D%270%200%20600%20200%27%3E%3Crect%20width%3D%27600%27%20height%3D%27200%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/anlix.io\/wp-content\/uploads\/2022\/07\/Flashbox-1-200x67.jpg 200w, https:\/\/anlix.io\/wp-content\/uploads\/2022\/07\/Flashbox-1-400x133.jpg 400w, https:\/\/anlix.io\/wp-content\/uploads\/2022\/07\/Flashbox-1.jpg 600w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 600px\" \/><\/a><\/span><\/div><div class=\"fusion-text fusion-text-6\"><p>To get started testing Flashbox in your operation, fill out a quick form below!<\/p>\n<div role=\"main\" id=\"formulario-principal-2025-f0a3aacd5c1aeefdeba4\"><\/div>\n<p><script type=\"text\/javascript\" src=\"https:\/\/d335luupugsy2.cloudfront.net\/js\/rdstation-forms\/stable\/rdstation-forms.min.js\"><\/script><script type=\"text\/javascript\"> new RDStationForms('formulario-principal-2025-f0a3aacd5c1aeefdeba4', 'UA-122030159-1').createForm();<\/script><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1374,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,68],"tags":[74,73],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6 - Anlix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anlix.io\/en\/redes-ipv6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6 - Anlix\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anlix.io\/en\/redes-ipv6\/\" \/>\n<meta property=\"og:site_name\" content=\"Anlix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anlix.io\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-19T12:01:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T16:58:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"328\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/anlix.io\/redes-ipv6\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/anlix.io\/redes-ipv6\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a\"},\"headline\":\"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6\",\"datePublished\":\"2019-06-19T12:01:11+00:00\",\"dateModified\":\"2025-01-08T16:58:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/anlix.io\/redes-ipv6\/\"},\"wordCount\":2530,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/anlix.io\/#organization\"},\"keywords\":[\"conex\u00e3o\",\"seguran\u00e7a\"],\"articleSection\":[\"IoT\",\"Redes\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/anlix.io\/redes-ipv6\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anlix.io\/redes-ipv6\/\",\"url\":\"https:\/\/anlix.io\/redes-ipv6\/\",\"name\":\"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6 - Anlix\",\"isPartOf\":{\"@id\":\"https:\/\/anlix.io\/#website\"},\"datePublished\":\"2019-06-19T12:01:11+00:00\",\"dateModified\":\"2025-01-08T16:58:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/anlix.io\/redes-ipv6\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anlix.io\/redes-ipv6\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anlix.io\/redes-ipv6\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anlix.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anlix.io\/#website\",\"url\":\"https:\/\/anlix.io\/\",\"name\":\"Anlix\",\"description\":\"Ger\u00eancia, automa\u00e7\u00e3o, monitoramento e an\u00e1lise\",\"publisher\":{\"@id\":\"https:\/\/anlix.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anlix.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/anlix.io\/#organization\",\"name\":\"Anlix\",\"url\":\"https:\/\/anlix.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png\",\"contentUrl\":\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png\",\"width\":497,\"height\":497,\"caption\":\"Anlix\"},\"image\":{\"@id\":\"https:\/\/anlix.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/anlix.io\/\",\"https:\/\/www.linkedin.com\/company\/anlix\/\",\"https:\/\/www.youtube.com\/channel\/UC9L5nmnn5oJmfDlSWY2ix6Q\",\"https:\/\/www.facebook.com\/anlix.io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and Privacy Risks in the Growth of IPv6 Networks - Anlix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anlix.io\/en\/redes-ipv6\/","og_locale":"en_US","og_type":"article","og_title":"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6 - Anlix","og_url":"https:\/\/anlix.io\/en\/redes-ipv6\/","og_site_name":"Anlix","article_publisher":"https:\/\/www.facebook.com\/anlix.io\/","article_published_time":"2019-06-19T12:01:11+00:00","article_modified_time":"2025-01-08T16:58:15+00:00","og_image":[{"width":650,"height":328,"url":"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/IPv6.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/anlix.io\/redes-ipv6\/#article","isPartOf":{"@id":"https:\/\/anlix.io\/redes-ipv6\/"},"author":{"name":"admin","@id":"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a"},"headline":"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6","datePublished":"2019-06-19T12:01:11+00:00","dateModified":"2025-01-08T16:58:15+00:00","mainEntityOfPage":{"@id":"https:\/\/anlix.io\/redes-ipv6\/"},"wordCount":2530,"commentCount":0,"publisher":{"@id":"https:\/\/anlix.io\/#organization"},"keywords":["conex\u00e3o","seguran\u00e7a"],"articleSection":["IoT","Redes"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/anlix.io\/redes-ipv6\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/anlix.io\/redes-ipv6\/","url":"https:\/\/anlix.io\/redes-ipv6\/","name":"Security and Privacy Risks in the Growth of IPv6 Networks - Anlix","isPartOf":{"@id":"https:\/\/anlix.io\/#website"},"datePublished":"2019-06-19T12:01:11+00:00","dateModified":"2025-01-08T16:58:15+00:00","breadcrumb":{"@id":"https:\/\/anlix.io\/redes-ipv6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anlix.io\/redes-ipv6\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/anlix.io\/redes-ipv6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anlix.io\/"},{"@type":"ListItem","position":2,"name":"Riscos de seguran\u00e7a e privacidade no crescimento de redes IPv6"}]},{"@type":"WebSite","@id":"https:\/\/anlix.io\/#website","url":"https:\/\/anlix.io\/","name":"Anlix","description":"Management, automation, monitoring and analysis","publisher":{"@id":"https:\/\/anlix.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anlix.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/anlix.io\/#organization","name":"Anlix","url":"https:\/\/anlix.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/anlix.io\/#\/schema\/logo\/image\/","url":"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png","contentUrl":"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png","width":497,"height":497,"caption":"Anlix"},"image":{"@id":"https:\/\/anlix.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/anlix.io\/","https:\/\/www.linkedin.com\/company\/anlix\/","https:\/\/www.youtube.com\/channel\/UC9L5nmnn5oJmfDlSWY2ix6Q","https:\/\/www.facebook.com\/anlix.io\/"]},{"@type":"Person","@id":"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/anlix.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts\/105"}],"collection":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":15,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"predecessor-version":[{"id":4409,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts\/105\/revisions\/4409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/media\/1374"}],"wp:attachment":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}