{"id":2142,"date":"2026-05-14T09:00:45","date_gmt":"2026-05-14T12:00:45","guid":{"rendered":"https:\/\/peckadv.com.br\/?p=2142"},"modified":"2026-05-08T17:39:17","modified_gmt":"2026-05-08T20:39:17","slug":"criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil","status":"publish","type":"post","link":"https:\/\/peckadv.com.br\/en\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/","title":{"rendered":"Cryptography Today, Violation Tomorrow: The &#8220;Harvest Now, Decrypt Later&#8221; Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil"},"content":{"rendered":"<p><\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">The progressive technological sophistication has placed classical legal categories under tension, especially those related to the temporal delimitation of the illicit act and the identification of the moment of damage occurrence. In the field of data protection and information security, this tension becomes particularly evident in the face of a scenario that ceases to be merely speculative: the possibility that personal data stolen today, still protected by encryption considered robust according to the state of the art, may become accessible only in the future due to advances in computational capacity, especially quantum computing.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">This hypothesis breaks with the relative simultaneity that has historically characterized information security incidents, in which unauthorized access and potential damage to data subjects occur concomitantly or within a reduced time interval. On the contrary, we now deal with a model of dissociation between access and damage, in which the agent obtains the data at a first moment, without the capacity to exploit it, and only subsequently, with technological evolution, proceeds to use it harmfully. This is, therefore, a phenomenon that can be described as &#8220;deferred damage,&#8221; whose incorporation into legal reasoning is still incipient.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Recent technical literature already recognizes this phenomenon under the logic of &#8220;harvest now, decrypt later,&#8221; according to which malicious agents collect encrypted data today with the expectation that they will become accessible in the future, when there is sufficient computational capacity to break the encryption mechanisms currently used (NIST, 2024). This realization shifts the axis of legal analysis: it is no longer just a matter of assessing unauthorized access at the moment it occurs, but of understanding the potentially prolonged lifecycle of the injury.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In the scope of Brazilian criminal law, the analysis must start from the rule enshrined in art. 4 of the Penal Code, which adopts the theory of activity by establishing that the time of the crime is that of the action or omission (BRASIL, 1940). In light of this criterion, the improper obtaining of data, for example, through invasion of an IT device, constitutes a consummated crime at the moment of theft, even if the data is encrypted and therefore practically inaccessible. The subsequent breaking of the encryption and use of the data, in turn, tends to be framed as an autonomous typical fact, whose typification will depend on the concrete use made.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">This framework, although consistent with the current criminal dogmatics, produces relevant effects. First, there is a fragmentation of criminal protection, with the splitting of a materially unitary factual chain into legally distinct events. Second, there arises the risk that the crime of obtaining prescribes even before the occurrence of any concrete damage, since, under the terms of art. 111, I, of the Penal Code, the prescription period begins with the consummation of the offense (BRASIL, 1940). The circumstance of the data remaining encrypted does not alter this initial benchmark.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Beyond the prescription issue, the quantum threat challenges evidentiary law: how to guarantee the immutability and authenticity of digital evidence if quantum systems can reconfigure information states in fractions of seconds? Security algorithms today considered robust, such as RSA and ECC, which underpin digital signatures and chain of custody hashes (Art. 158-A of the CPP), will become vulnerable to a &#8220;quantum breaker.&#8221; Consequently, the integrity of evidence collected today may be retroactively questioned if the preservation method is not resistant to quantum computing.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Classical criminal doctrine provides important elements for understanding the problem. The distinction between instantaneous crime, permanent crime, and instantaneous crime with permanent effects, widely developed by authors such as Hungria, Fragoso, Greco, and Nucci, allows delimiting that consummation, as a rule, occurs at the moment of the practice of the type&#8217;s core, even if the effects extend over time (GRECO, 2023; NUCCI, 2022). The jurisprudence of the Superior Court of Justice, in cases involving social security fraud, has already addressed an analogous discussion by differentiating the consummation of the offense from its prolonged effects, ruling out, in certain hypotheses, the characterization of permanent crime (STJ, HC 216.555\/RJ; STJ, REsp 1.206.105\/RJ).<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Transported to the context of personal data, this logic leads to the conclusion that the mere retention of encrypted data does not transform the illicit into a permanent crime, nor does it authorize, as a rule, framing as a continued crime, since there is no homogeneous repetition of conduct, but succession of distinct typical cores.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">This scenario reveals a potential mismatch between the temporal structure of criminal law and contemporary technological dynamics. The idea that the criminally relevant injury coincides with the moment of the action becomes less evident when the offensive potential of the conduct depends on technological conditions not yet available. Thus, the need arises to develop interpretive categories capable of dealing with phenomena of deferred harmfulness, without violating the principles of legality and legal security.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In the field of personal data protection, the normative logic is distinct. The General Data Protection Law structures the obligation to notify security incidents from the existence of relevant risk or damage to data subjects (BRASIL, 2018). The infralegal regulation, in turn, details the criteria for this assessment, emphasizing the contextual analysis of risk and potential impact on fundamental rights (ANPD, 2024).<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">The European experience reinforces this approach. The guidelines of the European Data Protection Board establish that the notification obligation depends on the probability of risk to the rights and freedoms of data subjects, with robust encryption being a relevant mitigation factor, insofar as it can make the data unintelligible to unauthorized third parties (EDPB, 2023).<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In this context, the exfiltration of duly encrypted data may, under certain circumstances, not immediately give rise to the notification obligation, if there is no concrete relevant risk. However, the advance of quantum computing challenges this premise by introducing the possibility of future breaking of currently considered secure encryption. Although the current legal framework does not expressly require consideration of future and uncertain technological risks, the accountability principle imposes on data processing agents the duty to continuously review their security measures and reassess risks in light of technological evolution (BRASIL, 2018).<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">This duty materializes in the concept of &#8220;cryptographic agility mandate,&#8221; defined as an organization&#8217;s ability to migrate from one cryptographic standard to another quickly and efficiently. From the perspective of the LGPD and accountability, a processing agent&#8217;s failure to adopt Post-Quantum Cryptography (PQC) standards, such as those recently finalized by NIST (e.g., ML-KEM and ML-DSA), may in the future be interpreted as a violation of the duty of diligence. Data security ceases to be merely the &#8220;ought to be&#8221; to become the &#8220;duty to demonstrate&#8221; continuous effectiveness in the face of technological advances.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">The eventual future breaking of encryption and the consequent access to data in intelligible format would configure, in this sense, a new security incident, distinct from the one initially occurred, with potential materialization of relevant risk or damage to data subjects. This model evidences the existence of layered incidents, in which an initial technical event unfolds into multiple legal consequences over time.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">The urgency of this legal reinterpretation is accentuated by the fact that HNDL targets long-life data, whose value depends on secrecy over generations. Critical examples include health data and genetic information, which never lose their sensitivity, as well as state secrets and industrial intellectual property. For these assets, the &#8220;Q Day,&#8221; the day of breaking, does not represent the expiration date of protection, but the detonation point of a latent liability collected stealthily today.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">From these premises, the phenomenon is proposed to be understood as an expression of an illicit with temporally biphasic harmfulness. There is, in a first moment, an injury to the structural confidentiality of the data, even without immediate intelligibility; in a second moment, a supervening injury of exploitation occurs, when the information becomes accessible and apt to generate concrete damages. This formulation allows preserving the coherence of criminal law, by recognizing consummation at the moment of the action, without ignoring the material unity of the phenomenon, and, simultaneously, improving regulatory analysis, by admitting the existence of latent risk that may materialize in the future.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In the final analysis, technological advances, especially in the field of quantum computing, expose structural limits of traditional legal categories. The law begins to face not only the question of when the illicit occurs, but also when the damage becomes intelligible, exploitable, and legally relevant. Temporality thus ceases to be a merely formal element and comes to occupy a central position in the definition of the illicit and the construction of adequate legal responses.<\/p>\n<p>&nbsp;<\/p>\n<hr data-path-to-node=\"13\" \/>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST). What is Post-Quantum Cryptography? Dispon\u00edvel em: https:\/\/www.nist.gov\/cybersecurity-and-privacy\/what-post-quantum-cryptography. Acesso em: 17 abr. 2026.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> BRASIL. Decreto-Lei n\u00ba 2.848, de 7 de dezembro de 1940. C\u00f3digo Penal. Dispon\u00edvel em: https:\/\/www.planalto.gov.br\/ccivil_03\/decreto-lei\/del2848.htm. Acesso em: 17 abr. 2026.<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> Id.<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> VALE, Lu\u00eds Manoel Borges do; PEREIRA, Jo\u00e3o Sergio; AMARAL, Samya Suruagy do. Computa\u00e7\u00e3o qu\u00e2ntica e provas judiciais. Migalhas, 25 set. 2025.<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> GRECO, Rog\u00e9rio. Curso de Direito Penal. Rio de Janeiro: Impetus, 2023.<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> NUCCI, Guilherme de Souza. Manual de Direito Penal. Rio de Janeiro: Forense, 2022.<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> SUPERIOR TRIBUNAL DE JUSTI\u00c7A (STJ). HC 216.555\/RJ. Dispon\u00edvel em &lt; https:\/\/www.stj.jus.br\/websecstj\/cgi\/revista\/REJ.cgi\/ITA?seq=1155836&amp;tipo=0&amp;nreg=201101994617&amp;SeqCgrmaSessao=&amp;CodOrgaoJgdr=&amp;dt=20120629&amp;formato=PDF&amp;salvar=false&gt;.<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> SUPERIOR TRIBUNAL DE JUSTI\u00c7A (STJ). REsp 1.206.105\/RJ. Dispon\u00edvel em &lt; https:\/\/www.stj.jus.br\/websecstj\/cgi\/revista\/REJ.cgi\/ITA?seq=1103844&amp;tipo=0&amp;nreg=201001493383&amp;SeqCgrmaSessao=&amp;CodOrgaoJgdr=&amp;dt=20120822&amp;formato=PDF&amp;salvar=false&gt;.<\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> BRASIL. Lei n\u00ba 13.709, de 14 de agosto de 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais. Dispon\u00edvel em: https:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/l13709.htm. Acesso em: 17 abr. 2026.<\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> AUTORIDADE NACIONAL DE PROTE\u00c7\u00c3O DE DADOS (ANPD). Regulamento de Comunica\u00e7\u00e3o de Incidente de Seguran\u00e7a. Dispon\u00edvel em: https:\/\/www.gov.br\/anpd\/pt-br\/canais_atendimento\/agente-de-tratamento\/comunicado-de-incidente-de-seguranca-cis. Acesso em: 17 abr. 2026.<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> EUROPEAN DATA PROTECTION BOARD (EDPB). Guidelines 9\/2022 on personal data breach notification. Dispon\u00edvel em: https:\/\/www.edpb.europa.eu\/our-work-tools\/documents\/public-consultations\/2022\/guidelines-92022-personal-data-breach_en. Acesso em: 17 abr. 2026.<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> BRASIL. Lei n\u00ba 13.709, de 14 de agosto de 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais. Dispon\u00edvel em: https:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/l13709.htm. Acesso em: 17 abr. 2026.<\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> FIPS 203 do NIST (agosto de 2024)<\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> ABDIKHAKIMOV, Islombek. The challenge of &#8216;harvest now, decrypt later&#8217; (hndl) to the international law of state responsibility in the quantum era. Elita.uz, Tashkent, v. 1, n. 4, 2026.<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> Harvest Now, Decrypt Later: A Amea\u00e7a Qu\u00e2ntica aos Seus Dados. Resh Pentest Experts, 2025.<\/p>","protected":false},"excerpt":{"rendered":"<p>The progressive technological sophistication has placed classical legal categories under tension, especially those related to the temporal delimitation of the illicit act and the identification [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[27],"tags":[33],"class_list":["post-2142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artigos","tag-contencioso-digital-prevencao-a-fraude"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptography Today, Violation Tomorrow: The &quot;Harvest Now, Decrypt Later&quot; Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil - Peck Advogados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[:pb]Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil[:en]Cryptography Today, Violation Tomorrow: The &quot;Harvest Now, Decrypt Later&quot; Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil[:] - Peck Advogados\" \/>\n<meta property=\"og:description\" content=\"The progressive technological sophistication has placed classical legal categories under tension, especially those related to the temporal delimitation of the illicit act and the identification [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/\" \/>\n<meta property=\"og:site_name\" content=\"Peck Advogados\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T12:00:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/11\/banner-home-areas2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gustavo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gustavo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/\"},\"author\":{\"name\":\"Gustavo\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#\\\/schema\\\/person\\\/c3c329bd5e43bb24c72c0516709e87ad\"},\"headline\":\"Cryptography Today, Violation Tomorrow: The &#8220;Harvest Now, Decrypt Later&#8221; Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil\",\"datePublished\":\"2026-05-14T12:00:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/\"},\"wordCount\":3782,\"publisher\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/peckadv.com.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/banner-home-areas2.jpg\",\"keywords\":[\"Digital Litigation &amp; Fraud Prevention\"],\"articleSection\":[\"Artigos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/\",\"url\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/\",\"name\":\"[:pb]Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil[:en]Cryptography Today, Violation Tomorrow: The \\\"Harvest Now, Decrypt Later\\\" Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil[:] - Peck Advogados\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/peckadv.com.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/banner-home-areas2.jpg\",\"datePublished\":\"2026-05-14T12:00:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#primaryimage\",\"url\":\"https:\\\/\\\/peckadv.com.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/banner-home-areas2.jpg\",\"contentUrl\":\"https:\\\/\\\/peckadv.com.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/banner-home-areas2.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/peckadv.com.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#website\",\"url\":\"https:\\\/\\\/peckadv.com.br\\\/\",\"name\":\"Peck Advogados\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/peckadv.com.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#organization\",\"name\":\"Peck Advogados\",\"url\":\"https:\\\/\\\/peckadv.com.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/peckadv.com.br\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/favIcon1.png\",\"contentUrl\":\"https:\\\/\\\/peckadv.com.br\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/favIcon1.png\",\"width\":512,\"height\":512,\"caption\":\"Peck Advogados\"},\"image\":{\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/peckadv.com.br\\\/#\\\/schema\\\/person\\\/c3c329bd5e43bb24c72c0516709e87ad\",\"name\":\"Gustavo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/13bb9cef6916b0a9b5627144277ea2dd9180b15445e949eca3b20c8807887e30?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/13bb9cef6916b0a9b5627144277ea2dd9180b15445e949eca3b20c8807887e30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/13bb9cef6916b0a9b5627144277ea2dd9180b15445e949eca3b20c8807887e30?s=96&d=mm&r=g\",\"caption\":\"Gustavo\"},\"url\":\"https:\\\/\\\/peckadv.com.br\\\/en\\\/author\\\/gustavo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[:pb]Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil[:en]Cryptography Today, Violation Tomorrow: The \"Harvest Now, Decrypt Later\" Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil[:] - Peck Advogados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/","og_locale":"en_US","og_type":"article","og_title":"[:pb]Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil[:en]Cryptography Today, Violation Tomorrow: The \"Harvest Now, Decrypt Later\" Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil[:] - Peck Advogados","og_description":"The progressive technological sophistication has placed classical legal categories under tension, especially those related to the temporal delimitation of the illicit act and the identification [&hellip;]","og_url":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/","og_site_name":"Peck Advogados","article_published_time":"2026-05-14T12:00:45+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/11\/banner-home-areas2.jpg","type":"image\/jpeg"}],"author":"Gustavo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gustavo","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#article","isPartOf":{"@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/"},"author":{"name":"Gustavo","@id":"https:\/\/peckadv.com.br\/#\/schema\/person\/c3c329bd5e43bb24c72c0516709e87ad"},"headline":"Cryptography Today, Violation Tomorrow: The &#8220;Harvest Now, Decrypt Later&#8221; Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil","datePublished":"2026-05-14T12:00:45+00:00","mainEntityOfPage":{"@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/"},"wordCount":3782,"publisher":{"@id":"https:\/\/peckadv.com.br\/#organization"},"image":{"@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#primaryimage"},"thumbnailUrl":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/11\/banner-home-areas2.jpg","keywords":["Digital Litigation &amp; Fraud Prevention"],"articleSection":["Artigos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/","url":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/","name":"[:pb]Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil[:en]Cryptography Today, Violation Tomorrow: The \"Harvest Now, Decrypt Later\" Problematic Against the Limits of Criminal Law and Incident Regulation in Brazil[:] - Peck Advogados","isPartOf":{"@id":"https:\/\/peckadv.com.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#primaryimage"},"image":{"@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#primaryimage"},"thumbnailUrl":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/11\/banner-home-areas2.jpg","datePublished":"2026-05-14T12:00:45+00:00","breadcrumb":{"@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#primaryimage","url":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/11\/banner-home-areas2.jpg","contentUrl":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/11\/banner-home-areas2.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/peckadv.com.br\/criptografia-hoje-violacao-amanha-a-problematica-do-harvest-now-decrypt-later-frente-aos-limites-do-direito-penal-e-da-regulacao-de-incidentes-no-brasil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/peckadv.com.br\/"},{"@type":"ListItem","position":2,"name":"Criptografia hoje, viola\u00e7\u00e3o amanh\u00e3: a problem\u00e1tica do Harvest Now, Decrypt Later frente aos limites do direito penal e da regula\u00e7\u00e3o de incidentes no Brasil"}]},{"@type":"WebSite","@id":"https:\/\/peckadv.com.br\/#website","url":"https:\/\/peckadv.com.br\/","name":"Peck Advogados","description":"","publisher":{"@id":"https:\/\/peckadv.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/peckadv.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/peckadv.com.br\/#organization","name":"Peck Advogados","url":"https:\/\/peckadv.com.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/peckadv.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/06\/favIcon1.png","contentUrl":"https:\/\/peckadv.com.br\/wp-content\/uploads\/2025\/06\/favIcon1.png","width":512,"height":512,"caption":"Peck Advogados"},"image":{"@id":"https:\/\/peckadv.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/peckadv.com.br\/#\/schema\/person\/c3c329bd5e43bb24c72c0516709e87ad","name":"Gustavo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/13bb9cef6916b0a9b5627144277ea2dd9180b15445e949eca3b20c8807887e30?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/13bb9cef6916b0a9b5627144277ea2dd9180b15445e949eca3b20c8807887e30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/13bb9cef6916b0a9b5627144277ea2dd9180b15445e949eca3b20c8807887e30?s=96&d=mm&r=g","caption":"Gustavo"},"url":"https:\/\/peckadv.com.br\/en\/author\/gustavo\/"}]}},"_links":{"self":[{"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/posts\/2142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/comments?post=2142"}],"version-history":[{"count":3,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/posts\/2142\/revisions"}],"predecessor-version":[{"id":2148,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/posts\/2142\/revisions\/2148"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/media\/1952"}],"wp:attachment":[{"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/media?parent=2142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/categories?post=2142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/peckadv.com.br\/en\/wp-json\/wp\/v2\/tags?post=2142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}