Você está na página 1de 8

Doxing

From Wikipedia, the free encyclopedia

Doxing (from dox, abbreviation of documents),[1] or doxxing,[2][3] is the Internet-based practice of researching
and broadcasting private or identifiable information (especially personally identifiable information) about an
individual or organization.[3][4][5][6][7]

The methods employed to acquire this information include searching publicly available databases and social
media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and
hacktivism.

Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion,
coercion, harassment, online shaming, and vigilante justice.[8][9]

Contents
1 Etymology
2 History
3 Common techniques
4 Notable examples
4.1 Boston Marathon
4.2 Hit lists of abortion providers
4.3 Anonymous
4.4 Human flesh search engine
4.5 Journalists
4.6 Curt Schilling
4.7 Alondra Cano
4.8 Lou Dobbs
4.9 Erdogan emails
4.10 Michael Hirsh
4.11 U.S. Presidential Advisory Commission on Election Integrity
5 See also
6 References

Etymology
"Doxing" is a neologism that has evolved over its brief history. It comes from a spelling alteration of the
abbreviation "docs" (for "documents") and refers to "compiling and releasing a dossier of personal information
on someone".[10] Essentially, doxing is revealing and publicizing records of an individual, which were
previously private or difficult to obtain.

The term dox derives from the slang "dropping dox", which, according to Wired writer Mat Honan, was "an
old-school revenge tactic that emerged from hacker culture in 1990s". Hackers operating outside the law in that
era used the breach of an opponent's anonymity as a means to expose opponents to harassment or legal
repercussions.[10]

As such, doxing often comes with a negative connotation, because it can be a vehicle for revenge via the
violation of privacy.[11]

History
Doxware is a cryptovirology attack invented by Adam Young and further developed with Moti Yung that
carries out doxing extortion via malware. It was first presented at West Point in 2003. The attack is rooted in
game theory and was originally dubbed "non-zero sum games and survivable malware".[12]

The attack is summarized in the book Malicious Cryptography as follows:

"The attack differs from the extortion attack in the following way. In the extortion attack, the
victim is denied access to its own valuable information and has to pay to get it back, where in the
attack that is presented here the victim retains access to the information but its disclosure is at the
discretion of the computer virus."[13]

Doxware is the converse of ransomware. In a ransomware attack (originally called cryptoviral extortion), the
malware encrypts the victim's data and demands payment to provide the needed decryption key. In the doxware
cryptovirology attack, the attacker or malware steals the victim's data and threatens to publish it unless a fee is
paid.

Common techniques
Anyone can harvest information from the internet about individuals. There is no particular structure in place for
doxing, meaning someone may seek out any kind of information related to the target.

A basic Web search can yield results. Social media platforms like Facebook, Twitter, MySpace, and Linkedin
offer a wealth of private information, because many users have high levels of self-disclosure (i.e. sharing their
photos, place of employment, phone number, email address), but low levels of security. It is also possible to
derive a person's name and home address from a cell-phone number, through such services as reverse phone
lookup.[14] Social engineering has been used to extract information from government sources or phone
companies.[15]

In addition to these, a doxxer may use other methods to harvest information. These include information search
by domain name and location searching based on an individual's IP address.[16]

Once people have been exposed through doxing, they may be targeted for harassment through methods such as
harassment in person, fake signups for mail and pizza deliveries, or through swatting (dispatching armed police
to their house through spoofed tips).

It is important to note that a hacker may obtain an individual's dox without making the information public. A
hacker may harvest a victim's information in order to break into their internet accounts, or to take over their
social media accounts.[17]

The victim may also be shown their details as proof that they have been doxed in order to intimidate them.
Doxing is therefore a standard tactic of online harassment, and has been used by people associated with 4chan,
the Gamergate controversy and anti-vaccine activists.[18][19][20][21]

The ethics of doxing by journalists, on matters that they assert are issues of public interest, is an area of much
controversy. Many authors have argued that doxing in journalism blurs the line between revealing information
in the interest of the public and releasing information about an individual's private life against their
wishes.[22][23][24]

Notable examples
Boston Marathon
Following the 2013 Boston Marathon bombing, vigilantes on Reddit wrongly identified a number of people as
suspects.[25] Notable among misidentified bombing suspects was Sunil Tripathi, a student reported missing
before the bombings took place. A body reported to be Tripathi's was found in Rhode Island's Providence River
on April 25, 2013, as reported by the Rhode Island Health Department. The cause of death was not immediately
known, but authorities said they did not suspect foul play.[26] The family later confirmed Tripathi's death was a
result of suicide.[27] Reddit general manager Martin later issued an apology for this behavior, criticizing the
"online witch hunts and dangerous speculation" that took place on the website.[28]

Hit lists of abortion pr oviders

In the 1990s anti-abortion terrorists secured abortion providers' personal information, such as their home
addresses, phone numbers, and photographs, and posted them as a hit list, ruled by the courts to be an
immediate incitement to violence. The site's legend explained: "Black font (working); Greyed-out Name
(wounded); Strikethrough (fatality)." The website included blood-dripping graphics, celebrated providers'
deaths and incited others to kill or injure the remaining providers on the list. Between 1993 and 2016, eight
abortion providers were killed by anti-abortion terrorists.[29][30]

Anonymous

The term "dox" entered mainstream public awareness through media attention attracted by Anonymous, the
Internet-based group of hacktivists and pranksters who make frequent use of doxing,[31] as well as related
groups like AntiSec and LulzSec. The Washington Post has described the consequences for innocent people
incorrectly accused of wrongdoing and doxed as "nightmarish".[32]

In December 2011, Anonymous exposed detailed information of 7,000 members of law enforcement in
response to investigations into hacking activities.[5]

In November 2014, Anonymous began releasing the identities of members of the Ku Klux Klan.[33] This was in
relation to local Klan members in Ferguson, Missouri making threats to shoot anyone who provoked them
while protesting the shooting of Michael Brown. Anonymous also hijacked the group's Twitter page, and this
resulted in veiled threats of violence against members of Anonymous.[34] In November 2015, a major release of
information about the KKK was planned. Discredited information was released prematurely and Anonymous
denied involvement.[35] On November 5, 2015 (Guy Fawkes Night), Anonymous released an official list of
supposed but currently unverified KKK members and sympathizers.[36]

Human flesh search engine

The Chinese Internet phenomenon of the "Human flesh search engine" shares much in common with doxing.
Specifically, it refers to distributed, sometimes deliberately crowdsourced searches for similar kinds of
information through use of digital media.[37][38]

Journalists

Journalists with The Journal News of Westchester County, New York, were accused of doxing gun owners in
the region in a story the paper published in December 2012.[39]

Newsweek came under fire when writer Leah McGrath Goodman claimed to have revealed the identity of the
anonymous creator of Bitcoin, Satoshi Nakamoto. Though the source of her sleuthing was primarily the public
record, she was heavily criticized for her doxing by users on Reddit.[11]

The Satoshi Nakamoto case brought doxing to greater attention, particularly on platforms such as Twitter,
where users questioned the ethics of doxing in journalism. Many Twitter users condemned doxing in
journalism, wherein they argued that the practice was seemingly acceptable for professional journalists but
wrong for anyone else. Other users discussed the effect the popularization that the concept of doxing could
have on journalism in public interest, raising questions over journalism concerning public and private figures.
Many users have argued that doxing in journalism blurs the line between revealing information in the interest
of the public and releasing information about an individual's private life against their wishes.[22][24]

Curt Schilling

In March 2015, former Major League Baseball (MLB) pitcher Curt Schilling used doxing to identify several
people responsible for "Twitter troll" posts with obscene, sexually explicit comments about his teenaged
daughter. One person was suspended from his community college, and another lost a part-time job with the
New York Yankees.[40]

Alondra Cano

In December 2015, Minneapolis city councilwoman Alondra Cano used her Twitter account to publish private
cellphone numbers and e-mail addresses of critics who wrote about her involvement in a Black Lives Matter
rally.[41]

Lou Dobbs

In 2016, Fox Business news anchor Lou Dobbs revealed the address and phone number of Jessica Leeds, one of
the women who accused American presidential candidate Donald Trump of inappropriate sexual advances;
Dobbs later apologized.[42]

Erdogan emails

In July 2016, Wikileaks released 300,000 e-mails called the Erdogan emails, initially thought to be damaging to
Turkish President Recep Tayyip Erdogan. Included in the leak was Michael Best, who uploaded Turkish
citizens' personal information databases that WikiLeaks promoted, who came forward to say that doing so was
a mistake after the site where he uploaded the information took it down. The files were removed due to privacy
concerns, as they included spreadsheets of private, sensitive information of what appears to be every female
voter in 79 out of 81 provinces in Turkey, including their home addresses and other private information,
sometimes including their cellphone numbers.[43]

Michael Hirsh

In November 2016, Politico editor Michael Hirsh resigned after publishing the home address of white
supremacist Richard B. Spencer on Facebook.[44][45]

U.S. Presidential Advisory Com mission on Election Integrity

In July 2017, the United States' Presidential Advisory Commission on Election Integrity, which was established
in May 2017 by U.S. President Donald Trump[46][47] to investigate his controversial allegation of voter
fraud,[48] published a 112-page document of unredacted emails of public comment on its work, which were
those of critics of the Commission. The Commission did not omit the personal details of those critics, such as
names, emails, phone numbers and home addresses. Most of the commenters who wrote to the White House
expressed concern about publication of their personal information, with one person writing, "DO NOT
RELEASE ANY OF MY VOTER DATA PERIOD". Despite this, that person's name and email address were
published by the commission.[49][50]

This act drew criticism from Theresa Lee, a staff attorney for the American Civil Liberties Union's Voting
Rights Project, who stated, "This cavalier attitude toward the public's personal information is especially
concerning given the commission's request for sensitive data on every registered voter in the country."[49][50]
The White House defended the publication of the personal information, noting that everyone was warned that
might happen. However, former Deputy Secretary of Labor Chris Lu stated that regardless of the legality, the
White House has a moral obligation to protect sensitive data, saying, "Whether or not it's legal to disclose this
personal information, it's clearly improper, and no responsible White House would do this."[50]

Federal agencies often solicit and release public comments on proposed legislation. Regulations.gov, which is
designated for public comments, includes a detailed set of guidelines explaining how to submit comments, what
type of personal information is collected and how that information may be used, stating, "Some agencies may
require that you include personal information, such as your name and email address, on the comment form. The
Securities and Exchange Commission, for instance, warns commenters to 'submit only information that you
wish to make available publicly.'" Another agency, the Federal Trade Commission, tells commenters that
"published comments include the commenter's last name and state/country as well as the entire text of the
comment. Please do not include any sensitive or confidential information." However, The White House does
not appear to have issued any such public guidelines or warnings before many of the emails were sent. Marc
Lotter, Press Secretary to Mike Pence, stated, "These are public comments, similar to individuals appearing
before commission to make comments and providing name before making comments. The Commission’s
Federal Register notice asking for public comments and its website make clear that information 'including
names and contact information' sent to this email address may be released."[51]

See also
Doxbin
Identity theft
Outing
Data Re-Identification

References
1. "Definition of dox in English" (http://www.oxforddictionaries.com/definition/english/dox).
Oxforddictionaries.com. Retrieved 2016-01-05.
2. "The Problem With "Doxxing" – On The Media" (http://www.onthemedia.org/story/problem-doxxing/).
onthemedia.org. Retrieved 2016-01-05.
3. S-W, C. "What doxxing is, and why it matters" (https://www.economist.com/blogs/economist-explains/2
014/03/economist-explains-9). The Economist, UK. Retrieved 2016-01-05.
4. Schneier, Bruce (2016-07-29). "The Security of Our Election Systems" (https://www.schneier.com/blog/a
rchives/2016/07/the_security_of_11.html). Retrieved 2016-08-06.
5. Ryan Goodrich (2 April 2013). "What is Doxing?" (http://www.technewsdaily.com/17590-what-is-doxin
g.html). TechNewsDaily.com. Retrieved 24 October 2013.
6. James Wray and Ulf Stabe (2011-12-19). "The FBI’s warning about doxing was too little too late" (http://
www.thetechherald.com/articles/The-FBIs-warning-about-doxing-was-too-little-too-late).
Thetechherald.com. Retrieved 2012-10-23.
7. Zurcher, Anthony. "Duke freshman reveals porn identity" (http://www.bbc.co.uk/news/blogs-echochambe
rs-26477417). BBC, United Kingdom. Retrieved 9 April 2014.
8. Bright, Peter (2012-03-07). "Doxed: how Sabu was outed by former Anons long before his arrest" (http
s://arstechnica.com/tech-policy/news/2012/03/doxed-how-sabu-was-outed-by-former-anons-long-before-
his-arrest.ars). Ars Technica. Retrieved 2012-10-23.
9. Clark Estes, Adam (2011-07-28). "Did LulzSec Trick Police Into Arresting the Wrong Guy? –
Technology" (http://www.theatlanticwire.com/technology/2011/07/did-lulzsec-trick-police-arresting-wro
ng-guy/40522/). The Atlantic Wire. Retrieved 2012-10-23.
10. Honan, Mat (2014-03-06). "What Is Doxing?" (https://www.wired.com/2014/03/doxing/). Wired.
Retrieved 2014-12-10.
11. Garber, Megan (2014-03-06). "Doxing: An Etymology" (https://www.theatlantic.com/technology/archiv
e/2014/03/doxing-an-etymology/284283/). The Atlantic. Retrieved 2014-12-10.
12. Young, A. (2003). Non-Zero Sum Games and Survivable Malware. IEEE Systems, Man and Cybernetics
Society Information Assurance Workshop. pp. 24–29.
13. A. Young, M. Yung (2004). Malicious Cryptography: Exposing Cryptovirology. Wiley. ISBN 0-7645-
4975-8.
14. Ramesh, Srikanth. "What is Doxing and How it is Done?" (http://www.gohacking.com/what-is-doxing-an
d-how-it-is-done/). GoHacking. Retrieved 2014-12-10.
15. Fagone, Jason. "The Serial Swatter" (https://www.nytimes.com/2015/11/29/magazine/the-serial-swatter.h
tml?_r=0). New York Times. Retrieved 25 November 2015.
16. "Guide to doxing: Tracking identities across the web | Blog | Blechschmidt.Saarland" (https://blog.blechs
chmidt.saarland/doxing/). blog.blechschmidt.saarland. Retrieved 2015-11-30.
17. "What Is Doxing?" (https://www.wired.com/2014/03/doxing/). WIRED. Retrieved 2015-11-30.
18. Hern, Alex. "Gamergate hits new low with attempts to send Swat teams to critics" (https://www.theguardi
an.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics).
The Guardian. Retrieved 2 July 2015.
19. Mulvaney, Nicole. "Recent wave of swatting nationwide fits definition of terrorism, Princeton police
chief says" (http://www.nj.com/mercer/index.ssf/2015/06/princeton_swatting_incidents_schools_malls_h
oaxes.html). NJ.com. Retrieved 3 July 2015.
20. Liebl, Lance. "The dangers and ramifications of doxxing and swatting" (http://www.gamezone.com/origi
nals/the-dangers-and-ramifications-of-doxxing-and-swatting). Gamezone.
21. Diresta & Lotan. "How antivaxxers influence legislation" (https://www.wired.com/2015/06/antivaxxers-i
nfluencing-legislation/). Wired. Conde Nast. Retrieved 3 July 2015.
22. "Newsweek, Bitcoin and the ethics of 'doxxing' " (http://america.aljazeera.com/watch/shows/the-stream/t
he-stream-officialblog/2014/3/7/newsweek-bitcoinandtheethicsofdoxxing.html). america.aljazeera.com.
Retrieved 2015-12-01.
23. "Rethinking the ethics of doxing • Background Probability" (http://www.skepticink.com/backgroundprob
ability/2014/12/14/rethinking-the-ethics-of-doxing/). Background Probability. Retrieved 2015-12-01.
24. Ingram, Mathew (2014-03-06). "Of Bitcoin and doxxing: Is revealing Satoshi Nakamoto’s identity okay
because it was Newsweek and not Reddit?" (https://gigaom.com/2014/03/06/of-bitcoin-and-doxxing-is-re
vealing-sakamotos-identity-okay-because-it-was-newsweek-and-not-reddit/). Retrieved 2015-12-01.
25. "Innocents accused in online manhunt" (http://www.3news.co.nz/Innocents-accused-in-online-manhunt/t
abid/412/articleID/295143/Default.aspx). 3 News NZ. April 22, 2013.
26. Buncombe, Andrew. "Family of Sunil Tripathi - missing student wrongly linked to Boston marathon
bombing - thank well-wishers for messages of support" (https://www.webcitation.org/6Ve1o3Cqa?url=htt
p://www.independent.co.uk/news/world/americas/family-of-sunil-tripathi--missing-student-wrongly-link
ed-to-boston-marathon-bombing--thank-wellwishers-for-messages-of-support-8586850.html). The
Independent. Archived from the original (https://www.independent.co.uk/news/world/americas/family-of
-sunil-tripathi--missing-student-wrongly-linked-to-boston-marathon-bombing--thank-wellwishers-for-me
ssages-of-support-8586850.html) on 17 January 2015. Retrieved 17 January 2015. "The cause of the
student's death has still be determined but the medical examiner said no foul play was suspected."
27. Nark, Jason. "The Boston bombing's forgotten victim" (https://www.webcitation.org/6TjkHiR9g?url=htt
p://articles.philly.com/2014-04-30/news/49497042_1_sunil-tripathi-providence-river-sunny).
Philadelphia Daily News. Archived from the original (http://articles.philly.com/2014-04-30/news/494970
42_1_sunil-tripathi-providence-river-sunny) on 31 October 2014. Retrieved 31 October 2014. "Akhil
spent the most time with Sunny before his suicide, weekends at Brown where he tried to help his
youngest child foresee a future."
28. Martin, Erik. "Reflections on the Recent Boston Crisis" (https://redditblog.com/2013/04/reflections-on-re
cent-boston-crisis.html). Reddit.com. Retrieved May 3, 2013.
29. How Abortion Providers Are 'Living in the Crosshairs' (https://www.rollingstone.com/politics/news/how-
abortion-providers-are-living-in-the-crosshairs-20150518) By Tara Murtha, Rolling Stone, May 18, 2015
30. Strikethrough (Fatality); The origins of online stalking of abortion providers. (http://www.slate.com/articl
es/news_and_politics/jurisprudence/2015/05/neal_horsley_of_nuremberg_files_died_true_threats_case_r
econsidered_by_supreme.html) By David S. Cohen and Krysten Connon, Slate, May 21 2015]
31. "Anonymous's Operation Hiroshima: Inside the Doxing Coup the Media Ignored (VIDEO)" (http://www.
ibtimes.com/articles/276610/20120104/anonymous-operation-hiroshima-inside-doxing-coup.htm).
Ibtimes.com. 2012-01-01. Retrieved 2012-10-23.
32. Ohlheiser, Abby (5 November 2015). "What you need to know about Anonymous’s big anti-KKK
operation" (https://www.washingtonpost.com/news/the-intersect/wp/2015/11/05/what-you-need-to-know-
about-anonymouss-big-anti-kkk-operation/). Retrieved 15 June 2016 – via washingtonpost.com.
33. "Hacker-activist group Anonymous seizes KKK Twitter accounts; reveals identities" (http://fox2now.co
m/2014/11/17/hacker-activist-group-anonymous-seizes-kkk-twitter-accounts-reveals-identities/). Fox 2
Now. Retrieved 21 November 2014.
34. "Ferguson KKK Doubles Down By Threatening To Shoot People Wearing Anonymous Guy Fawkes
Masks" (http://www.ifyouonlynews.com/racism/kkk-threatens-shooting-anonymous-members/). If Only
You News. Retrieved 21 November 2014.
35. Woolf, Nicky; Stafford, Zach (3 November 2015). "Anonymous denies releasing incorrect Ku Klux Klan
member information" (https://www.theguardian.com/technology/2015/nov/03/anonymous-denies-involve
ment-ku-klux-klan-data). Retrieved 15 June 2016.
36. "Anonymous posts Ku Klux Klan alleged sympathisers list" (http://www.bbc.co.uk/news/technology-347
36941). Retrieved 15 June 2016.
37. Fletcher, Hannah (June 25, 2008). "Human flesh search engines: Chinese vigilantes that hunt victims on
the web" (http://www.thetimes.co.uk/tto/technology/article1858917.ece). The Times.
38. Branigan, Tania (March 24, 2010). "How China's internet generation broke the silence" (https://www.the
guardian.com/world/2010/mar/24/china-internet-generation-censorship). The Guardian.
39. Alfonso, Fernando (26 December 2012). "Lawyer doxes 50 journalists who doxed gun owners" (http://w
ww.dailydot.com/news/christopher-fountain-journal-news-gun-owners/). The Daily Dot.
40. Machkovech, Sam (3 March 2015). "Former MLB pitcher, 38 Studios founder doxes his daughter’s
online abusers" (https://arstechnica.com/tech-policy/2015/03/former-mlb-pitcher-38-studios-founder-dox
es-his-daughters-online-abusers/). ArsTechnica.
41. "Minneapolis City Council Member Alondra Cano under fire for posting phone numbers, e-mail
addresses of constituents" (http://www.startribune.com/minneapolis-city-council-member-alondra-cano-u
nder-fire-for-posting-phone-numbers-email-addresses-of-constituents/363470421/). Star Tribune.
Retrieved 2015-12-26.
42. Steph Solis, USA TODAY, October 13, 2016, Lou Dobbs apologizes for sharing Trump accuser's
address, number (https://www.usatoday.com/story/news/politics/onpolitics/2016/10/13/lou-dobbs-tweete
d-jessica-leeds-address-number-apology/92029102/), Retrieved October 14, 2016, "... Dobbs apologized
for sharing the personal information on Thursday of a woman who alleged Donald Trump sexually
assaulted her...."
43. Zeynep Tufekci (25 July 2016). "WikiLeaks Put Women in Turkey in Danger, for No Reason
(UPDATE)" (http://www.huffingtonpost.com/zeynep-tufekci/wikileaks-erdogan-emails_b_11158792.htm
l). The Huffington Post.
44. "Politico editor resigns after sharing addresses of white nationalist on Facebook" (http://www.cnbc.com/2
016/11/22/politico-editor-resigns-after-sharing-addresses-of-white-nationalist-on-facebook.html). CNBC.
22 November 2016. Retrieved 23 November 2016.
45. Chasmar, Jessica (22 November 2016). "Politico editor resigns after sharing home addresses of alt-right
leader Richard Spencer" (http://www.washingtontimes.com/news/2016/nov/22/michael-hirsh-politico-edi
tor-resigns-after-sharin/). The Washington Times. Retrieved 23 November 2016.
46. Trump, Donald (May 11, 2017). "Presidential Executive Order on the Establishment of Presidential
Advisory Commission on Election Integrity" (https://www.whitehouse.gov/the-press-office/2017/05/11/p
residential-executive-order-establishment-presidential-advisory). White House.
47. Koerth-Baker, Maggie (July 7, 2017). "Trump’s Voter Fraud Commission Is Facing A Tough Data
Challenge" (https://fivethirtyeight.com/features/trumps-voter-fraud-commission-is-facing-a-tough-data-c
hallenge/). FiveThirtyEight.
48. Lowry, Brian (May 11, 2017). "Civil rights groups fume about Trump's choice of Kris Kobach for voter
fraud panel" (http://www.kansascity.com/news/politics-government/article149910457.html). The Kansas
City Star.
49. Neuman, Scott (July 14, 2017). "Vote Fraud Commission Releases Public Comments, Email Addresses
And All" (http://www.npr.org/sections/thetwo-way/2017/07/14/537282309/vote-fraud-commission-releas
es-public-comments-email-addresses-and-all). "The Two-Way". National Public Radio.
50. Politi, Daniel (July 15, 2017). "White House Publishes Names, Emails, Phone Numbers, Home
Addresses of Critics" (http://www.slate.com/blogs/the_slatest/2017/07/15/white_house_publishes_names
_emails_phone_numbers_home_addresses_of_critics.html). Slate.
51. Ingraham, Christopher (July 14, 2017). "White House releases sensitive personal information of voters
worried about their sensitive personal information" (https://www.washingtonpost.com/news/wonk/wp/20
17/07/14/white-house-releases-sensitive-personal-information-of-voters-worried-about-their-sensitive-pe
rsonal-information/). The Washington Post.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Doxing&oldid=797498492"

This page was last edited on 27 August 2017, at 12:21.


Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may
apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered
trademark of the Wikimedia Foundation, Inc., a non-profit organization.

Você também pode gostar