Recommendations for times of protestsJune 22, 2022The world is going through complicated times. Several countries are currently seeing dramatic upheaval, where...
Civil society organizations reject attempts to silence and criminalize social movements in the context of protests in Ecuador and demand that Human Rights are respectedJune 17, 2022The undersigned organizations and activists firmly reject the violent repression, arbitrary arrests and the use...
CAD participated in FLISoL Bogotá 2022June 13, 2022On April 23rd of 2022, CAD participated remotely in the Latin American Free Software Installation...
CoyIM v0.4 released!February 17, 2022Over the last few years, we at CAD have worked really hard on a new...
Fundamental security recommendations for critical infrastructureFebruary 11, 2022The last years have seen a number of high profile attacks on computer systems either...
The importance of metadataJanuary 22, 2022When we talk about privacy, the main focus is usually on encryption of regular data,...
CAD partitipation in Privacy Week 2022January 22, 2022During the Privacy Week 2022 that took place between January 24th and 28th of 2022,...
What is security research and security engineering?October 5, 2021Every single time a computer attack of some kind happens, the media and commentators throw...
What is Ransomware?July 21, 2021Over the last few years we have seen more and more attacks of ransomware, in...
CAD, present at FLISOL 2021!April 15, 2021Since 2005, the Latin American Festival of Free Software Installation - FLISOL has been held...
Introduction to Data StructuresJune 1, 2020The use of data structures allows the applications store and process information efficiently, for this...
Nextcloud through TorDecember 5, 2019This article will address the problem of data privacy in the use of file sharing...
Two-Factor AuthenticationNovember 29, 2019In the previous article we reviewed some important concepts around password handling and how to...
What is Diffie-Hellman?November 11, 2019Communication is one of the fundamental pillars of humanity since its inception.
Secure passwordsOctober 30, 2019Passwords are one of the most important tools to protect information in the digital world....
Mumble and TailsOctober 9, 2019In a digital world, internet calls have become an alternative for global communications at low...
Analysis of the Novaestrat LeakSeptember 28, 2019On September 16, ZDNet in collaboration with vpnMentor published an article showing that 20.8 million...
OTRv4 Summit and PETS2019September 27, 2019PETS is an annual event, that holds each year informative talks of privacy experts from...
How can your organization protect against data leaks?August 18, 2019The last few years, many people have said that data is the new oil.
CAD KickoffAugust 18, 2019One of the most interesting things to do when starting an organization, company, project or...
Ola Bini arrestApril 12, 2019People working for free software and privacy should not be criminalized.
CAD at the CryptoRaveMay 9, 2018CAD visits the CryptoRave conference in Brazil, one of the most important events in the...