Blog

Racoon

The Impact of China’s Digital Security Model in Ecuador

 The Impact of China’s Digital Security Model in Ecuador

Steffano Utreras

Over the past decade, Ecuador incorporated into its state infrastructure one of the most extensive surveillance systems in Latin America. What began as a project to modernize emergency response ultimately became a process of technological, financial, and operational dependency on the People’s Republic of China. ECU-911 not only reshaped the relationship between the state and its citizens; it also introduced...

Read more
Secure Wi‑Fi: Basic Steps to Protect Your Connection and Privacy

Secure Wi‑Fi: Basic Steps to Protect Your Connection and Privacy

  • July 01, 2025
  • Laura Zambrano
  • Today, practically everything we do on our devices goes through a Wi‑Fi network: from checking email and making video calls, to watching a show or managing bank accounts. Sometimes we...
Read more about: Secure Wi‑Fi: Basic Steps to Protect Your Connection and Privacy
Icono
Regarding the approval of the organic law of intelligence

Regarding the approval of the organic law of intelligence

  • June 10, 2025
  • Centro de Autonomía Digital
  • The Intelligence Law proposed in Ecuador raises deep concerns about its potential impact on the rights and freedoms of those who live in the country. While national security is a...
Read more about: Regarding the approval of the organic law of intelligence
Icono
Programming languages for more secure development

Programming languages for more secure development

  • May 12, 2025
  • Ola Bini
  • When starting a new development project, there exists many choices that can be made. These choices will often have a large impact on both functional and non-functional aspects of the...
Read more about: Programming languages for more secure development
Icono
Loan Apps - A Digital Trap

Loan Apps - A Digital Trap

  • April 04, 2025
  • Álvaro Paredes
  • By Alvaro Paredes
Read more about: Loan Apps - A Digital Trap
Icono
Privacy by Design - Training Machine Learning Models without Sacrificing Data Protection

Privacy by Design - Training Machine Learning Models without Sacrificing Data Protection

  • February 24, 2025
  • Steffano Utreras
  • By Steffano Utreras
Read more about: Privacy by Design - Training Machine Learning Models without Sacrificing Data Protection
Icono
Challenges and learnings: Digital security in the fight against lithium mining

Challenges and learnings: Digital security in the fight against lithium mining

  • January 29, 2025
  • Sara Zambrano
  • CAD had the opportunity to participate in the First Andean Intercultural and Educational Summit for Indigenous Communities of Bolivia, Chile, Peru and Argentina that took place in the community of...
Read more about: Challenges and learnings: Digital security in the fight against lithium mining
Icono