Blog

Racoon

Quick Response

Quick Response

Ivonne Zambrano

2025. The world isn’t spinning any faster, but we live as if it were. Everything is fleeting, fast, instantly. We’ve grown used to life happening in real time, without pause. We no longer perceive the feel of paper money or hear the clinking of coins when paying for a coffee. Today, a single scan is enough to access almost anything....

Read more
The Role of Free Software in Digital Security

The Role of Free Software in Digital Security

  • January 19, 2024
  • Steffano Utreras
  • In recent years, the escalating rise of digital threats such as malware, man-in-the-middle attacks, ransomware, among others, has posed a significant challenge to the security of our personal information, sensitive...
Read more about: The Role of Free Software in Digital Security
Icono
Online privacy

Online privacy

  • December 18, 2023
  • marcelo
  • By Marcelo Chiriboga
Read more about: Online privacy
Icono
Should Ecuador use bug bounties?

Should Ecuador use bug bounties?

  • December 05, 2023
  • Ola Bini
  • Over the last ten years, bug bounty programs have become progressively more common in many industrial countries. This trend started in the US, but has spread to other countries. However,...
Read more about: Should Ecuador use bug bounties?
Icono
Deepfake Pornography and Gender Violence

Deepfake Pornography and Gender Violence

  • November 22, 2023
  • karla
  • By Karla Morales
Read more about: Deepfake Pornography and Gender Violence
Icono
CryptoParty 2023!

CryptoParty 2023!

  • November 13, 2023
  • Sara Zambrano
  • On October 21st, another edition of CryptoParty was held in Quito, Ecuador as part of the series of events to celebrate World Encryption Day.
Read more about: CryptoParty 2023!
Icono
Implementing a Tor Middle Node in the Cloud

Implementing a Tor Middle Node in the Cloud

  • October 30, 2023
  • Laura Zambrano
  • In a world characterized by constant surveillance and the collection of personal data, safeguarding our online privacy and security becomes a fundamental necessity. Although it may seem like a daunting...
Read more about: Implementing a Tor Middle Node in the Cloud
Icono