Skip to main content

Tools to protect your web search privacy

Tools to protect your web search privacySome search engines log personally identifiable information (PII) such as location, IP addresses, digital identity, and other data to make the search results more relevant to the user, to display contextual advertising, or even to protect against fraud. They also track user activity and attempt to understand users’ behaviour on the web. Tracking by search engines may provide customised search results and help a user find the relevant content faster, it may also cloud the search results with the same information. While the quest for online anonymity and by extension, privacy, have essentially had to be traded off with convenience, there are different levels at which netizens may be able to guard their privacy online. Here is a quick list of some tools or services to ensure your privacy while conducting web searches.

Tor, a free-of-cost client-side software system is arguably the most well-known online anonymity tool. It uses multi-layered (like an onion) encryption to protect users’ identities. Users need to run an onion proxy on their devices. The data generated from activities such as visits to websites or content published online is encrypted many times over as it travels through the network, concealing the user’s identity and making it difficult to unscramble the information that is intercepted during communication. It is distributed under a free software license. However, researchers have documented ways of compromising the Tor network.
DDG screenshot
Screenshot of a search query at DuckDuckGo.com for DuckDuckGo


Built majorly on Free and Open Source  Software (FOSS), Duck Duck Go does not store IP addresses, cookies, doesn’t use cloud services, and Google APIs. It uses crowdsourced information to enhance search results, instead of tracking users. Search results are compiled from the DuckDuckBot, Wolfram Alpha, Wikipedia, and the Yahoo! Search BOSS (Build Your Own Search Engine) API. It has additional plug-ins such as those for arithmetical calculations or cryptographic tools. Gabriel Weinberg, the founder of the search engine sums up its privacy policy, "By default, DuckDuckGo does not collect or share personal information. That is our privacy policy in a nutshell". Searching a URL on DDG shows links from Google cache and the Wayback Machine.

AskEraser is a privacy feature of the search engine Ask.com. When this feature is enabled, a user’s search history is deleted from servers within a few hours (Search engines are known to retain users’ data for as long as a few months.) The deleted content includes session cookies, IP addresses, search strings themselves, and the associated user ID, which is typically a serial number assigned to the user. However, AskEraser does not delete PII. 

Ixquick is another search engine dedicated to search privacy. According to its privacy policy, it does not collect or share personal information such as the IP addresses, browser and platform information, and the text of the search query.

Google Encrypted Search
Google Encrypted Search enables searching over SSL (secure socket layer). Navigate to https://www.google.com or to https://encrypted.google.com to use this feature.

If you have a Google account, logging out of it before performing a search, or using different browsers for searching and using the account makes it slightly harder to log and track your activity.

GoogleMonkeyR is a userscript that enhances Google Search. Using the “trackless” option displayed adjacent to every search result, prevents the visit from being recorded and logged into your Google search history.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત