Commentary

Search leakage is not FUD

Lately I’ve been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to the sites they click on. I hope to address those concerns in this post.

For those of you who have no idea what I’m talking about: when you click on a link on the Internet, where you clicked from gets automatically sent to the site you clicked on (most of the time).

For example, if you’re on yahoo.com and you click to a story at the New York Times, your browser will send to newyorktimes.com some information that you came from yahoo.com — namely, the Web address of the page you were just on. This info is called the Referrer.

At issue here is that sometimes the Referrer contains personal information. In particular, when you use most search engines, your search terms are included in the Referrer. That is, when you search on Google/Bing/etc., and you click on a link, your search terms are sent to the site you clicked on. This search leakage doesn’t happen at DuckDuckGo.

Now, let’s take the FUD arguments in turn – One site having one of my search terms is irrelevant. That may generally be the case, but unfortunately, tens of millions of sites run ads from just a handful of ad networks. Those ad networks can aggregate your search terms and piece together a large percentage of your search history.

So the question then becomes do you care if third parties (not associated with your search engine and not bound by its privacy policy) have a significant % of your search history? If you don’t care about that, then you probably don’t care about Referrers.

It’s not Google’s fault. Your browser sends that stuffContinue reading…

Related Posts

U.S. Government Seizes 82 Websites: A Glimpse at the Draconian Future of Copyright Enforce... Over the past few days, the U.S. Justice Department, the Department of Homeland Security and nine U.S. Attorneys’ Offices seized 82 domain names of ...
Does disk encryption really protect your data from unauthorized access? Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. An...
Some File-Sharers Leave Trails To Their Front Door Following the publication of a paper which investigates how using the same username across multiple web sites may expose Internet users to scammers, T...
Why I will not buy Google’s Cr-48 Chrome Notebook The Cr-48 is Google's cloud-based notebook computer. It was announced just this week, and is being made available to a select few. In computer-speak, ...
Amazon and WikiLeaks – Online Speech is Only as Strong as the Weakest Intermediary The First Amendment to the Constitution guarantees freedom of expression against government encroachment - but that doesn't help if the censorship do...
The MeeGo Progress Report: A+ or D-? The end of October saw the release of MeeGo 1.1, the second major milestone release of the platform since it burst onto the scenes in February 2010. T...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Search leakage is not FUD -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*