How to protect your privacy when using search engines

Source: Internet
Author: User
Tags ixquick

The anonymity of the Internet protects the security of users' information and network usage. However, we often learn from various media about the vicious violation of privacy on the Internet. Currently, the biggest threat to user privacy is not to track users' cookies, spyware, and users' browser behavior analysis websites, but to our daily search engines. Most search engines record users' IP addresses, search keywords, websites to jump from the search results, and other information when users use their services. Through data mining and other technologies, the search service provider can obtain the user's identity, interests, online behaviors, and other private information from the information, and may use the privacy information for commercial activities.

It is neither realistic nor wise to give up search engines because of the existence of privacy threats. search engines are playing an increasingly important role in our network activities. So how can we protect users' privacy when using the search engine service? I have sorted out some practical experiences. Users can select the following items when using the search engine:

1. Do not log on to the search engine or the tools provided by the Search Engine

Nowadays, many search engines provide personalized search services, which greatly facilitates users, but also leaves a hidden risk of infringing user privacy. After a user logs on to an account registered on the search engine, the search engine can easily track user search records and behaviors based on user registration information, the collected user information is used to form the user's online activity files. It is recommended that you do not log on to the Account Service of the search engine when using the search engine. If you want to use other services provided by the search service provider, such as The Gmail service provided by Google, do not use Google for search at the same time.

If you are using multiple browsers at the same time, you can also use a slightly more troublesome method: one browser is used to log on to the search engine account to use other services of the search service provider, another browser is only used for the search service of the search engine. Using-ProfileManager to start Firefox's file manager, and then create and use multiple profiles to ensure that the services provided by the search service provider can be separated.

2. Prevent Google from collecting privacy information

Google is the most widely used search engine. In other words, we need to pay more attention to privacy protection when using Google for search. A simple method is to clear the Cookie files saved on the machine before using Google. However, because the Cookie also saves useful information of users on other websites, this method is not feasible. A simpler method is to set a browser to prevent Google from accessing cookies.

Users using IE can find a button named "Site" in the tool menu> Internet Options> privacy tab, and then add www.google.com to the Cookie rejection list, are you sure you want to exit.

Users using the Firefox browser can add www.google.com to the blocking list in the "exception" next to the "accept site Cookie" option in the tool menu> Options> privacy.

After you set up a browser in this way, when using Google's search service, Google sites cannot store cookies on users' machines, and therefore cannot track users' search records through cookies. However, you must note that this prevents cookies on Google sites. Therefore, Gmail and other services provided by Google cannot be used.

When you use Google Reader, Google Reader, or Google discussion group, you also need to log on to your Google account. Therefore, google also collects users' interests in news and topics through these channels. Users should pay attention to these services when using them.

3. Change IP addresses on a regular basis

The search service provider also organizes the collected user information based on the connection IP address and the user's search content. This problem can be solved by regularly changing the IP address. If you are using xDSL dial-up access, you can change the connected IP Address by disconnecting and dialing again on a regular basis. For individuals or organizational users using static IP addresses, you can consider using Tor, VPN, and other encrypted connection tools, or selecting public proxy servers on the Internet.

4. Use a search engine that does not save user information

When searching for general information, users can also use a search engine that does not store user search information. Ixquick search engine (www.ixquick.com) is a good choice and has a Chinese version, support for Chinese websites is not bad. It promises to delete all traces of user search within 48 hours, so users do not have to worry about using their search information for other purposes.

5. Do not include your personal information in search keywords

Most users have searched their names and personal information to find out what information they can find on the Internet-but this is harmful from the perspective of privacy protection: first, the search engine can easily organize personal information such as the name of the user contained in the search keyword into a user's online activity file, if a user searches for his or her own phone number, ID card number, and other sensitive information by the search engine, the hacker may also be able to use social engineering for fraud.

Therefore, do not include your personal information in search keywords when using search engines.

6. Use Public Wireless Access Service or proxy server to search for sensitive information

If you need to use a search engine to search for sensitive information, it is recommended that you use the Wireless Access Service (Hot spot) in public places or public proxy servers, instead of at home or at work. This prevents the search engine from storing and using sensitive information searched by the user and the access address of the user. When using the public wireless access service or proxy server, make sure that you do not need to perform login operations involving user personal information.

7. Do not use the search service provided by your ISP

Generally, your Internet access provider (ISP) provides users with a series of Internet-related services, such as Email, file download, and search. Because the ISP stores user registration information, login IP addresses, and so on, the ISP can use the user's search content to track Users' Network activities, therefore, I suggest that you do not use the search service provided by your ISP for information search. Follow the above suggestions to use the public search service.

(End)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.