Skip to main content

What is DuckDuckGo and how does it work ?

Increased state surveillance, countless security breaches and widespread concern about data sharing have spooked many of us into wanting to protect our privacy more than ever. 

Despite bubbling almost under the radar for nine years, anonymous search engine DuckDuckGo is now finding its stride in this current climate. In January, it announced it had passed ten billion searches, with four billion occurring in 2016.

What is DuckDuckGo?

DuckDuckGo describes itself as "the search engine that doesn't track you". It promises not to use cookies to follow users and says it doesn't collect any personal information on those who use it. Even your IP address is hidden.

How is it different to Google and Bing?


When you click on links from Google and Bing, even in private mode, the search terms are sent to the site you're visiting in the HTTP referrer header. When you visit that site, your computer automatically shares information, such as your IP address. This information can be used to identify you.

DuckDuckGo calls this "search leakage" and prevents it happening by default on its search results. Instead, when you click on a link on the site it redirects that request in such a way to prevent it sending your search terms to other sites. The sites know that you visited them, but they don't know what search you entered beforehand, nor can they use personal information to identify you. 

DuckDuckGo additionally offers an encrypted version that automatically changes links from a number of major sites to point to the encrypted versions, including Wikipedia, Facebook, Twitter, and Amazon.

Is it available on Tor?

Another way to prevent search leakage is to use a proxy. DuckDuckGo operates a so-called Tor exit enclave, which means you can get end-to-end anonymous and encrypted searching. Entering !proxy domain into DuckDuckGo will automatically route you through a proxy but proxies can be slow, and free proxies (like the ones DuckDuckGo use) are funded by advertising.

Ultimately, DuckDuckGo leaves the choice of protection to the user. You can deviate from the default on its settings page by toggling the redirect, or in the address bar settings. 

How does it make money?

While many websites and search engines collect data on you to sell to advertisers, DuckDuckGo takes a different approach – keywords.
"If you type in 'car' you get a car ad, if you type in 'mortgage' you get a mortgage ad," Weinberg said. "We don't need to know about you or your search history to deliver a lucrative ad." Weinberg added tht DuckDuckGo doesn't need "a lot of adverts" to make money and keywords are all it needs.

Will DuckDuckGo give information to police?

DuckDuckGo said it doesn't receive law enforcement requests because there is no data to request. "I think that law enforcement has essentially understood we don't have anything to give them; they don't really come knocking for things," Weinberg said. 

"Most of these laws are about turning over existing business records and we don't have any records to turn over. There's really nothing to take from us."

Why the name DuckDuckGo?

DuckDuckGo doesn't have an elaborate or hidden story behind its name; Weinberg simply liked it. It derives from the Duck, Duck, Goose game, but isn't a metaphor, and, just like Google has become a verb for searching, the company instead use the term "Duck it!"

source - Wired 

Comments

Popular posts from this blog

What is the difference between a direct and an indirect address instruction ?

Direct addressing means the instruction refers directly to the address being accessed. That is, the instruction encoding itself contains the address of the location. Depending on the instruction set, it may also allow computing a small index relative to the address. When used that way, you can think of that as a direct-indexed mode. (Note: Some processors call ‘direct’ mode ‘absolute’, such as the 6502.)

Indirect addressing uses an address held in a register or other location to determine what memory location to read or write. The idea here is that the instruction itself isn’t directly telling you the address to access, but rather indirectly telling the CPU where to find that address. The processor may also allow you to add a small offset to the indirect address, giving an indirect-indexed addressing mode.
Also Read : 5 Best Terminal Emulators for Linux The 6502 one is a little quirky: The 6502 doesn’t have general-purpose registers large enough to store addresses, so i…

What is ASP.NET? and it's ARCHITECTURE

What is ASP.Net?ASP.Net is a web development platform provided by Microsoft. It is used for creating web-based applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications.

ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.

The full form of ASP is Active Server Pages, and .NET is Network Enabled Technologies.
ASP.NET Architecture and its Components ASP.Net is a framework which is used to develop a Web-based application. The basic architecture of the ASP.Net framework is as shown below.
 he architecture of the.Net framework is based on the following key components

Language – A variety of languages exists for .net framework. They are VB.n…

What Is Defensive Programming ?

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed. – WikiPedia


Introduction Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed.
Advantages Defensive programming is an approach to improve software and source code, in terms of:
General qualityMaking the source code comprehensibleMaking the software behave in a predictable mannerDrawback Overly defensive programming, however, may safeguard against errors that will never be encountered, thus incurring run-time and maintenance costs. There is also the risk that the code traps or prevents too many exceptions, potentially resulting i…