News
3/24/2014
11:38 AM
Connect Directly
RSS
E-Mail
50%
50%

Former NSA And Google Engineers Launch A New And More Secure Disconnect Search

Disconnect Search protects users’ privacy in four ways

Palo Alto, CA (March 24, 2014) -- Disconnect, a leading developer of popular consumer privacy and security software, today announced the launch of a new, faster and more secure Disconnect Search product that protects users' privacy by preventing web searches from being tracked. (https://www.disconnect.me/search)

Developed by an ex-NSA engineer and three ex-Google engineers, Disconnect Search allows people to search privately without having to change their behavior. Unlike other private search solutions, Disconnect Search was designed so users can search privately using the web's most popular search engines, including Google, Bing, and Yahoo.

Disconnect Search protects users' privacy in four ways:

1. Search queries are routed through Disconnect's servers, which makes the queries look like they're coming from Disconnect instead of a specific user's computer.

2. Search engines are prevented from passing keywords to the sites that are visited from search results pages.

3. All queries are encrypted, which prevents ISPs and eavesdroppers in your network from seeing them.

4. Disconnect doesn't log any keywords, personal information, or IP addresses.

Disconnect Search is now available via a webpage (https://search.disconnect.me/); as an Android app (https://play.google.com/store/apps/details?id=me.disconnect.search); and for Chrome, Firefox, Internet Explorer, and Safari desktop browsers. First launched in October of 2013, Disconnect Search is one of the fastest-growing search products of all time and now adds significant speed and security enhancements to improve users' privacy and search performance.

"Demand for online privacy has never been higher," says Disconnect co-founder Casey Oppenheim. "People don't want or expect search engines, Internet service providers, the government, and websites they visit to record and connect their searches with their real name. Unfortunately, this type of unwanted tracking of our search history and other personal information is all too prevalent."

The new Disconnect Search is optimized for speed, search results load more than twice as fast as the previous version. Disconnect Search also has enhanced security features, including support for the latest versions of Transport Layer Security (TLS) and Perfect Forward Secrecy (PFS) so that a user's search history stays as private as possible, even in the event that Disconnect's private encryption keys are compromised.

"We worked closely with leading security experts, cryptographers, and search engineers when designing Disconnect Search," says Disconnect CTO and former NSA engineer Patrick Jackson. "We're proud that we're able to offer both cutting edge privacy and security, and significantly faster load times to give privacy-conscious users a better all-around search experience."

The latest Disconnect Search technology was also recently selected as the default search provider for Blackphone (https://www.blackphone.ch), the world's first smartphone placing privacy and control directly in the hands of its users. Created by SGP Technologies, a joint venture of Silent Circle and Geeksphone, Blackphone launched during Mobile World Congress and offers a full suite of applications giving worldwide users unprecedented control over privacy and security.

"We knew very early on that we wanted to partner with Disconnect, because the team behind it is totally aligned with our objectives for privacy," said Toby Weir-Jones, CEO of SGP Technologies. "Enabling private search on Blackphone by default is central to our goal of leaving no digital footprints without the user's knowledge or permission. Disconnect Search harvests all the accumulated knowledge of the internet without forcing the user to give up their personal information." Disconnect Search will arrive pre-installed on Blackphone devices' Android&trade based PrivatOS operating system, ensuring users' mobile searches are private right out of the box.

Disconnect Search includes the following features:

● Native results -- Users can stay private and get results from their favorite search engine.

● Familiar experience -- Users can search directly through their existing browser's omnibox or address bar.

● Privacy everywhere -- Users can search privately all the time, from anywhere they'd typically search, including their search engine's homepage and results pages.

● Cookie blocking -- Users can remain logged into their accounts and still search anonymously.

A video about how Disconnect Search works can be viewed at http://youtu.be/yBxP-TEqJCg.

About Disconnect

Disconnect was founded on a basic principle: that people should have the freedom to move about the Internet -- and their lives -- without anyone else looking over their shoulder. The company was started in 2011 by a former Google engineer and a consumer-rights attorney.

Disconnect's top-rated apps stop tracking by third parties and search engines and are used by more than 1,500,000 people every week. Visit Disconnect on the web at https://www.disconnect.me/.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.