Keep your searches private by redirecting searches that may be tracked to Search Encrypt, a privacy-focused search engine.
Search Encrypt uses local encryption to secure your searches. Our private search engine combines AES-256 encryption with Secure Sockets Layer encryption. It then retrieves your search results from our network of search partners. After you're done searching, your search terms expire so they stay private even if someone else has access to your compute
Search Encrypt provides your searches to remain private, so that you may browse the web without being tracked.We will not track any user-identifiable information about you. The purpose of Search Encrypt is to offer a haven for your persona haven, in a time when privacy means everything.
How Search Encrypt Keeps Your Searches Private:
1. No Tracking
2. Expiring Browser History
3. SSL/HTTPS Encryption
4. Privacy by Design
Using Search Encrypt as your default search engine will help you practice safe searches online! Feel free to contact us with any further questions you have at https://www.searchencrypt.com/about/contact
- - - - -
Permissions we request:
"activeTab", "tabs", "webNavigation"
We use these permissions to protect information you enter into forms on the sites we protect you on. Some sites use keystroke logging to track any words you enter into a search field. These permissions allow us to block those logs and let you know which fields are safe, by displaying a tooltip.
"webRequest", "webRequestBlocking", "privacy"
We use these permissions to block the searches that you don't want to be tracked, and allows us to redirect those searches to our secure search engine so you can still find the information and the search results you're looking for.
We use these permissions to store and clear the encryption keys that we use to ensure that your searches are secure and expire within 30 minutes of your final search.
These permissions let us give you the browser interface to control our product and its settings. You can use the context menu to disable, uninstall, and reactivate our extension as needed.
These give us permission to protect you throughout the internet.
Without these permissions we wouldn't be able to block things like background search logging and sneaky forms that track you from one website to another.