Search Privacy
Zero's web search is designed for maximum privacy. No query logging, no IP tracking, no behavioral profiling. Search the internet without leaving a trail.
Privacy Architecture
Zero as Privacy Proxy
When you search with Zero, your query never reaches search providers directly from your IP address:
- Your Browser: You type a search query
- Encrypted Connection: Query sent to Zero's servers via TLS
- Zero's Servers: Forward the query to search providers on your behalf
- Search Providers: See the request coming from Zero's servers, not your IP
- Results Returned: Zero relays results back to your browser
This prevents search engines from correlating your IP address with your search queries.
What Zero Doesn't Track
- Search Queries: Your searches are not logged or stored on Zero's servers
- Search History: No database of what you've searched for
- IP Addresses: Not linked to specific queries
- Timestamps: No logs of when you searched
- User Profiles: No behavioral profiling or interest graphs
- Click-Through Data: We don't track which results you click
Session-Only History
During your active Zero session, search queries are stored in your browser's memory to:
- Display your recent searches in the current session
- Provide conversation context for follow-up AI questions
- Allow you to reference previous search results
This data exists only in your browser's RAM and local storage. It's never sent to Zero's servers except when executing new queries.
Data Deletion
Search history is permanently deleted when you:
- Click the "Destroy" button
- Close the Zero browser tab
- Clear browser local storage
There's no backup, no recovery, no server-side archive. Once deleted, your search history is gone forever.
No Cookies or Fingerprinting
- No Tracking Cookies: Zero doesn't plant cookies to follow you across sessions
- No Third-Party Cookies: No cookies from advertisers or analytics companies
- No Browser Fingerprinting: Zero doesn't collect device/browser characteristics to identify you
- No Supercookies: No localStorage abuse or other persistent tracking mechanisms
No Search Personalization
Traditional search engines personalize results based on your history, location, and profile. This creates "filter bubbles" and requires invasive tracking.
Zero doesn't personalize search results:
- Everyone searching the same query sees the same results
- Results ranked by relevance, not by what an algorithm thinks you want
- No location-based filtering (unless explicitly in your query)
- No historical bias affecting result ranking
This provides unbiased results and eliminates the need for tracking.
HTTPS Encryption
All search queries and results are encrypted in transit:
- TLS 1.3 encryption between your browser and Zero's servers
- HTTPS for all external requests to search providers
- No plaintext exposure to network observers (ISPs, WiFi operators, etc.)
Even if someone is monitoring your network traffic, they cannot see what you're searching for.
Threat Model
What Zero Protects Against
- Search Engine Tracking: Google, Bing, etc. cannot build a profile on you
- ISP Surveillance: Your internet provider can't see search queries (only that you're connected to Zero)
- Network Monitoring: WiFi operators, employers, governments can't intercept search content
- Behavioral Profiling: No one can create interest graphs or psychographic profiles
- Data Breaches: If Zero's servers are compromised, there are no search logs to steal
What Zero Doesn't Protect Against
- Destination Site Tracking: When you click a search result and visit that site, you're subject to their tracking
- Malware on Your Device: Compromised computers can log everything regardless of Zero
- Legal Warrants: If compelled by law and technically possible, Zero must comply (but there are no logs to provide)
Comparison to Other Search Engines
| Feature | Zero | DuckDuckGo | |
|---|---|---|---|
| Query logging | None | Extensive | None |
| IP tracking | Not linked | Linked | Not linked |
| Personalization | None | Heavy | Minimal |
| Ads | None | Extensive | Some |
| Blockchain integration | Built-in | None | None |
Privacy Best Practices
- Use Destroy Regularly: Clear search history after sensitive research
- Incognito Mode: Prevents local browser history and cookies
- VPN/Tor: Hides that you're using Zero from network observers
- Avoid Logging In: Don't log into destination sites if you want to remain anonymous
- Consider Destination Privacy: Clicking search results exposes you to that site's tracking
Legal and Compliance
Zero's architecture is designed to minimize data retention, reducing legal exposure:
- No search logs means nothing to hand over in data requests
- Compliance with privacy regulations (GDPR, CCPA) is simplified
- Cannot be compelled to provide data that doesn't exist
However, Zero must comply with lawful requests. In practice, there's simply no search data to provide.