zerø

Docs

Search Privacy

Zero's web search is designed for maximum privacy. No query logging, no IP tracking, no behavioral profiling. Search the internet without leaving a trail.

Privacy Architecture

Zero as Privacy Proxy

When you search with Zero, your query never reaches search providers directly from your IP address:

  1. Your Browser: You type a search query
  2. Encrypted Connection: Query sent to Zero's servers via TLS
  3. Zero's Servers: Forward the query to search providers on your behalf
  4. Search Providers: See the request coming from Zero's servers, not your IP
  5. Results Returned: Zero relays results back to your browser

This prevents search engines from correlating your IP address with your search queries.

IP Anonymization: Search providers see queries from Zero's servers shared across all users. They cannot identify which queries came from you.

What Zero Doesn't Track

  • Search Queries: Your searches are not logged or stored on Zero's servers
  • Search History: No database of what you've searched for
  • IP Addresses: Not linked to specific queries
  • Timestamps: No logs of when you searched
  • User Profiles: No behavioral profiling or interest graphs
  • Click-Through Data: We don't track which results you click

Session-Only History

During your active Zero session, search queries are stored in your browser's memory to:

  • Display your recent searches in the current session
  • Provide conversation context for follow-up AI questions
  • Allow you to reference previous search results

This data exists only in your browser's RAM and local storage. It's never sent to Zero's servers except when executing new queries.

Data Deletion

Search history is permanently deleted when you:

  • Click the "Destroy" button
  • Close the Zero browser tab
  • Clear browser local storage

There's no backup, no recovery, no server-side archive. Once deleted, your search history is gone forever.

Incognito + Destroy: For maximum privacy, use Zero in incognito mode and click "Destroy" after sensitive searches. This ensures no local traces remain.

No Cookies or Fingerprinting

  • No Tracking Cookies: Zero doesn't plant cookies to follow you across sessions
  • No Third-Party Cookies: No cookies from advertisers or analytics companies
  • No Browser Fingerprinting: Zero doesn't collect device/browser characteristics to identify you
  • No Supercookies: No localStorage abuse or other persistent tracking mechanisms

No Search Personalization

Traditional search engines personalize results based on your history, location, and profile. This creates "filter bubbles" and requires invasive tracking.

Zero doesn't personalize search results:

  • Everyone searching the same query sees the same results
  • Results ranked by relevance, not by what an algorithm thinks you want
  • No location-based filtering (unless explicitly in your query)
  • No historical bias affecting result ranking

This provides unbiased results and eliminates the need for tracking.

Objective Results: Lack of personalization means you see the web as it is, not as an algorithm thinks you want to see it.

HTTPS Encryption

All search queries and results are encrypted in transit:

  • TLS 1.3 encryption between your browser and Zero's servers
  • HTTPS for all external requests to search providers
  • No plaintext exposure to network observers (ISPs, WiFi operators, etc.)

Even if someone is monitoring your network traffic, they cannot see what you're searching for.

Threat Model

What Zero Protects Against

  • Search Engine Tracking: Google, Bing, etc. cannot build a profile on you
  • ISP Surveillance: Your internet provider can't see search queries (only that you're connected to Zero)
  • Network Monitoring: WiFi operators, employers, governments can't intercept search content
  • Behavioral Profiling: No one can create interest graphs or psychographic profiles
  • Data Breaches: If Zero's servers are compromised, there are no search logs to steal

What Zero Doesn't Protect Against

  • Destination Site Tracking: When you click a search result and visit that site, you're subject to their tracking
  • Malware on Your Device: Compromised computers can log everything regardless of Zero
  • Legal Warrants: If compelled by law and technically possible, Zero must comply (but there are no logs to provide)

Comparison to Other Search Engines

FeatureZeroGoogleDuckDuckGo
Query loggingNoneExtensiveNone
IP trackingNot linkedLinkedNot linked
PersonalizationNoneHeavyMinimal
AdsNoneExtensiveSome
Blockchain integrationBuilt-inNoneNone

Privacy Best Practices

  • Use Destroy Regularly: Clear search history after sensitive research
  • Incognito Mode: Prevents local browser history and cookies
  • VPN/Tor: Hides that you're using Zero from network observers
  • Avoid Logging In: Don't log into destination sites if you want to remain anonymous
  • Consider Destination Privacy: Clicking search results exposes you to that site's tracking

Legal and Compliance

Zero's architecture is designed to minimize data retention, reducing legal exposure:

  • No search logs means nothing to hand over in data requests
  • Compliance with privacy regulations (GDPR, CCPA) is simplified
  • Cannot be compelled to provide data that doesn't exist

However, Zero must comply with lawful requests. In practice, there's simply no search data to provide.

Privacy by Design: Zero's architecture makes mass surveillance technically infeasible, not just policy-prohibited. Even if operators wanted to track users, the system isn't built for it.