--- name: secure-web-search description: Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check information, or mentions secure search, privacy, source validation, or web research. --- # Secure Web Search Guide This skill helps you perform secure web searches while protecting privacy, verifying sources, and validating information accuracy. Essential for research, fact-checking, and gathering reliable information. ## Quick Start When performing secure web searches, follow this workflow: 1. **Define search intent** - What information do you need and why? 2. **Choose search method** - Direct search, privacy-focused engine, or specialized tools 3. **Craft effective query** - Use search operators and specific terms 4. **Verify sources** - Check credibility, authority, and bias 5. **Validate information** - Cross-reference multiple sources 6. **Protect privacy** - Avoid tracking, use secure connections 7. **Document findings** - Track sources and evidence 8. **Assess reliability** - Determine confidence level in results ## What is Secure Web Search? **Secure Web Search** involves: - **Privacy protection:** Preventing tracking and data collection - **Source verification:** Ensuring information comes from credible sources - **Information validation:** Cross-referencing and fact-checking - **Bias awareness:** Recognizing potential source biases - **Safe browsing:** Avoiding malicious sites and phishing - **Data integrity:** Ensuring information hasn't been altered ## Search Privacy Protection ### Privacy-Focused Search Engines **DuckDuckGo:** - No tracking or profiling - No search history storage - Anonymous search results - Built-in tracker blocking **Startpage:** - Google results without tracking - Anonymous view feature - No IP address logging - EU-based privacy protection **Brave Search:** - Independent index - No user profiling - Anonymous search - Open-source transparent ranking **Searx/SearXNG:** - Meta-search engine - Self-hostable - No tracking - Aggregates multiple search engines ### Search Privacy Best Practices **Avoid revealing patterns:** - Don't use personal information in queries - Vary search terms to prevent profiling - Use broad terms before narrow searches - Consider timing of searches **Protect identity:** - Use VPN for sensitive searches - Clear cookies regularly - Use private/incognito mode - Disable search history **Secure connections:** - Always use HTTPS - Verify SSL certificates - Avoid public WiFi for sensitive searches - Use encrypted DNS (DoH/DoT) ## Effective Search Techniques ### Basic Search Operators **Exact phrase matching:** ``` "exact phrase here" ``` Example: `"climate change impact" 2024` **Exclude terms:** ``` search term -excluded ``` Example: `python tutorial -Django` **OR operator:** ``` term1 OR term2 ``` Example: `JavaScript OR TypeScript framework` **Wildcard:** ``` search * term ``` Example: `best * programming language 2024` **Site-specific search:** ``` site:domain.com search term ``` Example: `site:github.com authentication library` **File type search:** ``` filetype:ext search term ``` Example: `filetype:pdf security best practices` **Date range:** ``` search term after:2024-01-01 search term before:2024-12-31 ``` Example: `AI developments after:2024-06-01` ### Advanced Search Operators **Related sites:** ``` related:domain.com ``` Example: `related:stackoverflow.com` **In URL:** ``` inurl:keyword ``` Example: `inurl:documentation API design` **In title:** ``` intitle:keyword ``` Example: `intitle:"best practices" security` **Cache view:** ``` cache:domain.com ``` Example: `cache:example.com/article` **Numeric ranges:** ``` search term 100..500 ``` Example: `laptop price $800..$1200` **Combining operators:** ``` site:edu filetype:pdf "research paper" climate change after:2023 ``` ## Source Verification ### Credibility Assessment **Check domain authority:** - .edu (educational institutions) - .gov (government agencies) - .org (organizations - verify legitimacy) - .com (commercial - verify credibility) **Verify author credentials:** - Professional qualifications - Academic affiliations - Industry experience - Publication history - Peer recognition **Review publication date:** - Recent information for current topics - Historical context for established facts - Update frequency - Version or revision history **Assess editorial standards:** - Fact-checking processes - Editorial oversight - Correction policies - Source citations ### Red Flags for Unreliable Sources **Content warning signs:** - No author attribution - Extreme or sensational language - Unsupported claims - No citations or references - Grammar and spelling errors - Contradicts established facts **Site warning signs:** - No about page or contact info - Excessive advertising - Misleading domain names - No privacy policy - Poor site security (no HTTPS) - Popup-heavy design **Bias indicators:** - Political or ideological slant - Financial conflicts of interest - Selective fact presentation - Emotional manipulation - Echo chamber characteristics ### Source Verification Checklist - [ ] Author identified and credentials verified - [ ] Publication date is recent (for current topics) - [ ] Domain is reputable and secure (HTTPS) - [ ] Information is cited with sources - [ ] Cross-referenced with other credible sources - [ ] No obvious bias or agenda - [ ] Editorial standards are evident - [ ] Contact information available - [ ] No red flags for misinformation - [ ] Consistent with expert consensus ## Information Validation ### Cross-Reference Multiple Sources **Triangulation method:** 1. Find at least 3 independent sources 2. Compare information across sources 3. Look for consensus on key facts 4. Note discrepancies and investigate 5. Prioritize primary sources **Source diversity:** - Academic research papers - Reputable news organizations - Government/official statistics - Industry experts - Independent fact-checkers **Primary vs secondary sources:** - **Primary:** Original research, data, documents - **Secondary:** Analysis, interpretation, reporting - Prefer primary when available - Verify secondary against primary ### Fact-Checking Resources **Established fact-checkers:** - FactCheck.org - Snopes.com - PolitiFact - Full Fact - AFP Fact Check - Reuters Fact Check **Academic databases:** - Google Scholar - PubMed (medical) - JSTOR - arXiv (preprints) - IEEE Xplore (technical) **Government sources:** - Official statistics agencies - Regulatory bodies - Legislative databases - Public records **Specialized validators:** - Media Bias/Fact Check (news bias) - Retraction Watch (scientific retractions) - AllSides (political bias) - NewsGuard (news reliability) ### Evidence Quality Assessment **Strongest evidence:** - Peer-reviewed research - Official government data - Primary source documents - Expert consensus - Replicated studies **Moderate evidence:** - Reputable journalism - Industry reports - Expert opinions - Well-documented analysis - Established organizations **Weakest evidence:** - Anecdotal reports - Social media claims - Unverified sources - Conflicting information - Opinion pieces without support ## Secure Search Workflows ### Research Workflow **1. Planning phase:** - Define research question - Identify key terms and concepts - List potential source types - Determine credibility requirements **2. Initial search:** - Use broad terms to understand landscape - Identify authoritative sources - Note common themes and terminology - Bookmark promising sources **3. Deep research:** - Use advanced search operators - Access primary sources - Cross-reference findings - Track citations and references **4. Verification:** - Check author credentials - Verify publication dates - Cross-reference facts - Consult fact-checkers **5. Documentation:** - Save source URLs - Note access dates - Record key quotes with citations - Track evidence quality ### Fact-Checking Workflow **1. Identify claim:** - Extract specific factual claim - Note original source - Understand context **2. Search for primary source:** - Find original data or research - Verify attribution - Check for misquotes or context removal **3. Consult fact-checkers:** - Search established fact-checking sites - Look for previous verification - Note fact-checker methodology **4. Expert verification:** - Find domain experts - Check academic consensus - Review peer-reviewed research **5. Document findings:** - True/False/Misleading/Unverified - Evidence summary - Source quality assessment - Confidence level ### Investigative Research Workflow **1. Start with known facts:** - Establish baseline verified information - Identify information gaps - List questions to answer **2. Expand search scope:** - Use related search operators - Explore connected topics - Find primary documents **3. Follow citation trails:** - Check source references - Find original studies - Trace information lineage **4. Verify independently:** - Don't rely on single source - Cross-reference multiple times - Check for contradictions **5. Assess confidence:** - Rate evidence quality - Note uncertainties - Document limitations ## Privacy and Security ### Protecting Search Privacy **Browser configuration:** - Use privacy-focused browsers (Brave, Firefox) - Enable tracking protection - Block third-party cookies - Use extensions (uBlock Origin, Privacy Badger) - Enable Do Not Track **Network security:** - Use VPN for sensitive searches - Enable DNS over HTTPS (DoH) - Avoid public WiFi for sensitive research - Use Tor for maximum anonymity (when necessary) **Search history management:** - Regularly clear history - Use private/incognito mode - Disable search suggestions - Use separate browser profiles **Account isolation:** - Don't search while logged into services - Use separate email for sensitive topics - Avoid Google/Microsoft accounts for private searches - Use disposable email addresses ### Safe Browsing Practices **Verify HTTPS:** - Check for padlock icon - Verify certificate validity - Avoid HTTP sites for sensitive information - Be cautious of certificate warnings **Avoid malicious sites:** - Don't click suspicious links - Verify URLs before clicking - Use link checkers (VirusTotal) - Enable safe browsing features **Phishing protection:** - Verify sender/domain legitimacy - Hover over links before clicking - Check for misspellings in URLs - Don't enter credentials on unknown sites **Download safety:** - Scan files with antivirus - Only download from trusted sources - Verify file signatures when available - Use sandboxed environments for testing ## Search Query Best Practices ### Effective Query Construction **Be specific:** ``` ❌ programming ✅ Python async programming best practices 2024 ``` **Use quotes for phrases:** ``` ❌ climate change effects ✅ "climate change effects" agricultural productivity ``` **Combine operators:** ``` ✅ site:edu filetype:pdf "machine learning" ethics ✅ (Python OR JavaScript) tutorial -beginners after:2024 ``` **Target specific sources:** ``` ✅ site:github.com authentication library stars:>1000 ✅ site:stackoverflow.com [python] database connection pooling ``` ### Query Refinement **Start broad, then narrow:** 1. General topic search 2. Add specific terms 3. Filter by date/type 4. Target authoritative sources **Use search feedback:** - Check "related searches" - Review autocomplete suggestions - Note common terminology - Adjust based on results quality **Iterate and refine:** - Try multiple phrasings - Use synonyms - Adjust specificity - Change search operators ## Bias and Perspective Awareness ### Recognizing Bias **Political bias:** - Left/right leaning language - Selective fact presentation - Partisan framing - Ideological assumptions **Commercial bias:** - Sponsored content - Affiliate relationships - Advertising influence - Product promotion **Confirmation bias:** - Seeking supporting evidence only - Ignoring contradictory information - Cherry-picking sources - Motivated reasoning **Cultural bias:** - Western-centric perspectives - Regional assumptions - Cultural stereotypes - Language limitations ### Seeking Diverse Perspectives **Geographic diversity:** - International news sources - Regional publications - Non-Western perspectives - Local reporting **Ideological diversity:** - Conservative and liberal sources - Academic vs popular sources - Industry vs independent analysis - Government vs watchdog groups **Expertise diversity:** - Academic researchers - Industry practitioners - Policy makers - Affected communities **Methodological diversity:** - Quantitative studies - Qualitative research - Case studies - Meta-analyses ## Specialized Search Types ### Academic Research Search **Academic databases:** - Google Scholar - PubMed (medical/health) - IEEE Xplore (engineering/tech) - JSTOR (humanities) - arXiv (preprints) **Search strategies:** ``` author:"lastname" "research topic" allintitle: key terms here "exact methodology phrase" filetype:pdf site:edu ``` **Quality indicators:** - Peer-reviewed journals - Citation count - H-index of authors - Impact factor - Recent publication ### News and Current Events **Reputable news sources:** - Associated Press (AP) - Reuters - BBC News - NPR - ProPublica (investigative) **News search techniques:** ``` "news topic" after:YYYY-MM-DD site:reuters.com OR site:ap.org topic "breaking news" -opinion -editorial ``` **Verification:** - Check multiple news sources - Find original statements/documents - Consult fact-checkers - Note update timestamps ### Technical Documentation **Official sources:** - Official documentation sites - GitHub repositories - Stack Overflow - Technical blogs (verified experts) **Search patterns:** ``` site:docs.python.org specific function site:github.com language:python topic stars:>100 [tag] error message site:stackoverflow.com "official documentation" framework version ``` ### Legal and Regulatory **Official sources:** - Government websites (.gov) - Legal databases - Regulatory agencies - Court records **Search techniques:** ``` site:gov law OR regulation topic filetype:pdf "legal code" section "court case" parties site:justia.com "federal register" regulation ``` ## Documentation and Citation ### Recording Sources **Essential information:** - Full URL - Page title - Author(s) - Publication date - Access date - Publisher/site name - Relevant quotes with page numbers (for PDFs) **Organization methods:** - Bookmarking tools (Pocket, Raindrop.io) - Reference managers (Zotero, Mendeley) - Note-taking apps (Notion, Obsidian) - Spreadsheets with metadata ### Citation Formats **APA style:** ``` Author, A. A. (Year, Month Day). Title of page. Site Name. URL ``` **MLA style:** ``` Author Last Name, First Name. "Title of Page." Website Name, Day Month Year, URL. ``` **Chicago style:** ``` Author First Name Last Name, "Title of Page," Website Name, accessed Month Day, Year, URL. ``` **Simple attribution:** ``` Source: [Title] by [Author] ([Site], [Date]) - [URL] ``` ## Quality Assessment Framework ### CRAAP Test **Currency:** - When was information published/updated? - Is it current enough for your topic? - Are links functional? **Relevance:** - Does it answer your question? - Is it appropriate for your audience/purpose? - Is it at the right level (basic/advanced)? **Authority:** - Who is the author/publisher? - What are their credentials? - Is contact information provided? - Is domain appropriate (.edu, .gov, .org)? **Accuracy:** - Is information supported by evidence? - Can you verify information elsewhere? - Are sources cited? - Is language unbiased? **Purpose:** - Why was information published? - Is there commercial/political agenda? - Is it fact, opinion, or propaganda? - Is bias evident? ### Confidence Levels **High confidence (90%+):** - Multiple authoritative sources agree - Primary sources verified - Peer-reviewed research - Expert consensus - Recent and comprehensive **Medium confidence (50-90%):** - Reputable sources with some agreement - Secondary sources verified - Some expert support - Reasonably current - Minor inconsistencies **Low confidence (<50%):** - Single source or conflicting sources - Unverified claims - Questionable authority - Outdated information - Significant inconsistencies **Unverified:** - Cannot confirm information - Conflicting evidence - No credible sources - Requires further investigation ## Red Flags and Warning Signs ### Content Red Flags **Misinformation indicators:** - No author or credentials - Extreme claims without evidence - Emotional manipulation - Conspiracy theories - "Too good to be true" claims **Low quality indicators:** - Poor grammar/spelling - Clickbait headlines - Excessive ads - Autoplay videos - No dates or sources **Manipulation indicators:** - Cherry-picked statistics - Misleading graphs - Out-of-context quotes - Logical fallacies - False equivalencies ### Technical Red Flags **Security concerns:** - No HTTPS encryption - Invalid SSL certificates - Suspicious download prompts - Excessive permissions requests - Malware warnings **Privacy concerns:** - Excessive tracking scripts - Data collection without notice - No privacy policy - Suspicious redirects - Fingerprinting techniques ## Best Practices Checklist When performing secure web searches: - [ ] Use privacy-focused search engine or incognito mode - [ ] Craft specific query with appropriate operators - [ ] Verify HTTPS on all visited sites - [ ] Check source credibility and author credentials - [ ] Cross-reference with at least 3 independent sources - [ ] Consult fact-checkers for controversial claims - [ ] Note publication dates and update frequency - [ ] Assess potential bias and conflicts of interest - [ ] Document sources with full citation information - [ ] Rate confidence level in findings - [ ] Clear browser history after sensitive searches - [ ] Use VPN for highly sensitive research ## Key Principles 1. **Privacy first** - Protect your search privacy and identity 2. **Verify sources** - Check credibility before trusting information 3. **Cross-reference** - Never rely on a single source 4. **Think critically** - Question claims and assess evidence 5. **Use operators** - Leverage advanced search techniques 6. **Document thoroughly** - Track sources and evidence 7. **Stay current** - Check publication dates and updates 8. **Recognize bias** - Understand source perspectives and agendas 9. **Secure connections** - Always use HTTPS and avoid malicious sites 10. **Assess confidence** - Rate reliability of your findings ## Workflow Summary When user asks to perform secure web search: 1. **Define objective** - What information is needed and why? 2. **Plan search strategy** - Choose engines, operators, and sources 3. **Protect privacy** - Use appropriate privacy tools and techniques 4. **Execute search** - Craft effective queries with operators 5. **Verify sources** - Check credibility, authority, and bias 6. **Cross-reference** - Find multiple independent confirmations 7. **Fact-check** - Consult fact-checkers and primary sources 8. **Assess quality** - Apply CRAAP test and evidence evaluation 9. **Document findings** - Record sources with full citations 10. **Rate confidence** - Determine reliability level of information Remember: Secure web search combines privacy protection, source verification, and critical thinking. Always question information, verify independently, and protect your privacy throughout the research process.