| name | secure-web-search |
| description | Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check information, or mentions secure search, privacy, source validation, or web research. |
Secure Web Search Guide
This skill helps you perform secure web searches while protecting privacy, verifying sources, and validating information accuracy. Essential for research, fact-checking, and gathering reliable information.
Quick Start
When performing secure web searches, follow this workflow:
- Define search intent - What information do you need and why?
- Choose search method - Direct search, privacy-focused engine, or specialized tools
- Craft effective query - Use search operators and specific terms
- Verify sources - Check credibility, authority, and bias
- Validate information - Cross-reference multiple sources
- Protect privacy - Avoid tracking, use secure connections
- Document findings - Track sources and evidence
- Assess reliability - Determine confidence level in results
What is Secure Web Search?
Secure Web Search involves:
- Privacy protection: Preventing tracking and data collection
- Source verification: Ensuring information comes from credible sources
- Information validation: Cross-referencing and fact-checking
- Bias awareness: Recognizing potential source biases
- Safe browsing: Avoiding malicious sites and phishing
- Data integrity: Ensuring information hasn't been altered
Search Privacy Protection
Privacy-Focused Search Engines
DuckDuckGo:
- No tracking or profiling
- No search history storage
- Anonymous search results
- Built-in tracker blocking
Startpage:
- Google results without tracking
- Anonymous view feature
- No IP address logging
- EU-based privacy protection
Brave Search:
- Independent index
- No user profiling
- Anonymous search
- Open-source transparent ranking
Searx/SearXNG:
- Meta-search engine
- Self-hostable
- No tracking
- Aggregates multiple search engines
Search Privacy Best Practices
Avoid revealing patterns:
- Don't use personal information in queries
- Vary search terms to prevent profiling
- Use broad terms before narrow searches
- Consider timing of searches
Protect identity:
- Use VPN for sensitive searches
- Clear cookies regularly
- Use private/incognito mode
- Disable search history
Secure connections:
- Always use HTTPS
- Verify SSL certificates
- Avoid public WiFi for sensitive searches
- Use encrypted DNS (DoH/DoT)
Effective Search Techniques
Basic Search Operators
Exact phrase matching:
"exact phrase here"
Example: "climate change impact" 2024
Exclude terms:
search term -excluded
Example: python tutorial -Django
OR operator:
term1 OR term2
Example: JavaScript OR TypeScript framework
Wildcard:
search * term
Example: best * programming language 2024
Site-specific search:
site:domain.com search term
Example: site:github.com authentication library
File type search:
filetype:ext search term
Example: filetype:pdf security best practices
Date range:
search term after:2024-01-01
search term before:2024-12-31
Example: AI developments after:2024-06-01
Advanced Search Operators
Related sites:
related:domain.com
Example: related:stackoverflow.com
In URL:
inurl:keyword
Example: inurl:documentation API design
In title:
intitle:keyword
Example: intitle:"best practices" security
Cache view:
cache:domain.com
Example: cache:example.com/article
Numeric ranges:
search term 100..500
Example: laptop price $800..$1200
Combining operators:
site:edu filetype:pdf "research paper" climate change after:2023
Source Verification
Credibility Assessment
Check domain authority:
- .edu (educational institutions)
- .gov (government agencies)
- .org (organizations - verify legitimacy)
- .com (commercial - verify credibility)
Verify author credentials:
- Professional qualifications
- Academic affiliations
- Industry experience
- Publication history
- Peer recognition
Review publication date:
- Recent information for current topics
- Historical context for established facts
- Update frequency
- Version or revision history
Assess editorial standards:
- Fact-checking processes
- Editorial oversight
- Correction policies
- Source citations
Red Flags for Unreliable Sources
Content warning signs:
- No author attribution
- Extreme or sensational language
- Unsupported claims
- No citations or references
- Grammar and spelling errors
- Contradicts established facts
Site warning signs:
- No about page or contact info
- Excessive advertising
- Misleading domain names
- No privacy policy
- Poor site security (no HTTPS)
- Popup-heavy design
Bias indicators:
- Political or ideological slant
- Financial conflicts of interest
- Selective fact presentation
- Emotional manipulation
- Echo chamber characteristics
Source Verification Checklist
- Author identified and credentials verified
- Publication date is recent (for current topics)
- Domain is reputable and secure (HTTPS)
- Information is cited with sources
- Cross-referenced with other credible sources
- No obvious bias or agenda
- Editorial standards are evident
- Contact information available
- No red flags for misinformation
- Consistent with expert consensus
Information Validation
Cross-Reference Multiple Sources
Triangulation method:
- Find at least 3 independent sources
- Compare information across sources
- Look for consensus on key facts
- Note discrepancies and investigate
- Prioritize primary sources
Source diversity:
- Academic research papers
- Reputable news organizations
- Government/official statistics
- Industry experts
- Independent fact-checkers
Primary vs secondary sources:
- Primary: Original research, data, documents
- Secondary: Analysis, interpretation, reporting
- Prefer primary when available
- Verify secondary against primary
Fact-Checking Resources
Established fact-checkers:
- FactCheck.org
- Snopes.com
- PolitiFact
- Full Fact
- AFP Fact Check
- Reuters Fact Check
Academic databases:
- Google Scholar
- PubMed (medical)
- JSTOR
- arXiv (preprints)
- IEEE Xplore (technical)
Government sources:
- Official statistics agencies
- Regulatory bodies
- Legislative databases
- Public records
Specialized validators:
- Media Bias/Fact Check (news bias)
- Retraction Watch (scientific retractions)
- AllSides (political bias)
- NewsGuard (news reliability)
Evidence Quality Assessment
Strongest evidence:
- Peer-reviewed research
- Official government data
- Primary source documents
- Expert consensus
- Replicated studies
Moderate evidence:
- Reputable journalism
- Industry reports
- Expert opinions
- Well-documented analysis
- Established organizations
Weakest evidence:
- Anecdotal reports
- Social media claims
- Unverified sources
- Conflicting information
- Opinion pieces without support
Secure Search Workflows
Research Workflow
1. Planning phase:
- Define research question
- Identify key terms and concepts
- List potential source types
- Determine credibility requirements
2. Initial search:
- Use broad terms to understand landscape
- Identify authoritative sources
- Note common themes and terminology
- Bookmark promising sources
3. Deep research:
- Use advanced search operators
- Access primary sources
- Cross-reference findings
- Track citations and references
4. Verification:
- Check author credentials
- Verify publication dates
- Cross-reference facts
- Consult fact-checkers
5. Documentation:
- Save source URLs
- Note access dates
- Record key quotes with citations
- Track evidence quality
Fact-Checking Workflow
1. Identify claim:
- Extract specific factual claim
- Note original source
- Understand context
2. Search for primary source:
- Find original data or research
- Verify attribution
- Check for misquotes or context removal
3. Consult fact-checkers:
- Search established fact-checking sites
- Look for previous verification
- Note fact-checker methodology
4. Expert verification:
- Find domain experts
- Check academic consensus
- Review peer-reviewed research
5. Document findings:
- True/False/Misleading/Unverified
- Evidence summary
- Source quality assessment
- Confidence level
Investigative Research Workflow
1. Start with known facts:
- Establish baseline verified information
- Identify information gaps
- List questions to answer
2. Expand search scope:
- Use related search operators
- Explore connected topics
- Find primary documents
3. Follow citation trails:
- Check source references
- Find original studies
- Trace information lineage
4. Verify independently:
- Don't rely on single source
- Cross-reference multiple times
- Check for contradictions
5. Assess confidence:
- Rate evidence quality
- Note uncertainties
- Document limitations
Privacy and Security
Protecting Search Privacy
Browser configuration:
- Use privacy-focused browsers (Brave, Firefox)
- Enable tracking protection
- Block third-party cookies
- Use extensions (uBlock Origin, Privacy Badger)
- Enable Do Not Track
Network security:
- Use VPN for sensitive searches
- Enable DNS over HTTPS (DoH)
- Avoid public WiFi for sensitive research
- Use Tor for maximum anonymity (when necessary)
Search history management:
- Regularly clear history
- Use private/incognito mode
- Disable search suggestions
- Use separate browser profiles
Account isolation:
- Don't search while logged into services
- Use separate email for sensitive topics
- Avoid Google/Microsoft accounts for private searches
- Use disposable email addresses
Safe Browsing Practices
Verify HTTPS:
- Check for padlock icon
- Verify certificate validity
- Avoid HTTP sites for sensitive information
- Be cautious of certificate warnings
Avoid malicious sites:
- Don't click suspicious links
- Verify URLs before clicking
- Use link checkers (VirusTotal)
- Enable safe browsing features
Phishing protection:
- Verify sender/domain legitimacy
- Hover over links before clicking
- Check for misspellings in URLs
- Don't enter credentials on unknown sites
Download safety:
- Scan files with antivirus
- Only download from trusted sources
- Verify file signatures when available
- Use sandboxed environments for testing
Search Query Best Practices
Effective Query Construction
Be specific:
❌ programming
✅ Python async programming best practices 2024
Use quotes for phrases:
❌ climate change effects
✅ "climate change effects" agricultural productivity
Combine operators:
✅ site:edu filetype:pdf "machine learning" ethics
✅ (Python OR JavaScript) tutorial -beginners after:2024
Target specific sources:
✅ site:github.com authentication library stars:>1000
✅ site:stackoverflow.com [python] database connection pooling
Query Refinement
Start broad, then narrow:
- General topic search
- Add specific terms
- Filter by date/type
- Target authoritative sources
Use search feedback:
- Check "related searches"
- Review autocomplete suggestions
- Note common terminology
- Adjust based on results quality
Iterate and refine:
- Try multiple phrasings
- Use synonyms
- Adjust specificity
- Change search operators
Bias and Perspective Awareness
Recognizing Bias
Political bias:
- Left/right leaning language
- Selective fact presentation
- Partisan framing
- Ideological assumptions
Commercial bias:
- Sponsored content
- Affiliate relationships
- Advertising influence
- Product promotion
Confirmation bias:
- Seeking supporting evidence only
- Ignoring contradictory information
- Cherry-picking sources
- Motivated reasoning
Cultural bias:
- Western-centric perspectives
- Regional assumptions
- Cultural stereotypes
- Language limitations
Seeking Diverse Perspectives
Geographic diversity:
- International news sources
- Regional publications
- Non-Western perspectives
- Local reporting
Ideological diversity:
- Conservative and liberal sources
- Academic vs popular sources
- Industry vs independent analysis
- Government vs watchdog groups
Expertise diversity:
- Academic researchers
- Industry practitioners
- Policy makers
- Affected communities
Methodological diversity:
- Quantitative studies
- Qualitative research
- Case studies
- Meta-analyses
Specialized Search Types
Academic Research Search
Academic databases:
- Google Scholar
- PubMed (medical/health)
- IEEE Xplore (engineering/tech)
- JSTOR (humanities)
- arXiv (preprints)
Search strategies:
author:"lastname" "research topic"
allintitle: key terms here
"exact methodology phrase"
filetype:pdf site:edu
Quality indicators:
- Peer-reviewed journals
- Citation count
- H-index of authors
- Impact factor
- Recent publication
News and Current Events
Reputable news sources:
- Associated Press (AP)
- Reuters
- BBC News
- NPR
- ProPublica (investigative)
News search techniques:
"news topic" after:YYYY-MM-DD
site:reuters.com OR site:ap.org topic
"breaking news" -opinion -editorial
Verification:
- Check multiple news sources
- Find original statements/documents
- Consult fact-checkers
- Note update timestamps
Technical Documentation
Official sources:
- Official documentation sites
- GitHub repositories
- Stack Overflow
- Technical blogs (verified experts)
Search patterns:
site:docs.python.org specific function
site:github.com language:python topic stars:>100
[tag] error message site:stackoverflow.com
"official documentation" framework version
Legal and Regulatory
Official sources:
- Government websites (.gov)
- Legal databases
- Regulatory agencies
- Court records
Search techniques:
site:gov law OR regulation topic
filetype:pdf "legal code" section
"court case" parties site:justia.com
"federal register" regulation
Documentation and Citation
Recording Sources
Essential information:
- Full URL
- Page title
- Author(s)
- Publication date
- Access date
- Publisher/site name
- Relevant quotes with page numbers (for PDFs)
Organization methods:
- Bookmarking tools (Pocket, Raindrop.io)
- Reference managers (Zotero, Mendeley)
- Note-taking apps (Notion, Obsidian)
- Spreadsheets with metadata
Citation Formats
APA style:
Author, A. A. (Year, Month Day). Title of page. Site Name. URL
MLA style:
Author Last Name, First Name. "Title of Page." Website Name, Day Month Year, URL.
Chicago style:
Author First Name Last Name, "Title of Page," Website Name, accessed Month Day, Year, URL.
Simple attribution:
Source: [Title] by [Author] ([Site], [Date]) - [URL]
Quality Assessment Framework
CRAAP Test
Currency:
- When was information published/updated?
- Is it current enough for your topic?
- Are links functional?
Relevance:
- Does it answer your question?
- Is it appropriate for your audience/purpose?
- Is it at the right level (basic/advanced)?
Authority:
- Who is the author/publisher?
- What are their credentials?
- Is contact information provided?
- Is domain appropriate (.edu, .gov, .org)?
Accuracy:
- Is information supported by evidence?
- Can you verify information elsewhere?
- Are sources cited?
- Is language unbiased?
Purpose:
- Why was information published?
- Is there commercial/political agenda?
- Is it fact, opinion, or propaganda?
- Is bias evident?
Confidence Levels
High confidence (90%+):
- Multiple authoritative sources agree
- Primary sources verified
- Peer-reviewed research
- Expert consensus
- Recent and comprehensive
Medium confidence (50-90%):
- Reputable sources with some agreement
- Secondary sources verified
- Some expert support
- Reasonably current
- Minor inconsistencies
Low confidence (<50%):
- Single source or conflicting sources
- Unverified claims
- Questionable authority
- Outdated information
- Significant inconsistencies
Unverified:
- Cannot confirm information
- Conflicting evidence
- No credible sources
- Requires further investigation
Red Flags and Warning Signs
Content Red Flags
Misinformation indicators:
- No author or credentials
- Extreme claims without evidence
- Emotional manipulation
- Conspiracy theories
- "Too good to be true" claims
Low quality indicators:
- Poor grammar/spelling
- Clickbait headlines
- Excessive ads
- Autoplay videos
- No dates or sources
Manipulation indicators:
- Cherry-picked statistics
- Misleading graphs
- Out-of-context quotes
- Logical fallacies
- False equivalencies
Technical Red Flags
Security concerns:
- No HTTPS encryption
- Invalid SSL certificates
- Suspicious download prompts
- Excessive permissions requests
- Malware warnings
Privacy concerns:
- Excessive tracking scripts
- Data collection without notice
- No privacy policy
- Suspicious redirects
- Fingerprinting techniques
Best Practices Checklist
When performing secure web searches:
- Use privacy-focused search engine or incognito mode
- Craft specific query with appropriate operators
- Verify HTTPS on all visited sites
- Check source credibility and author credentials
- Cross-reference with at least 3 independent sources
- Consult fact-checkers for controversial claims
- Note publication dates and update frequency
- Assess potential bias and conflicts of interest
- Document sources with full citation information
- Rate confidence level in findings
- Clear browser history after sensitive searches
- Use VPN for highly sensitive research
Key Principles
- Privacy first - Protect your search privacy and identity
- Verify sources - Check credibility before trusting information
- Cross-reference - Never rely on a single source
- Think critically - Question claims and assess evidence
- Use operators - Leverage advanced search techniques
- Document thoroughly - Track sources and evidence
- Stay current - Check publication dates and updates
- Recognize bias - Understand source perspectives and agendas
- Secure connections - Always use HTTPS and avoid malicious sites
- Assess confidence - Rate reliability of your findings
Workflow Summary
When user asks to perform secure web search:
- Define objective - What information is needed and why?
- Plan search strategy - Choose engines, operators, and sources
- Protect privacy - Use appropriate privacy tools and techniques
- Execute search - Craft effective queries with operators
- Verify sources - Check credibility, authority, and bias
- Cross-reference - Find multiple independent confirmations
- Fact-check - Consult fact-checkers and primary sources
- Assess quality - Apply CRAAP test and evidence evaluation
- Document findings - Record sources with full citations
- Rate confidence - Determine reliability level of information
Remember: Secure web search combines privacy protection, source verification, and critical thinking. Always question information, verify independently, and protect your privacy throughout the research process.