{"id":88,"date":"2010-05-24T15:43:15","date_gmt":"2010-05-24T20:43:15","guid":{"rendered":"http:\/\/blog.law.cornell.edu\/library\/2010\/05\/24\/google-gets-encrypted-search\/"},"modified":"2010-05-24T15:49:01","modified_gmt":"2010-05-24T20:49:01","slug":"google-gets-encrypted-search","status":"publish","type":"post","link":"https:\/\/blog.law.cornell.edu\/library\/2010\/05\/24\/google-gets-encrypted-search\/","title":{"rendered":"Google gets encrypted search"},"content":{"rendered":"

\"Google<\/a>Google released the encrypted version<\/a> of its search engine in beta on Friday, available at https:\/\/www.google.com<\/a>.\u00a0 The SSL<\/a> (Secure Sockets Layer) encryption protects your search query and search results while they are in transit between Google and your computer from third parties like ISPs (Internet Service Providers).\u00a0 SSL encryption does not protect your information from malware that may be running on your machine.\u00a0 The encryption only works for communications with Google, so it does not provide privacy when you click on a search result.\u00a0 Encrypted search does not yet work for Google Images or Google Maps, although SSL encryption has been in use by Gmail and Google Docs for some time.\u00a0 And though your information is protected from snoopy third parties, Google still knows and tracks the search terms you are entering and the results you are clicking.<\/p>\n","protected":false},"excerpt":{"rendered":"

Google released the encrypted version of its search engine in beta on Friday, available at https:\/\/www.google.com.\u00a0 The SSL (Secure Sockets Layer) encryption protects your search query and search results while they are in transit between Google and your computer from third parties like ISPs (Internet Service Providers).\u00a0 SSL encryption does not protect your information from […]<\/a><\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[302],"tags":[474,221],"_links":{"self":[{"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/posts\/88"}],"collection":[{"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":0,"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/posts\/88\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/categories?post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.law.cornell.edu\/library\/wp-json\/wp\/v2\/tags?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}