mirror of
https://github.com/benbusby/whoogle-search.git
synced 2026-04-25 12:15:50 +03:00
[GH-ISSUE #297] [QUESTION] Heroku privacy #203
Labels
No labels
Fixed (Pending PR Merge)
Stale
bug
enhancement
enhancement
good first issue
help wanted
keep-open
needs more info
pull-request
question
theme
unfortunate
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/whoogle-search#203
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @milachevalier on GitHub (Apr 24, 2021).
Original GitHub issue: https://github.com/benbusby/whoogle-search/issues/297
I maybe completely out of my depth here but I was wondering what the privacy implications are when using whoogle on an instance like heroku. Now I understand that obviously Google's tracking capabilities are pretty limited when you use whoogle on a remote server along with a vpn but about the vps? What can heroku see? The heroku logs show a lot of entries when you pull up a search, most of it seems like random strings but sometimes the actual search terms show up in the logs - I'm assuming that is the difference between GET vs POST queries?
I guess what I'm asking is should i be concerned about heroku keeping these logs? If the logs get leaked, will my entire search history be open for everyone to see or is it encrypted to some extent?
@benbusby commented on GitHub (Apr 26, 2021):
This was mostly covered over in this discussion: https://github.com/benbusby/whoogle-search/discussions/163#discussioncomment-268050
The tl;dr is basically: yes, if you're concerned about Heroku logs being viewable by Heroku themselves (or anyone really), then you should only search using POST requests, which are enabled by default in Firefox and on the page search elements themselves (i.e. the input bar on the home page and result page).
POST request data is not captured in Heroku logs, and subsequent page results and resources are encrypted (even though they are performed with GET). POST searches are the default that the Whoogle opensearch template attempts to use, but this doesn't work for Chromium based browsers or mobile browsers. An unfortunate limitation that will likely never be addressed by those developers (not that I'm blaming them, it's a very tiny use case).
@milachevalier commented on GitHub (Apr 27, 2021):
I swear I actually looked to see if the question was asked and answered before, sorry I missed this and thank you very much for answering it again.
I do have a couple of follow up queries though;
So does that mean Heroku or any similar host is unable to decipher what the POST queries are? Or it just does not appear in logs? Are POST queries by design sort of encrypted that only google can see them and not Heroku on any level?
So when the search term appears in the logs, that would be a GET request right?
I have noticed that when performing a search, if you click on the "Showing results for" or 'Search instead for" links on top of a results page, it redirects to a GET request within whoogle which appears in the logs.
Say for example if you search for Don Trump it will display the links for Showing results for Donald trump and Search instead for Don Trump and when you click on either of those, the subsequent searches will be made using a GET request and the search terms will be visible in the logs. Same with clicking on any related google search links in the snippets. Is that by design/ a limitation?
Thanks again!