Feeds

YaCy takes on Google with open source search engine

Good idea, stupid name

SANS - Survey on application security programs

A project calling itself YaCy – pronounced "ya see" – aims to break Google’s headlock on the search market by giving away an open source search engine that can be used both online and within an intranet.

The YaCy engine is based on peer-to-peer connections rather than search queries being run thorough a central server. Users download the software and act as peers for search, ensuring that no content can be censored and no search results can be recorded and analyzed on central servers.

"Most of what we do on the Internet involves search. It's the vital link between us and the information we're looking for. For such an essential function, we cannot rely on a few large companies, and compromise our privacy in the process," said YaCy project leader Michael Christen in a statement. "YaCy's free search is the vital link between free users and free information. YaCy hands control over search back to us, the users."

Once installed, the computer sorts out its own individual search indexes and rankings, and all search requests are encrypted to ensure user privacy. Version one of the software has now been released, and so far over 1.4 billion documents have been indexed and 130,000 searches carried out. As of mid-afternoon Pacific time, the site’s web portal for search was struggling under the load of interested users, but it should be back to robust health shortly.

"We are moving away from the idea that services need to be centrally controlled. Instead, we are realising how important it is to be independent, and to create infrastructure that doesn't have a single point of failure," said Karsten Gerloff, president of the Free Software Foundation Europe. "In the future world of distributed, peer-to-peer systems, free software search engines like YaCy are a vital building block."

There won’t be any chewed fingernails at Mountain View or Redmond any time soon, in El Reg’s opinion, but YaCy is an interesting bit of software, albeit one with a lot of work still to be done. SEO poisoning, for example, will have to be addressed if the application becomes popular, and legal problems may ensue with some search terms.

Nevertheless, the call is out for developers and coders to help develop the system further, and this is just the kind of project that could get the open source community motivated. ®

3 Big data security analytics techniques

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.