Feeds

YaCy takes on Google with open source search engine

Good idea, stupid name

High performance access to file storage

A project calling itself YaCy – pronounced "ya see" – aims to break Google’s headlock on the search market by giving away an open source search engine that can be used both online and within an intranet.

The YaCy engine is based on peer-to-peer connections rather than search queries being run thorough a central server. Users download the software and act as peers for search, ensuring that no content can be censored and no search results can be recorded and analyzed on central servers.

"Most of what we do on the Internet involves search. It's the vital link between us and the information we're looking for. For such an essential function, we cannot rely on a few large companies, and compromise our privacy in the process," said YaCy project leader Michael Christen in a statement. "YaCy's free search is the vital link between free users and free information. YaCy hands control over search back to us, the users."

Once installed, the computer sorts out its own individual search indexes and rankings, and all search requests are encrypted to ensure user privacy. Version one of the software has now been released, and so far over 1.4 billion documents have been indexed and 130,000 searches carried out. As of mid-afternoon Pacific time, the site’s web portal for search was struggling under the load of interested users, but it should be back to robust health shortly.

"We are moving away from the idea that services need to be centrally controlled. Instead, we are realising how important it is to be independent, and to create infrastructure that doesn't have a single point of failure," said Karsten Gerloff, president of the Free Software Foundation Europe. "In the future world of distributed, peer-to-peer systems, free software search engines like YaCy are a vital building block."

There won’t be any chewed fingernails at Mountain View or Redmond any time soon, in El Reg’s opinion, but YaCy is an interesting bit of software, albeit one with a lot of work still to be done. SEO poisoning, for example, will have to be addressed if the application becomes popular, and legal problems may ensue with some search terms.

Nevertheless, the call is out for developers and coders to help develop the system further, and this is just the kind of project that could get the open source community motivated. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.