Mark, Laura, Jay, Malea Tatum

 

  1. Mark, Laura, Jay, Malea Tatum
    • The Day I met my Daughter | Thailand Adoption
      Channel :- Laura Tatum
      Date Published :- 2017-May-8th
      Link
    • That’s not my daughter!! | EYES OF AN ORPHAN
      Channel :- Laura Tatum
      Date Published :- 2017-May-8th
      Link
    • Meet our daughter!! | Adoption Miracle
      Channel :- Laura Tatum
      Date Published :- 2017-May-30th
      Link
    • Amazing Adoption Update!
    • Channel :- Laura Tatum
      Date Published :- 2017-Oct-10th
      Link

Google Docs – Filters and Filter Views

Background

Microsoft Excel has a very nice interface that allows the user to show just the data that needs to be projected for different scenarios.

In Microsoft Excel 2010 the functionality is exposed through the “Filter” toolbar.

 

Google Docs

Let us examine whether Google Docs exposes a similar functionality and if so how and how well it does.

Spreadsheet

Looked on the Internet for sample Excel Spreadsheets.

Found one from Tableau.

It is called Sample – Superstore Sales (Excel).xls and it is available at community.tableau.com.

The specific URL is Link.

 

Import

We downloaded the sample data, accessed Google Docs, and imported the data.

 

Imported Data

Here is what the imported data looks like.

OpenedFile_20171009_0927PM

 

Filtering Data

There are two types of Filters required.

One is a Filter and the other is a Filter View.

We will touch on how to create each type of Filter and later on the differences between them.

Filter

Outline

To filter the data, please take the following steps:

  1. Select a range of cells.
  2.  Click Data and then Filter (  )
  3. To see filter options, go to the top of the range and click 
    • Filter by condition: Choose from a list of conditions or write your own.
    • Filter by values: Uncheck any data points that you want to hide and click OK.
  4. To clear Filter
    • Please click the menu items Filter / “Turn off Filter

Image

Access Filter Menu

Filtering By Customer Name – Begin

Filtering By Customer Name – Filtering

FilterByCustomerName_20171010_0824AM

 

Filter Views

Outline

To filter the data, please take the following steps:

  1. Create New Filter View
    • Repeat the steps of creating a new Filter
      • Select a range of cells.
      •  Click Data and then Filter (  )
      • To see filter options, go to the top of the range and click 
        • Filter by condition: Choose from a list of conditions or write your own.
        • Filter by values: Uncheck any data points that you want to hide and click OK.
    • Create New Filter View
      • Please choose the menu item Data/Filter Views
      • In the Name Bar, please give a Meaningful and Relevant Name
    • Customize the Filtered View
      • Customize the Filtered View as you see fit
      • In our case, we chose a specific Customer
  2. Capture and Share URL
    • Please capture and share the URL for the customized Filtered View
    • With a customized URL, each user has a specific and tailored view of the data
  3. Close Filter View
    • To close your filter view, go to the top right and click Close.
  4. Delete Filter View
    • To delete or duplicate a filter view go to the top right and click Settings Settings and then Delete or Duplicate.

 

Image

Filter By Column – Customer Name
Filter By Column – Customer Name – Initiate – Andrew Gjertsen

Filter By Column – Customer Name – Completed – Andrew Gjertsen

Filter Views Maintenance

Filter versus Filter View

Item Filter Filter View
Sharing Mechanism Send URL or List Send URL for List View
Sample URL Link Link
Multiple Instances Supported No Yes
Maintenance Supported Turn off filtering Naming, Rename, Duplicate, and Delete

 

Screen Shot

Filter

Filtered View

Summary

I wish I could have explained this far better.

But, nevertheless, if you have need to share Excel Type Sheets within a group and you will like tailored view of data, please consider using Google Docs.

It’s Filtered View functionality offers an accessible, polished, uncluttered, and fluid interface.

References

  1. support.google.com
    • Sort and Filter your data
      Link
  2. Sites.Google.com
    • Working with Data
      Link

 

The Loving Decision

Background

June 13th, 2017

50 years ago [ today ], the U.S. Supreme Court ruled in favor of Loving — Mildred and Richard Loving, who successfully sued the state of Virginia, forcing it to recognize their interracial marriage. That landmark case overturned laws against interracial marriages all across the country.

 

Videos

  1. The { } And
    • Chamika and Khalil Cumberbatch
      • Formerly Incarcerated Father Opens Up to Daughter | {THE AND} Mia & Khalil
        Mia & Khalil, a father and daughter separated for years by the federal prison system, discuss the hardship that has defined their relationship. 9 year old Mia bravely opens up about what it meant that her father was incarcerated, and Khalil, now a criminal justice reform activist at JustLeadershipUSA, can only admire how strong his daughter has become.

        • Videos
          • Smaller Clip
            Published On :- 2017-Oct-4th
            Link
          • Full
            Published On :- 2016-Oct-10th
            Link
      • The Window | Khalil – Life in Immigration Detention
        • Video
          • The Window | Khalil – Life in Immigration Detention (Part 1)
            A Guyanese transplant to New York, Khalil came of age as an inmate in maximum security facilities during his twenties. After his release, he dedicated his life to education, social justice and his family, only to be taken away by immigration detention, and possibly deported after 25 years in the United States.
            Link
          • The Window | Khalil – Life in Immigration Detention (Part 2)
            Following his session of The Window, Khalil, was at a loss of words processing the amount of love and support his family and friends showed him during their reflections of his struggle in Immigration Detention. Here is what he finally said about the eye-opening experience.
            Link
      • I Went To Prison And My Dad Never Called. Now I’m Calling Him. | MORAL COURAGE EP. 35
        • Channel :- MoralCourageChannel
          Published On :- 2015-Oct-5th
          My entire incarceration I never received one letter, or a visit, or a call from my father. This video follows my journey to reconnect with him in a meaningful way.
          Link
    • How Will We Raise A Biracial Kid? | {THE AND} Keisha & Andrew
      Keisha & Andrew are back with {THE AND} after a year, still laughing with and at each other. But things get real as they confront their fears of the future, like having a biracial child in the #BlackLivesMatter era (Part 1 of 2) | Watch Part 2: http://bit.ly/KeishaAndrew2
      Publisher :- The Skin Deep
      Link
    • Wrongly Arrested At 16 | {THE AND} David & Adama
      David & Adama, friends through the hardest of times, look how far they’ve taken their unlikely pairing since they first met. Adama, wrongfully imprisoned by the US government at age 16, wonders if American society will ever truly be comfortable with her religion, and David admits that his proudest moment in life wouldn’t have come to pass without her.
      Published On :- 2017-May-17th
      Link
    • {THE AND} Francesca & Azzah
      • {THE AND} Francesca & Azzah | Being Muslim in America is Hard Sometimes
        Francesca & Azzah, close friends and recent graduates, discuss the shifting social climate in the United States and its impact on their friendship. Azzah shares growing concerns about her identity as an immigrant and Muslim woman to Francesca, who relied deeply on Azzah during the rough patches in her life. Filmed in July 2016, this dialogue between two young women of color is more relevant now than ever.
        Publisher :- The Skin Deep
        Published On :- 2017-Feb-8th
        Link
  2. The Loving Decision
    • We Talk to Interracial Couples 50 Years After Loving v. Virginia (HBO)
      Published On :- 2013-Oct-26th
      Link
    • Features
      • Former Secretary of Defense William Cohen & Janey Langhart Cohen
      • Vaughn J. Buffalo and Gail Russell Buffalo
      • Enroll McDonald and Klara Glowczewska
      • Rev. John Janka and Rev. Jacqui Lewis
      • Chris Connolly and Joy Connolly
  3. Amanda Roman Leak, Ryan Leak
    • The Surprise Wedding ( Shorter Version )
      Station :- Amanda Roman Leak
      Published On :- 2013-Oct-26th
      Link
    • The Surprise Wedding
      On June 7, 2013, Ryan Leak proposed to his girlfriend. Her dream was to get engaged and married on the same day, and so later on that night… He had planned her surprise dream wedding. We have always talked about what we want our special day to be about. And for us, we want it to be about something bigger than ourselves. Recently, we were moved by an organization called A21 who fights sex trafficking all over the world. And so the idea for this day was: There’s 27 million girls caught in sex slavery, and every single one of them deserves their own dream wedding. And so we asked all of our guest at the wedding to give to A21 instead of getting us traditional wedding presents. If you’d like to learn more about A21 and join our guest in giving, go to: http://bit.ly/1g7zrye
      Link
    • Viral Video Newlyweds Credit as Inspiration
      Link
    • Chasing Failure
      Link
  4. Adanna & David
    • OUR WEDDING VIDEO | AdannaDavid
      Hi guys, the video from our wedding is finally up. We hope you enjoy watching it as much as we enjoyed the day! Love, Adanna & David Check out our ‘Bei-de’ Jewellery collection: https://stilnest.com/adanna-david
      Published On :- 2014-Nov-29th
      Link
    • Adanna & David dancing to Afrobeats
      Published On :- 2017-Jan-17th
      Link
    • Adanna & Adamma
      • MEET MY TWIN SISTER – TWIN TAG | AdannaDavid
        A lot of you have requested for me to do a ‘Twin Tag’ while my twin sister was visiting.
        Published On :- 2016-March-13th
        Link
  5. Ruffine & Nicolas Delfosse
    • Opening Wedding Dance – Ruffine & Nicolas (Etta James – covered by Beyoncé, Bracket, P-Square)
      Published On :- 2015-Sept-5th
      Link
  6. Thirty Minutes After Watching this Proposal Video and We’re Still Sobbing.
    • Thirty Minutes After Watching this Proposal Video and We’re Still Sobbing.
      Publisher :- How he asked.com
      Published On :- 2016-Nov-7th
  7. Cedric Thompson Jr and Charlotte Paguyo
    • An NFL Players Heartwarming Proposal: A Love Story
      Thank you Ced and Charlotte for letting me be apart of this beautiful moment. “An NFL Players Heartwarming Proposal: A Love Story”
      Link
  8. Love Without Borders
    • Love Without Borders – Season 1 – Episode 1
      In celebration of the 50th anniversary of the Loving v. Virginia decision, we gathered eight multicultural couples to talk about their experiences in America.
      Published On :- 2017-April-27th
      Link
    • Love Without Borders – Season 1 – Episode 4
      Multiethnic Couples Talk About Their Weddings | Love Without Borders S1 EP4 | BRIDES
      Link
    • Love Without Borders – Season 1 – Episode 5
      The One Thing You Should Never Say to Multicultural Couples | Love Without Borders S1 EP5 | BRIDES
      Published On :- 2017-April-27th
      Link
  9. Christopher M. Harris & Britt Harris
    • Stories
      • After US Army Specialist Christopher M. Harris was killed in Afghanistan, his wife Britt asked his fellow soldiers to reveal the gender of their unborn child
    • Participants
      • Christopher M. Harris
      • Britt Harris
    • Videos
      • Troops reveal gender of fallen soldier’s baby
        Link
    • Dates
      • Deceased :- August 2nd, 2017
  10. Crystal and Joseph
    • Crystal and Joseph were married at Sheraton Columbia Town Center Hotel in Columbia, Maryland.
    • Wedding Blog ( Link )
    • Stories
      • Groom cries as Bride walks down the Aisle {Crystal and Joseph}
    • Participants
      • Crystal
      • Joseph
    • Videos
      • Groom cries as Bride walks down the Aisle {Crystal and Joseph}
        Dates Published :- 2017-June-24th
        Link

 

Indepth

The { } And

Wrongly Arrested At 16 | {THE AND} David & Adama

  1. Adama
    • Koran
      • After every hardship there is ease
      • Black, Woman, and Muslim
      • I have to go pass those strikes
  2. David
    • Adama granted Asylum

Khalil, Chamika, Mia Cumberbatch

The Window | Khalil – Life in Immigration Detention (Part 2)

  1. Did not want to call him father
    • I was fearful that if I gave him that title, he wouldn’t live up to it
    • But, the reality is that he has done that and so much more
  2. Brother
    • Met each other in a very dark, a very dark place
    • We did not have anything to offer each other, but friendship
    • But, he took that
    • And, we have both survived it, because of the camaraderie that we have
  3. Fatherhood
    • Change my legacy
    • Change my legacy about Prisonhood
    • Coming closer to that goal
  4. Friendship
    • Dickson
      • Believe in me, even when I did not believe in myself
  5. Friendship
    • Seeds
      • Support
      • Criticism
      • Inspiration
    • Becoming
      • Husband
      • Father
      • Advocate
    • Mirroring
      • Joy
      • Inspiration
      • Gratitude

Formerly Incarcerated Father Opens Up to Daughter | {THE AND} Mia & Khalil

  1. Mia
    • What scares you the most
  2. Khalil
    • I will look back on my life and wish I was a great parent
  3. Mia
    • There is no change to make you a great parent, you are actually a great parent

 

 

Pledges

There are many pledges we make in our lives.

One of the wives featured in the HBO documentary, “We Talk to Interracial Couples 50 Years After Loving v. Virginia (HBO)”, said “Being married to John keeps me accountable. I cannot do they…They are.  I wake up to this guy.  My husband.

Here is hoping you have set some traps in your life that forbade you from Saying They, and even more Lividly Living against “They”.

 

Phishing Paypal :- chartersports.com

Background

This morning received an obvious phishing email.

Chose to play along and see if it is one already known to Google’s Chrome.

 

Evidence Gathering

Email

Email Folder – Junk Email

Here is what the email looks like:

Email Screen

Email Text

PауРаl PауРаl   Hello,Аs раrt оf оur sесuritу mеаsurеs , wе rеgulаrlу sсrееn асtivitу in thе РауРаl Sуstеm.Wе rесеntlу соntасtеd yоu аftеr nоtiсing аn issuе оn yоur РауРаl . Wе rеquеstеd infоrmаtiоn frоm yоu fоr thе fоllоwing rеаsоn:

Оur systеm dеtесtеd аn аbnormаl issuе in your ассount, wе bеliеvе thеrе might bе а brеасh . in this саsе we nееd to vеrify your ассount. plеаse сliсk on thе link bеlow аnd follow thе stеps for more sесurity еnsurаnсе.
This is thе lаst rеmindеr tо lоg in tо yоur аcсоunt аs sооn аs роssiblе.Oncе yоu lоg in , yоu will bе рrоvidеd with stерs tо rеstоre yоur ассоunt ассеss.

Remove Limitation NowCopyright ©2017 РаyРаl. All rights reserved.Company Limited by Shares. Registered office:Boulevard Royal, M-Luxembourg

 

Website

Followed the trail ( Link ), so you don’t have to …

The URL reads chartersports.com

 

Remediation

  1. Report
    • Report through web site
      • Google
        • Report Phishing Page
      • Symantec
        • Report Phishing Page
    • Report through email
      • Anti-Phishing Working Group
        • Web Site :- Link
        • Email :- reportphishing@apwg.org
      • US – Department of Homeland Security
        • US-Cert
          • Report Phishing Sites
            Web Site :- Link
            Email :- phishing-report@us-cert.gov
      • US – Federal Trade Commision
        • Email :- spam@uce.gov
        • Read more here
      • Apple
        • iCloud
          • Email :- abuse@icloud.com
          • Read more here
      • Amazon
        • Email :- stop-spoofing@amazon.com
        • Read more here

Addendum

Addendum – 2017-10-24

Email Envelope

Email Contents

URLS

  1. http://flyt.it/3nak2kuylcjh?ID=
  2. https://www.settingsmanagement-acc-privacyuser.com/webapps/bdb9a/websrc

 

Summary

Some of these guys are actually smart.

Prayerfully, they will take off the blinders.

Like Jacob Prasch would say “Let the guy go out, learn a trade, and start to make a honest living…become a carpenter” for Christ’s sake.

Randy Treit (MSFT) on 10 seconds

Background

What is 10 seconds to you?

In a blog posting MSFT’s Randy Treit talks about the constraints Microsoft’s places on itself to quickly identify, classify, and get in the way of targeted virus penetration.

 

Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware

Link

For cybercriminals, speed is the name of the game. It takes newly released malware an average of just four hours to achieve its goal—steal financial information, extort money, or cause widespread damage. In a recent report, the Federal Trade Commission (FTC) said that cybercriminals will use hacked or stolen information within nine minutes of posting in underground forums. Stopping new malware in real-time is more critical than ever.

Approximately 96% of all malware files detected and blocked by Windows Defender Antivirus (Windows Defender AV) are observed only once on a single computer, demonstrating the polymorphic and targeted nature of modern attacks, and the fragmented state of the threat landscape. Hence, blocking malware at first sight is a critical protection capability.

To fight the speed, scale, and complexity of threats, we work to continually enhance Windows Defender AV and other security features built into Windows 10. In our white paper “The evolution of malware prevention” we discussed our advanced, predictive approach to protecting customers from threats that they face today, as well as those that will emerge in the future.

This blog continues that discussion and provides the first detailed account of one way we improve our capability to stop never-before-seen malware with new enhancements to the Windows Defender Antivirus cloud protection service.

In Windows 10 Creators Update, the Windows Defender AV client uploads suspicious files to the cloud protection service for rapid analysis. Our ability to make a swift assessment of new and unknown files allows us to protect customers from malware the first time we see it.

We have built these enhancements on the next-gen security technologies enabling Windows Defender AV to automatically block most new, never-before-seen threats at first sight using the following methods:

  • Lightweight client-based machine learning models, blocking new and unknown malware
  • Local behavioral analysis, stopping file-based and file-less attacks
  • High-precision antivirus, detecting common malware through generic and heuristic techniques

In relatively rare cases, when Windows Defender AV needs additional intelligence to verify the intent of a suspicious file, it sends metadata to the cloud protection service, which can determine whether the file is safe or malicious within milliseconds using the following techniques:

  • Precise cloud-based machine learning models that can make an accurate assessment based on signals from the client
  • Microsoft Intelligent Security Graph that monitors threat data from a vast network of sensors

In rarer cases still, when Windows Defender AV cloud protection service is unable to reach a conclusive verdict based on metadata, it can request the potential malware sample for further inspection.

In Windows 10 Creators Update, the Windows Defender AV client uploads suspicious files to the cloud protection service for rapid analysis. While waiting for a verdict, the Windows Defender AV client maintains a lock on the dubious files, preventing possible malicious behavior. The Windows Defender AV client then takes action based on the verdict. For example, if the cloud protection service determines the file as malicious, it blocks the file from running, providing instant protection.

Windows Defender Antivirus instant protection from the cloud

Instant protection at work: A few seconds can make a lot of difference in protection

In a recent real-life example, a Windows 10 Home customer was tricked into downloading a new variant of the Ransom:Win32/Spora family of ransomware.

The malware was disguised as a font file with the name “Chrome font.exe”. It was hosted on an online learning website that had been compromised by an attacker, who attempted to trick people into downloading the malware using a social engineering tactic described by Proofpoint in this blog. In this scheme targeting Chrome users, legitimate websites were compromised to open a pop-up window indicating “The ‘HoeflerText’ font wasn’t found”, requiring a supposed update to fix. The customer clicked the “Update” button in the pop-up window, which downloaded the Spora ransomware variant.

The customer’s Windows Defender AV client routinely scanned the file using on-box rules and definitions. Since it had not encountered the file before, Windows Defender AV did not detect it as malicious; however, it recognized the file’s suspicious characteristics, so it temporarily prevented the file from running. The client sent a query to the Windows Defender AV cloud protection service, which used machine-learning-powered cloud rules to confirm that the file was likely malware needing further investigation.

Within 312 milliseconds, the cloud protection service returned an initial assessment. It then instructed the client to send a sample and to continue locking the file until a more definite verdict was given.

In about two seconds, the client finished uploading the sample. By default, it’s set to wait for up to 10 seconds to hear back from the cloud protection service before letting such suspicious files run.

As soon as the sample was uploaded, a backend file-processing system analyzed the sample. A multi-class machine learning classifier determined there was more than a 95% chance that the file was malicious. The cloud protection service created a signature, which it sent back to client. All of this happened in just five seconds.

One second later, the Windows Defender AV client applied the cloud signature and quarantined the malware. It reported the results back to the cloud service; from that point on, this file was automatically blocked, protecting all Windows PC customers.

From the time Windows Defender AV uploaded the sample, the cloud protection service returned the malware signature in just five seconds, as shown by these actual timestamps:

2017-04-20 03:53:21 – Cloud protection service received query from Windows Defender AV client

2017-04-20 03:53:21 – Cloud protection service assessed it hadn’t seen the file and that is was suspicious, so it requested a sample and to keep locking the file

2017-04-20 03:53:23 – Sample finished uploading

2017-04-20 03:53:28 – Cloud protection service determined file as malware, generated signature, and sent that back to client

2017-04-20 03:53:29 – Windows Defender AV client notified that it successfully detected and removed the malware

Stay protected with Windows 10 Creators Update

Our many years of in-depth research into malware, cyberattacks, and cybercriminal operations give us insight into how threats continue to evolve and attempt to slip past security solutions. Guided by expert threat researchers, we use data science, machine learning, automation, and behavioral analysis to improve our detection solutions continuously.

In Windows 10 Creators Update, we rolled out important updates to Windows Defender Antivirus, which uses cloud protection service that delivers real-time protection against threats. With these enhancements, we show our commitment to providing unparalleled real-time defense against modern attacks.

Our ability to make a swift assessment of new and unknown files allows us to protect even would-be patient zero against attacks. More importantly, we use this intelligence to protect the rest of our customers, who may encounter these malware in subsequent attacks or similar threats in other cybercriminal campaigns.

Cloud-based protection is enabled in Windows Defender AV by default. To check that it’s running, launch the Windows Defender Security Center. Go to Settings > Virus & threat protection settings, and make sure that Cloud-based protection and Automatic sample submission are both turned On.

In enterprise environments, cloud protection service can be managed using Group Policy or via the Windows Defender Security Center app.

When enabled, Windows Defender AV locks a suspicious file for 10 seconds by default, while it queries the Windows Defender AV cloud protection service. Administrators can configure Windows Defender AV to extend the timeout period up to one minute to give the cloud service time to perform even more analysis and apply additional techniques to detect new malware.

As the threat landscape continues to move towards more sophisticated attacks and malware campaigns that can achieve their goals in hours instead of days, it is critical to be able to respond to new attacks in real-time. With Windows 10 Creators Update and the investments we’ve made in cloud protection service, we’re able to detect brand new threat families within seconds, protect “patient zero”, and disrupt new malware campaigns before they start.

Randy Treit

Senior Program Manager, Windows Defender Engineering

WordPress & Google Web Master

Background

A few weeks ago I touched on the fact that because search tags are been encrypted by Search providers, WordPress is unable to offer us aggregate information as to which tags visitors are using to reach our blog.

Promised to come back and add more details.

Like Button

Based on like button from that original page, I brought out the smart phone on my commute come home this evening and googled for others work.

BTW, here is a link to the original page.

This post will cover the hard work of others.

 

WordPress

Settings / Traffic

Access Settings / Traffic via this URL ( https://wordpress.com/settings/traffic  [ Link ])

 

Site Verification Services

Currently, four providers are exposed.  And, those are:

  1. Google
  2. Bing
  3. Pinterest
  4. Yandex

 

Google

WebMasters

Search Console

For Google, we access https://www.google.com/webmasters/tools/home?hl=en.

We click the “Add A Property” button.

Add a Property

We entered our WordPress URL:

 

Verify Ownership of Property

Recommended Method

Click the “Alternate Method” tab.

Alternate Method
Original Screen

HTML tag -> Screen

Upon clicking the HTML tag button,  Google offers us a personalized verification tag.

 

WordPress

Settings / Traffic

Accessed WordPress Settings and Traffic via this Link.

Site Verification Services

Site Verification Services – Google Tag Entered

In the text box reserved for Google, please paste the Google Tag and click the Save button.

Google

WebMasters

Search Console

Verification Success

 

Search Analytics

 

Summary

Have to give Google some time to curate our web site and hopefully offer us some data.

 

References

  1. WordPress
    • WordPress Tools
      Link

WordPress – Stats / Search Terms :- “Unknown Search Terms”

 

Background

Occasionally, I review the stats on our WordPress Blog.

It is good way to gauge readership aggregated by Country, Posts, and clicks.

 

Search Tags

Another coverage is the actual Search Tags that brought traffic to the site.

Stats

Stats for 2017-May-31st

Image

Here is the one for today…

Explanation

Just about all entries are marked “Unknown“.

 

Why “Unknown”

Why the opacity in “Search Terms“:

Outline

  1. Privacy
  2. Legal Protection

 

InDepth

Privacy

Search Engines encrypt the search tags entered by their users.  For the sake of privacy and to better protect web users activities, Search Engine providers are moving to encrypt the data entered by users.

They allow end users to enter the search tags, utilize those search tags to find matches, decline to pass them along when users click on links, and save the encrypted version.

Legal Protection

Force Governments & Law Enforcements to request Subpoena Order before handing over Users Search History.

This protects the providers themselves from lawsuits brought by grieved users and shareholders.

 

Vendors

Google, Microsoft, and Yahoo have all transitioned to encrypting search tags and not forwarding it.

Browsers can also be configured not to forward the referrer and search tags.

Search Engines

Bings

  1. Bing Moving to Encrypt Search Traffic by Default
    Duane Forrester, Senior Product Manager – Bing
    Published On :- 2015-Jun-15th
    Link

 

Follow-up

In follow-up posts, will talk about avenues available through Search Providers and WordPress to regain some of these insights.