http://www.cnbc.com/id/100825956 Search engine that the NSA cannot submit requests for info to. They don't keep or track info about you. They do track what you search for and sell that info. But it is not tied to you. You can also try: https://startpage.com Might have to go into your browser settings so it will display secure https.
I don't trust any of them. Such a thing could easily be directly connected to the NSA and we'd simply never know about it. A honeypot search..
Try this one: https://duckduckgo.com/ It doesn't send your information to Google anonymously, it searches the internet for you, anonymously. Startpage still utilizes Google, for it's search capabilities, DuckDuckGo doesn't. There's a lot of variations to using that can give you better results (IE: !gi for Google Images, !yt for YouTube), but it's definitely better than having Google track all of your data and allow NSA to utilize it.
Then, let's amp up the privacy for you a bit: Tails OS: https://tails.boum.org/ FreeNet Project: https://freenetproject.org/whatis.html Cryptome Search Engine: http://cryptome.org/cryptome-search.html
I see that Tails OS uses the Tor network. Honeypot. Freenet looks like a hassle. You have to have a bunch of friends and run it in "dark" mode to gain privacy. Cryptome... All I can tell is that it connects to Google. Meh.
Someone's playing hard ball... Project MeshNet: https://projectmeshnet.org/ Beta stage, but the best it's going to get in a privacy realm. True Tor could be potentially setup as a honeypot, however, the more layers of encryption & security you add to it, the harder it becomes to identify you. It essentially becomes a ball of tangled cords that will make it harder to look through. Project MeshNet will be the closest thing to privacy as one can get. It's even looking like it can be possibly used in China, since they block the Tor network in China. This is their way of creating an avenue for folks, with censored internet, to get the internet they deserve. If you don't accept this, as far as I know, this is it.
True but if your concern is a honeypot, this is less likely to have that. This is because you need to be granted permission, by someone on the network, to be able to use it. Thus, it becomes a network of known individuals to prevent a honeypot from occurring. Furthermore, if you don't have folks who can 'tap' into this communication, then privacy can ensue. Again, if you add multiple layers of encryption & security to your communication (IE: OpenPGP, Tor, Tails, OS hosted on VM (Separate from your public communication), Thunderbird with Enigmail, personal VoIP system, etc), it becomes harder to determine what the communication is. Rather than having pertinent metadata, it becomes a tangled web for them to determine what everything is.