Sorry If I wasn't clear, I was trying to say that the article in itself is bullshit, and that from credible sources, and if you do some HTTPS/HTTP snooping yourself, you'll turn up with evidence that suggest it does the same thing that Spotlight does.