Skip to content
Step by Step Internet 🌐 Guides for learning to surf the Net

Privacy in Linux How to configure your operating system to protect your personal data as much as possible? step by step guide

UPDATED ✅ Do you want to protect your personal data to the maximum and make your Linux more private? ⭐ ENTER HERE ⭐ Learn Everything FROM ZERO! ⭐

Linux is one of the most secure operating systems available to datewith a variety of programs and utilities that enhance the privacy and security of your files.

However, like any system, is not free from its security riskssince although it does not present many vulnerabilities, its complexity can present a problem for newer users when making privacy settings.

In this article, we will explain in detail what are the main security problems that can be found in Linuxwhat are their solutions and how to prevent future privacy failures in your operating system.

What are the main privacy risks that we should be careful of in Linux?

When it comes to the privacy on linuxit provides many options and programs that increase protection of data on your computer.

However, there are certain situations, malware, and settings that can put user data at risk:

Dual Boot with Windows and Linux

Booting from a removable disk

Despite a dual installation allows people the convenience of Windows and the versatility of systems like Ubuntu, the file system represents a security gap, since it is possible to access the files of Ubuntu through Windows, so all a hacker needs is to get username and password.

trojans

Unlike other operating systems, Trojans do not represent a danger in Linux for system files. Nevertheless, they can infect the computer and use them as a port for DDoS attacks and sending SPAM via email. To verify it, it is advisable to monitor the traffic of your network. If you detect excessive packet sending, it is likely that your computer is part of a BotNet without your knowledge.

Ransomware

Ranson is a danger in Linux

A ransomware is malicious software that hijacks your computer’s data and demands a sum of money as a ransom for the data to be returned, or to prevent it from being published. There is no specific method to block this type of software yet, so the best advice is to exercise extreme caution while browsing.

Absence of backups

Is about data protection in the event of catastrophic computer damage. In many cases, users settle for a simple data backup, and underestimate the importance of backing up the entire system. This leads, in the worst case, to a complete loss of information.

Outdated apps

Update via APT applications on Linux

The don’t update third party apps on linuxrepresents a privacy breach, since the first versions of certain third-party software often have weak encryption protocolswhich can facilitate access by malicious users, both internal and external, to system information

Learn step by step how to configure Linux privacy to keep your identity 100% protected

Linux, being an open source application, have a lower risk of privacy intrusions.

However, it is not invulnerable, so it also provides the user with a wide variety of protection options that can be enabled:

Use a VPN

ProtonVPN download site

A VPN network is one of the safest tools to protect privacy in browsingtherefore, when accessing the internet through the browser, it is recommended activate it.

To do this, follow these steps:

  • Search the section of “networks” in the application search bar and enter.
  • Press on the icon “+”, at the bottom left of the list, to add a new network.
  • From the options that will appear in the list, select “VPN”.
  • Select the connection type.
  • Enter the details of the connection and press “To accept”.
  • When the VPN is configuredenter the system menu, click on “VPN off” and click “Connect”.
  • If necessary, enter the password to establish the connection. When the network is connected, you will see a lock icon next to the networks icon.

Browse the Tor network

Privacy with Tor network on Linux

Thor it’s a navigation service What does it offer? privacy protection by hiding the identity and location of the user.

This protection extends even within the same Tor network, protecting the user against other users on the network:

  • Enter the website torprotect.org/download/ where you will see the selection of browser versions.
  • Select the version icon Linux.
  • Go to your downloads folder and select the downloaded file.
  • wait for start the installer and select the destination folder.
  • Locate the folder “tor-browser_en-US”open it and select the icon Tor Setup.
  • Choose “connect” for enter the Tor network.
  • wait for load connection bar to enter the navigation.
  • In the upper right corner of the navigation screen, select against security slider and set to a high value.

Enable and configure the Kernel Firewall

Firewall settings on Linux

with the script UFW (Uncomplicated Firewall) it’s possible enable linux kernel firewall.

It comes pre-installed on all versions of Ubuntu, although it is disabled by default:

  • open terminal command prompt and enter sudo ufw status.
  • Nap disabled, you will see the message “Status: inactive”.
  • In that case, enter the command sudo ufw enable.
  • sign in again sudo ufw status.
  • This time, if everything went well, you will see the message “Status: active”.

Once the firewall is activatedit’s time to make the required settings to manage connections. Default, ufw includes the deny incoming connections policy.

To make sure, follow these steps:

  • type sudo ufw default deny for Activate the policy of denying connections.
  • restart ufw with the commands sudo ufw disable followed by sudo ufw enable with whom you have restarted the firewall with the desired settings.

Hire a manager of passwords

LatPass site is a key manager

The best option to maintain a repertoire of secure keysboth for your computer and for your online accounts, is a password manager. This tool is ideal for generating secure passwords and keep them safe from being lost.

List of the best tools and software to install and make your Linux more private

One of the reasons for the popularity of Linux is that all its developers take privacy and security very seriouslyso you can find a wide variety of tools from all categories to protect your Linux operations.

Go for it:

browsers

Double download site

The most vulnerable moments for privacy is during navigation, since the user is exposed to the attack of external users or software that can violate or steal their information. For this reason, it is key to select a browser with an appropriate level of security and satisfactory privacy policies.

These are the most secure browsers available for Linux:

  • Double: is an open source web browser designed to enhance browsing privacy. It includes features such as an automatic cookie deletion mechanism, and incorporates the YaCy search engine.
  • Thor: Considered one of the most secure browsers available, Tor contains features such as tracking blockers, multi-layer encryption, and protection against surveillance by third parties.
  • Vivaldi: It is available for Windows, Mac OS, Linux and Android. It is based on chromeso it is compatible with extensions of the Chrome Web Store. It also has adblock and tracker blocker.

Search engines

DuckDuckGo interface with safe searches

When you browse the internet, many search engines allow the activation of crawl scripts through which they can identify your location, in addition to saving the information of your search. It is for this reason that it becomes of great importance use a search engine that protects user privacy.

In that category, we can find three good options for Linux:

  • Duck Duck Go: is one of the most popular search engines focused on privacy. It has a tracker blocker, a powerful encryption system and works with privacy policies that prevent browsing tracking
  • ixquick: is a search engine that works without tracking cookies, nor does it track your browsing data. It includes the possibility of accessing the web pages you visit through a proxy server, thus increasing the privacy of your time on the Internet.
  • Yippy: It works like a “family” search engine, since it is possible to use it to block content from the results of some searches. In addition, it completely prevents tracking by blockers and does not keep track of user browsing data.

extensions

Privacy Badger is a browser extension

Some browsers like Google Chrome have strong security policies, but they leave a lot to be desired in terms of privacy.

For this reason, there are extensions that can be installed in the Chrome browser, as well as in other browsers, that can enhance its data protection features:

  • Privacy Badger: is an extension available for Chrome Browser and other options that works as a tracker blocker. It operates intuitively, learning to block websites that ignore the “Do Not Track” signal that Privacy Badger emits.

Privacy Badger
Privacy Badger
developer:
eff.org
Price:
Free

  • HTTPS: Everywhere: protect the privacy of your browsing data by applying HTTPS security to low-security HTTP websites. Although this process increases security, it can block portions of certain web pages, affecting their performance and interface.

HTTPS Everywhere
HTTPS Everywhere
developer:
eff.org
Price:
Free

  • uBlock Origin: is an efficient ad blocker with high availability of filters, known for its great balance between privacy protection and resource consumption, as it can apply a large number of protections with minimal processor and CPU consumption.

uBlock Origin
uBlock Origin
Price:
Free

Mail Providers

Proton Mail interface on Linux

Although it is one of the most used communication services today, the risk of data leakage in the most common email clients is quite high. When sending an email, it goes through unprotected communication channelscausing data (password, username and messages) to be intercepted.

In this sense, it is highly recommended to use email clients with encrypted communication channels, as is the case with the following:

  • ProtonMail: is a highly secure email server, created in 2013 by CERN engineers. It is protected by means of two passwords and user authentication in two steps, in addition to its communication channels with end-to-end encryption, and it has its own browser.
  • ZohoMail: is an email hosting focused on business communication. Their data centers feature top-tier security, end-to-end encryption, and ad blocking.
  • CounterMail: provides high communication security and end-to-end encryption, with a simple interface that allows easy access to security settings. It is compatible with any computer and does not require external programs, allowing you to access your protected emails from anywhere.

Courier services

Telegram interface on Linux

The instant messaging is an essential service, both on our computers and on our mobiles. Nevertheless, it is necessary to choose which application is the most convenient in the privacy section.

The information that is shared via instant messaging can be very sensitive, so it is best to opt for messaging clients with favorable data handling policies, and that work with end-to-end encryption:

  • Telegram: is one of the most shameless instant messaging services in the world. It is available for Windows, Mac OS, Linux, Android, and iOS, and offers AES 256 protocol encryption on all one-on-one chats, group chats, and media exchanges.
  • Signal: offers users an encrypted chat service, encrypted voice calls, video calls and encrypted group conversations. The Linux app requires pairing with your mobile version to start working.
  • WICKR: its military-grade encryption offers one of the most secure communication channels available. It has highly advanced security features and includes all instant messaging features, from private chats to video conferences.

password managers

Dashlane download site

Creating strong passwords is an aspect of privacy and security on the internet that is often underestimated. Usually, people think that a password consisting of their name and date of birth will suffice, when in fact, it is much more complex than that.

For these situations, Linux has several password managers that allow you to create secure keys and store them, so that you can access them when necessary:

  • Dashlane: offers a lot of options when it comes to password management. It has factor authentication, key generation, security alerts and e-wallet, among other functions.
  • RoboForm: is a cross-platform password manager and form filler. It is compatible with the most popular browser extensions, and has AES 256 encryption for all generated passwords.
  • KeepPass: allows the user to protect their passwords, as well as usernames and attachments in an encrypted file that can be accessed by means of a master password. It has support for various plugins, password generator and secure desktop mode.

firewall settings

Keeping the kernel firewall enabled on Linux may seem like a very basic protection measure, but it is one of the essential steps in protecting the privacy of the user and their information. A properly tuned firewall tracks all network data traffic, thus managing the entry and exit of any potential threat for the security of the system and your information.

DNS (Domain Name System) is a protocol that allows us to identify the IP address of the network to which we are connecting, and translates it from the complex numbers that make up a regular IP address, to the URL we know. Thanks to this, the user has complete visibility of the domain they are trying to access, and can take the appropriate protection measures in each case.

vpn

IPVanish VPN Download Site

It is one of the best ways to keep your browsing data and internet activity private. Creating a virtual private network allows you to bypass tracking methods that are integrated into many search engines. In this way, a VPN network makes us invisible, thus avoiding detection by third parties and malicious softwareand preventing the leakage of browsing information.

antivirus

ClamAV Antivirus for Linux OS

Although the risk of being attacked by malware on Linux is very lowthanks to its free software construction, Remember that no operating system is invulnerable. for which it is necessary to be prepared with the appropriate protection software. Linux has access to a wide range of best antivirus available.

While not all of them are exclusive to GNU/Linux, or free software, they are known to offer strong protection:

  • Avast CoreSecurity: is one of the most installed antivirus clients worldwide. On Linux, it has scanning functions accessible from the command terminal, and it is constantly updated to be at the forefront of operating system protection.
  • Clam AV: Open source, cross-platform antivirus software designed to detect Trojans, malware, spyware, and other malicious software, with a particular focus on email-borne threats.
  • Comodo Antivirus: distributed by Comodo Group as a freemium security client. It offers a wide variety of functions, since it is designed to be, in addition to antivirus, personal firewall, intrusion detection system, and sandbox.

These are the Linux distributions perfectly optimized to guarantee the privacy of your data

Regardless of the security measures that may be adopted, the foundation for a secure Linux computer is a secure distribution. Linux have at your disposal many distributions dedicated to privacy and securityand all have specialized tools for the protection of your data.

Let’s see:

tails

Linux Tails website

The Amnesic Incognito Live System, short for Tails, is a Debian-based distribution. and focused on anonymity and privacy. All outgoing connections are filtered through Torand is designed to boot via bootable media such as CD or USB.

KaliLinux

Kali Linux desktop interface

KaliLinux is a distribution Open source GNU/Linux Debian-based, that brings together the best computer security tools. It is primarily intended for security auditing of operating systems

Pure OS

PureOS for Linux website

It is one of the most secure distributions available, since it is built entirely with free softwareand expressly designed for the security and privacy of the user. It has a number of tools with increased privacy settings.

Privacy