How to Protect Your Privacy on Linux

Filed under Device Privacy Tips on
Please note that these instructions may not apply to all distributions and devices.

1. Don’t be complacent because you’re running Linux!

It’s easy to have a false sense of security, thinking that other operating system might be more targeted than Linux, but there are plenty of risks and vulnerabilities for all types of Linux devices. Keep your guard up regardless of your OS.

2. Ensure you use a password to protect your user account.

This should be required, but even so, make sure you always use a strong, lengthy password.

Screenshot showing setting a password on Linux

3. Don’t use an admin account for daily activity.

For everyday computing, log in with a basic or standard user account. This is likely to be the default behavior when creating a new account, but it’s worth double-checking your account’s status. Note that some system-wide actions will require you to log in with the administrator account because of restricted permissions.

Screenshot showing account types on Linux

4. Encrypt your data.

Full disk encryption is ideal, but it’s also possible to encrypt just your home directory, for example on a shared machine. This is usually done during installation, and is difficult to do afterwards. In that situation, the easiest solution is to backup your data (always a good thing!) and then re-install the OS selecting encryption options. If you really want to try encrypting an existing system, the process varies depending on your distribution and disk partition setup so it's best to search for instructions relevant for your environment.

Screenshot showing home directory encryption on Linux

5. Activate your screensaver when idle with screen lock.

Reduce the time for the lock to take effect once the screensaver starts.

Screenshot showing screensaver settings for Linux

6. Review your installed applications.

It’s good practice to keep installed applications to a minimum. Not only does this keep your machine lean, it also reduces your exposure to vulnerabilities. As well as looking through your application list manually, there may be tools available for your distribution to make it easy, such as BleachBit.

Screenshot showing installed applications on Linux

7. Keep your system updated.

It’s usually easy to keep both Linux and installed applications up to date. At the very least make sure updates for security are installed automatically.

Screenshot showing OS update dialog box on Linux

8. Periodically check for rootkits.

This can be done by installing a rootkit detector such as chkrootkit, which is easily run with the command sudo chkrootkit.

Screenshot showing the use of the 'chkrootkit' command on Linux

9. Lock down remote connection settings.

If you use SSH for remote access, there are some simple steps to reduce the risk of attack. The easiest is to use a port other than the default port 22 (and below 1024). You can also prevent remotely logging in as root with PermitRootLogin no in the SSH config file. This article has more tweaks for securing SSH.

Screenshot of more secure SSH settings.

10. Turn off listening services you don’t need.

Some daemons listen on external ports. Turn these services off if not needed, for example sendmail or bind. This could also improve boot times. To check for listening services, use this command: netstat -lt

Screenshot showing use of the 'netstat' command on Linux

11. Make sure you have a firewall running.

Your OS may have a built-in firewall already, probably iptables. Firewalls can be confusing to configure with the command line, but there’s likely to be a GUI frontend available for easier control such as Gufw.

Screenshot showing firewall settings on Linux

12. Restrict privileged access with SELinux or AppArmor.

These may be installed in your system by default but if not, it’s worth adding and configuring them. They both enable users to define rules that limit how applications can run or affect other processes and files. The benefit is that in the event of an attack, the damage to your system is limited. You can read more here about how to use SELinux and AppArmor.

Screenshot showing the SELinux installation button on Linux

13. Install DuckDuckGo Privacy Essentials in your browser.

Our Privacy Essentials browser extension has built-in tracker network blocking, smarter encryption, and, of course, private search, all designed to operate seamlessly together while you search and browse the web.
How: Get the extension for popular browsers from

Congratulations! You’ve just taken a big step to increasing privacy and protecting the data on your Linux system.

Credit: Thanks to WarnerJan Veldhuis for SSH port advice.

For more privacy advice follow us on Twitter, and stay protected and informed with our privacy newsletter.

Dax the duck

Dax the duck

We're the Internet privacy company for everyone who's had enough of hidden online tracking and wants to take back their privacy now.

Read More
How to Protect Your Privacy on Linux
Share this