Skip to main content

Linux

Apply Now
Works with any Linux distroWorks with any Linux distribution that can run bash scripts.
  • Linux onlyThis script improves your privacy on Linux
  • Many actionsThis page belongs to a collection, containing many changes.
  • Impact: Minimum

    System Functionality / Data Loss Risk: Low

    This action improves privacy with minimal impact when you run the recommended script.

  • Bash (Shell script)These changes use Linux system commands to update your settings.
  • 131 scripts
  • 45 categories
  • Sudo/root requiredThis script requires privilege access to do the system changes
  • Partially reversibleYou can not restore changes done by this script.

Overview

Linux Privacy Collection
Universal privacy protection for all major Linux distributions

Universal

All Linux distros

Verified

Community Tested

Documented

Everything documented
Bash Script Compatible
Works on any distribution that can run bash scripts
Package Manager Support
Compatible with Snap, Flatpak, and native package managers
Security Hardening
Enhanced system security and privacy configurations
Desktop & Server Ready
Optimized for both desktop and server environments
Privacy Protection Scope
Comprehensive privacy protection across your Linux system
Distribution telemetry cleanup
Software-specific privacy settings
System hardening configurations
Privacy cleanup (history, logs, cache and more)
About Linux Privacy
While the Linux kernel itself doesn't include telemetry, many distributions and applications do collect usage data. These scripts help you maintain complete control over your privacy.
Supported Distributions

Linux scripts should work on all distributions that supports Bash.

Tested Distributions

Following distributions have been tested and verified by the community:
Debian
Ubuntu
Fedora
Red Hat
SUSE
Arch Linux
Gentoo
Kali Linux
CentOS
Elementary OS
Zorin OS
Pop!_OS
MX Linux
Linux Mint
Slackware
Mandrake Linux
openSUSE

Frequently Asked Questions

Common questions about Linux privacy hardening

Privacy on Linux

Why do I need privacy protection on Linux?

While Linux is privacy-focused by design, modern distributions and Linux applications often include components that collect data:

  • Desktop environments often track user interactions.
  • Package managers record install/remove events.
  • System logs can contain sensitive info.
  • Apps may include their own analytics.

Our scripts help you maintain complete control over your system's data collection points while preserving functionality.

Linux Script Safety

Is it safe to apply these privacy scripts on Linux?

Yes. These community-reviewed scripts focus on disabling telemetry and other tracking features without touching your personal files. The scripts are open-source and peer-reviewed by the Linux community.

While Normal scripts are safe, High andMaximum options may affect system functionality.

Review script descriptions before applying anything beyond Normal protection.

Package Managers

How do these scripts handle different package managers?

Our scripts automatically detect and adapt to your distribution's package management system:

  • Supports apt, dnf, pacman, and more.
  • Works with Flatpak and Snap.
  • Preserves custom configuration files.

No manual tweaks are required—just run the script, and it handles everything behind the scenes.

High or Maximum protection levels may affect certain package manager features.

System Impact

Will it break updates or my server/computer? Can I run it on production?

No, Normal protection is designed to preserve system functionality. It works well on both personal systems and production servers. It won't interfere with critical services or updates.

Advanced scripts such as High or Maximum may stop certain telemetry-related services that some distributions or applications rely on.

When in doubt, start with Normal and review any advanced scripts before applying them.

Root Access

Do I need root (sudo) privileges?

Yes, sudo access is generally required to change core system privacy/security settings.

The scripts provide clear instructions and only request elevation when necessary.

Reversibility

Can I revert the changes later on?

Yes! With Undo protection, you can revert changes to restore your previous settings at any time.

Some cleanup actions (like deleting old logs or caches) cannot be undone once the files are removed. This is noted clearly in the scripts.

Desktop Environments

Will these settings work across different desktop environments?

Yes, we cater to major desktop environments:

  • GNOME, KDE, Xfce, and more.
  • Applies DE-specific tweaks where possible.
  • Ensures universal privacy settings remain intact.

We focus on maximizing privacy without breaking important features across different DEs.

SELinux & AppArmor

How do the scripts interact with SELinux/AppArmor?

Scripts respect existing SELinux/AppArmor policies. Scripts are designed to work harmoniously with Linux security frameworks:

  • Policies remain in enforcing mode.
  • No changes to security contexts.

Your existing security measures stay intact while unwanted telemetry is disabled.

Linux Servers

Can I apply these settings on a server installation?

Yes, scripts come with server-optimized features:

  • SSH session compatibility.
  • Lightweight server scripts without GUI dependencies.

Perfect for hardening production servers while maintaining serviceability.

Safe for General Use
This script has Normal protection level option. This is recommended for all users to improve without any noticeable impact on the system functionality.

Apply Now

Choose one of two ways to apply:

Download script

Download and run the script directly
  • No app needed
  • Offline usage
  • Free
  • Open-source

NormalEveryday Privacy (Enterprise-Grade)

  • Recommended for all
  • Safe for daily use
  • No impact on system stability

Read more about Normal and other protection levels

Help

How to apply or restore privacy on Linux using script

  • ≈ 3 min to complete
  • Tools: Web Browser
  • Difficulty: Medium
  • ≈ 6 instructions
  1. 1

    Choose protection

    Choose one of the options with different impact levels:

    • Normal

      Some safe changes minimal system impact.
    • High

      Some potentially impactful changes with moderate system impact.
    • Maximum

      Some impactful changes with high system impact.
  2. 2

    Download

    Download the script file by clicking on the   Apply protection  button above.
    Use   Undo protection button above to restore changes.
  3. 3

    Keep the file

    If warned by your browser, keep the file.
  4. 4

    Open

    Open the downloaded file.
  5. 5

    Exit

    Once it's done, press any key to exit the window.
  6. 6

    Restart

    Restart your computer for all changes to take effect.

Apply with privacy.sexy

Guided, automated application with safety checks
  • Recommended for most users
  • Includes safety checks
  • Shows the code
  • Free
  • Open-source
  • Popular
  • Offline/Online usage
Open privacy.sexy
Help

How to apply or restore privacy on Linux using privacy.sexy

  • ≈ 3 min to complete
  • Tools: privacy.sexy
  • Difficulty: Simple
  • ≈ 4 instructions
privacy.sexy is free and open-source application that lets securely apply this action easily with more advanced options.
  1. 1

    Open or download

    Open or download the desktop application
  2. 2

    Choose script

    1. Open the collection on top menu: Linux
    2. Select a level on top left:
      • Standard for Normal (Everyday Privacy (Enterprise-Grade))
      • Strict for High (Advanced Privacy)
      • All for Maximum (Strongest Possible Privacy (Military-Grade))

    On top left, you can select Normal to limit the impact.

    Not sure which level to choose? Check protection levels guide.

  3. 3

    Run

    Click on ▶️ Run button at the bottom of the page.

    This button only appears on desktop version (recommended). On browser, use 💾 Save button.

Explore This Guide

  • 131 Privacy settings
  • 3 Main categories
    • These settings are organized into 3 main categories for easy navigation.
    • Each main category contains subcategories, helping you find specific settings you might want to adjust.
  • 45 Total categories

Choose what to protect based on your needs:

Click any option to learn more about what it does.

Each change can be applied and reversed individually.

  • Some settings and commands may require technical knowledge to apply correctly.
  • Most users find the Normal protection above sufficient.

Privacy cleanup

These scripts allow you to increase privacy by deleting collected data about you and your behavior.

Disable OS data collection

All operating systems collect data. This is part of their work. Sometimes, this data has high privacy implications, especially when it is submitted to third parties. Some Linux distributions come with out-of-the-box data collection and submission. Most of the time, this data collection is opt-in, but not necessarily always. Data collection and telemetry is not always a bad thing, and can help developers provide better software that can compete with proprietary and much more privacy-invasive alte...

Configure programs

These scripts configure third-party applications installed on Linux distributions to harden their security and privacy to protect your data. They scripts differ from OS level configurations as they configure applications that are not typically native to Linux distributions, i.e., not included in the OS itself and are not known as being part of a specific distribution.

Similar Guides

Other Platforms


About the Creators

These people have authored this documentation and written its scripts:

  • Avatar of undergroundwires. The creator of PrivacyLearn and privacy.sexy. Black and white portrait showing a person wearing a polka dot tie and suit jacket, reflecting the professional expertise behind the privacy protection tools.
    • Certified security professional
    • 7+ years experience securing banks
    • Open-source developer since 2005
    • EU advisor, Public Speaker, Moderator
    • Hundreds across the globe
    • Testers, reviewers, developers
    • Companies, military agencies
    • Community since 2017

Reviewed By

This guide has undergone comprehensive auditing and peer review:
  • Expert review by undergroundwires

    • Verified technical accuracy and editorial standards
    • Assessed system impact and user privacy risks
  • Public review by large community

    • Privacy enthusiasts and professionals peer-reviewed
    • Millions of end-users tested across different environments

History

We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.