Linux
- Linux onlyThis script improves your privacy on Linux
- Many actionsThis page belongs to a collection, containing many changes.
- Impact: Minimum
System Functionality / Data Loss Risk: Low
This action improves privacy with minimal impact when you run the recommended script.
- Bash (Shell script)These changes use Linux system commands to update your settings.
- 131 scripts
- 45 categories
- Sudo/root requiredThis script requires privilege access to do the system changes
- Partially reversibleYou can not restore changes done by this script.
Overview
Universal
All Linux distrosVerified
Community TestedDocumented
Everything documentedBash Script Compatible
Works on any distribution that can run bash scriptsPackage Manager Support
Compatible with Snap, Flatpak, and native package managersSecurity Hardening
Enhanced system security and privacy configurationsDesktop & Server Ready
Optimized for both desktop and server environmentsPrivacy Protection Scope
Comprehensive privacy protection across your Linux systemSupported Distributions
Linux scripts should work on all distributions that supports Bash.
Tested Distributions
Following distributions have been tested and verified by the community:Frequently Asked Questions
Common questions about Linux privacy hardeningPrivacy on Linux
Why do I need privacy protection on Linux?
Privacy on Linux
Why do I need privacy protection on Linux?While Linux is privacy-focused by design, modern distributions and Linux applications often include components that collect data:
- Desktop environments often track user interactions.
- Package managers record install/remove events.
- System logs can contain sensitive info.
- Apps may include their own analytics.
Our scripts help you maintain complete control over your system's data collection points while preserving functionality.
Linux Script Safety
Is it safe to apply these privacy scripts on Linux?
Linux Script Safety
Is it safe to apply these privacy scripts on Linux?Yes. These community-reviewed scripts focus on disabling telemetry and other tracking features without touching your personal files. The scripts are open-source and peer-reviewed by the Linux community.
While Normal scripts are safe, High andMaximum options may affect system functionality.
Review script descriptions before applying anything beyond Normal protection.
Package Managers
How do these scripts handle different package managers?
Package Managers
How do these scripts handle different package managers?Our scripts automatically detect and adapt to your distribution's package management system:
- Supports apt, dnf, pacman, and more.
- Works with Flatpak and Snap.
- Preserves custom configuration files.
No manual tweaks are required—just run the script, and it handles everything behind the scenes.
High or Maximum protection levels may affect certain package manager features.
System Impact
Will it break updates or my server/computer? Can I run it on production?
System Impact
Will it break updates or my server/computer? Can I run it on production?No, Normal protection is designed to preserve system functionality. It works well on both personal systems and production servers. It won't interfere with critical services or updates.
Advanced scripts such as High or Maximum may stop certain telemetry-related services that some distributions or applications rely on.
When in doubt, start with Normal and review any advanced scripts before applying them.
Root Access
Do I need root (sudo) privileges?
Root Access
Do I need root (sudo) privileges?Yes, sudo access is generally required to change core system privacy/security settings.
The scripts provide clear instructions and only request elevation when necessary.
Reversibility
Can I revert the changes later on?
Reversibility
Can I revert the changes later on?Yes! With
, you can revert changes to restore your previous settings at any time.Some cleanup actions (like deleting old logs or caches) cannot be undone once the files are removed. This is noted clearly in the scripts.
Desktop Environments
Will these settings work across different desktop environments?
Desktop Environments
Will these settings work across different desktop environments?Yes, we cater to major desktop environments:
- GNOME, KDE, Xfce, and more.
- Applies DE-specific tweaks where possible.
- Ensures universal privacy settings remain intact.
We focus on maximizing privacy without breaking important features across different DEs.
SELinux & AppArmor
How do the scripts interact with SELinux/AppArmor?
SELinux & AppArmor
How do the scripts interact with SELinux/AppArmor?Scripts respect existing SELinux/AppArmor policies. Scripts are designed to work harmoniously with Linux security frameworks:
- Policies remain in enforcing mode.
- No changes to security contexts.
Your existing security measures stay intact while unwanted telemetry is disabled.
Linux Servers
Can I apply these settings on a server installation?
Linux Servers
Can I apply these settings on a server installation?Yes, scripts come with server-optimized features:
- SSH session compatibility.
- Lightweight server scripts without GUI dependencies.
Perfect for hardening production servers while maintaining serviceability.
Apply Now
Choose one of two ways to apply:
- Normal
- High
- Maximum
Normal — Everyday Privacy (Enterprise-Grade)
- Recommended for all
- Safe for daily use
- No impact on system stability
Read more about Normal and other protection levels
High — Advanced Privacy
- For advanced privacy-conscious users
- May affect some features
Read more about High and other protection levels
Maximum — Strongest Possible Privacy (Military-Grade)
- Military-grade privacy protection
- Major system impact
- Consider having system backup.
Read more about Maximum and other protection levels
Help
How to apply or restore privacy on Linux using script
- ≈ 3 min to complete
- Tools: Web Browser
- Difficulty: Medium
- ≈ 6 instructions
- 1
Choose protection
Choose one of the options with different impact levels:
Normal
Some safe changes minimal system impact.High
Some potentially impactful changes with moderate system impact.Maximum
Some impactful changes with high system impact.
- 2
Download
Download the script file by clicking on thebutton above.
Use button above to restore changes. - 3
Keep the file
If warned by your browser, keep the file. - 4
Open
Open the downloaded file. - 5
Exit
Once it's done, press any key to exit the window. - 6
Restart
Restart your computer for all changes to take effect.
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Shows the code
- Free
- Open-source
- Popular
- Offline/Online usage
Help
How to apply or restore privacy on Linux using privacy.sexy
- ≈ 3 min to complete
- Tools: privacy.sexy
- Difficulty: Simple
- ≈ 4 instructions
- 2
Choose script
- Open the collection on top menu: Linux
- Select a level on top left:
- Standard for Normal (Everyday Privacy (Enterprise-Grade))
- Strict for High (Advanced Privacy)
- All for Maximum (Strongest Possible Privacy (Military-Grade))
On top left, you can select Normal to limit the impact.
Not sure which level to choose? Check protection levels guide.
- 3
Run
Click on ▶️ Run button at the bottom of the page.This button only appears on desktop version (recommended). On browser, use 💾 Save button.
Explore This Guide
- 131 Privacy settings
- 3 Main categories
- These settings are organized into 3 main categories for easy navigation.
- Each main category contains subcategories, helping you find specific settings you might want to adjust.
- 45 Total categories
Choose what to protect based on your needs: Click any option to learn more about what it does. Each change can be applied and reversed individually.
- Some settings and commands may require technical knowledge to apply correctly.
- Most users find the Normal protection above sufficient.
Privacy cleanup
These scripts allow you to increase privacy by deleting collected data about you and your behavior.
Disable OS data collection
All operating systems collect data. This is part of their work. Sometimes, this data has high privacy implications, especially when it is submitted to third parties. Some Linux distributions come with out-of-the-box data collection and submission. Most of the time, this data collection is opt-in, but not necessarily always. Data collection and telemetry is not always a bad thing, and can help developers provide better software that can compete with proprietary and much more privacy-invasive alte...
Configure programs
These scripts configure third-party applications installed on Linux distributions to harden their security and privacy to protect your data. They scripts differ from OS level configurations as they configure applications that are not typically native to Linux distributions, i.e., not included in the OS itself and are not known as being part of a specific distribution.
Similar Guides
About the Creators
These people have authored this documentation and written its scripts:
Reviewed By
This guide has undergone comprehensive auditing and peer review:Expert review by undergroundwires
- Verified technical accuracy and editorial standards
- Assessed system impact and user privacy risks
Public review by large community
- Privacy enthusiasts and professionals peer-reviewed
- Millions of end-users tested across different environments
History
We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.