Disable OS data collection
Overview
This category contains privacy scripts for Linux.
These changes use Linux system commands to update your settings.
All operating systems collect data. This is part of their work. Sometimes, this data has high privacy implications, especially when it is submitted to third parties. Some Linux distributions come with out-of-the-box data collection and submission. Most of the time, this data collection is opt-in, but not necessarily always.
Data collection and telemetry is not always a bad thing, and can help developers provide better software that can compete with proprietary and much more privacy-invasive alternatives.
Be careful running these scripts. This category includes scripts with high impact:
- 🔴 Some not recommended scripts. They should only be used by advanced users. They may break important functionality.
- 🟡 Some recommended scripts only if you understand its implications. Some non-critical or features may no longer function correctly after running this this category.
- 🟢 Some safely recommended scripts. Safe-to use for any user.
Implementation Details
-
Language: bash
-
Scripts Count: 24 scripts
-
Subcategories: 12
-
Required Privileges: Root/sudo access
-
Compatibility: Linux only
-
Reversibility: All changes can be reverted
Apply now
These scripts are written using Bash (Shell script) scripting language.
Choose one of two ways to apply:
- Automatically via privacy.sexy: The easiest and safest option.
- Manually by downloading: Requires downloading a file.
Alternative 1. Apply with Privacy.sexy
privacy.sexy is free and open-source application that lets securely apply this action easily.
It allows selectively choose parts of this action to conduct. You can fully restore this action (revert back to the original behavior) using the application. Additionally, you can apply only the recommended scripts, instead of applying all of the scripts.
privacy.sexy instructions
- Open or download the desktop application
- Search for the category name:
Disable OS data collection
. - Check the category by clicking on the checkbox of the category.
- Click on Run button at the bottom of the page.
Alternative 2. Download
You can choose to apply only scripts with less impact or also those with higher impact:
Strict
Recommended if you understand its implications. It may cause some non-critical features to no longer function correctly.
All
Not recommended for daily use as it breaks important functionality. It provides military-grade privacy, for special use-cases. Do not run it without having backups and system snapshots.
Consider restarting your computer for all changes to take affect.
This action is completely reversible, you can restore your changes to the initial/default state. The restore/revert methods provided here can help you fix issues.
If something goes wrong, use the Revert script provided above.
Standard
This script includes only Standard recommendation level.
Standard scripts in this category is recommended for all users. They help to improve privacy without affecting stability.
Download only standard scripts by clicking on the button:
Restore these changes if you decide to revert them by downloading the restore script:
Strict
This script includes Standard and Strict recommendation levels.
This script is only recommended if you understand their implications of every single change. Some non-critical or features may no longer function correctly after running this script.
Download Strict scripts:
Restore these changes if you decide to revert them by downloading the restore script:
All
This script includes Standard, Strict recommendation levels along with unrecommended scripts.
This script should only be used by advanced users. Some of these changes are NOT recommended for daily use as it breaks important functionality. Do not run it without having backups and system snapshots.
Download all scripts:
Restore these changes if you decide to revert them by downloading the restore script:
Explore further
This category includes total of 24 scripts and 12 subcategories.
Explore its 1 subscripts and 5 subcategories:
Disable Debian telemetry
Debian, also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project. Debian-based distributions include Ubuntu, Kali Linux, MX Linux, Pardus, Parrot OS, PureOS, Raspberry Pi OS, TAILS, and others. Debian contains some telemetry client libraries, and some packages depend or build-depend on them. Some pre-installed packages send data or facilitate sending data, which may risk your privacy to some extent.
Disable Arch Linux telemetry
Arch Linux is an independently developed, x86-64 general-purpose Linux distribution that strives to provide the latest stable versions of most software by following a rolling-release model. The default installation is a minimal base system, configured by the user to only add what is specifically required.
Disable Zorin OS telemetry
Zorin OS is a Linux distribution based on Ubuntu. It is customized to help users transition from Windows and macOS easily.
Disable Ubuntu telemetry
Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu, along with its upstream Debian, has many official (Kubuntu, Lubuntu, Ubuntu Studio…) and unofficial (elementary OS, KDE neon, Linux Mint, Pop! OS, Zorin OS…) derivatives.
Disable Zeitgeist activity logging
Zeitgeist logs files opened, websites visited, conversations, and emails and provides this information over an API to applications. It serves as a comprehensive activity log and also makes it possible to determine relationships between items based on usage patterns. It stores computer use actions such as files accessed, sites visited, and conversations held. The data is typically used to facilitate searches and "best-fit" to your local query only. There's no proof that it's uploading data. It do...
Disable connectivity checks (breaks Captive Portal detection)
NetworkManager can try to reach a web server after connecting to a network in order to determine if it is, e.g., behind a captive portal. Disabling connectivity protects against privacy leaks, but breaks captive portal detection. Connectivity URLs differ depending on the Linux distribution, e.g.: Arch Linux: "http://ping.archlinux.org/nm-check.txt" (in `/usr/lib/NetworkMan...
Support
This website relies on your support.
Your donation helps keep the project alive and improves its content ❤️.
Share this page: