Disable OS data collection
- Linux onlyThis script improves your privacy on Linux
- Multiple actionsThis page belongs to a category, containing some changes with similar goal.
- Impact: Minimum
System Functionality / Data Loss Risk: Low
This action improves privacy with minimal impact when you run the recommended script.
- Bash (Shell script)These changes use Linux system commands to update your settings.
- 24 scripts
- 12 categories
- Sudo/root requiredThis script requires privilege access to do the system changes
- Fully reversible
You can fully restore this action (revert back to the original behavior) using this website.
The restore/revert methods provided here can help you fix issues.
Overview
All operating systems collect data. This is part of their work. Sometimes, this data has high privacy implications, especially when it is submitted to third parties. Some Linux distributions come with out-of-the-box data collection and submission. Most of the time, this data collection is opt-in, but not necessarily always.
Data collection and telemetry is not always a bad thing, and can help developers provide better software that can compete with proprietary and much more privacy-invasive alternatives.
Apply Now
Choose one of two ways to apply:
- Normal
- High
- Maximum
Normal — Everyday Privacy (Enterprise-Grade)
- Recommended for all
- Safe for daily use
- No impact on system stability
Read more about Normal and other protection levels
High — Advanced Privacy
- For advanced privacy-conscious users
- May affect some features
Read more about High and other protection levels
Maximum — Strongest Possible Privacy (Military-Grade)
- Military-grade privacy protection
- Major system impact
- Consider having system backup.
Read more about Maximum and other protection levels
Help
How to apply or restore "Disable OS data collection" using script
- ≈ 3 min to complete
- Tools: Web Browser
- Difficulty: Medium
- ≈ 6 instructions
- 1
Choose protection
Choose one of the options with different impact levels:
Normal
Some safe changes minimal system impact.High
Some potentially impactful changes with moderate system impact.Maximum
Some impactful changes with high system impact.
- 2
Download
Download the script file by clicking on thebutton above.
Use button above to restore changes. - 3
Keep the file
If warned by your browser, keep the file. - 4
Open
Open the downloaded file. - 5
Exit
Once it's done, press any key to exit the window. - 6
Restart
Restart your computer for all changes to take effect.
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Shows the code
- Free
- Open-source
- Popular
- Offline/Online usage
Help
How to apply or restore "Disable OS data collection" using privacy.sexy
- ≈ 3 min to complete
- Tools: privacy.sexy
- Difficulty: Simple
- ≈ 4 instructions
- 2
Choose script
- Search for the category name: Disable OS data collection
- Check the category by clicking on the checkbox of the category.
Applying Normal to limit the impact.
- 3
Run
Click on ▶️ Run button at the bottom of the page.This button only appears on desktop version (recommended). On browser, use 💾 Save button.
Explore This Guide
- 24 Privacy settings
- 5 Main categories
- These settings are organized into 5 main categories for easy navigation.
- Each main category contains subcategories, helping you find specific settings you might want to adjust.
- 12 Total categories
Choose what to protect based on your needs: Click any option to learn more about what it does. Each change can be applied and reversed individually.
- Some settings and commands may require technical knowledge to apply correctly.
- Most users find the Normal protection above sufficient.
Disable Debian telemetry
Debian, also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project. Debian-based distributions include Ubuntu, Kali Linux, MX Linux, Pardus, Parrot OS, PureOS, Raspberry Pi OS, TAILS, and others. Debian contains some telemetry client libraries, and some packages depend or build-depend on them. Some pre-installed packages send data or facilitate sending data, which may risk your privacy to some extent.
Disable Arch Linux telemetry
Arch Linux is an independently developed, x86-64 general-purpose Linux distribution that strives to provide the latest stable versions of most software by following a rolling-release model. The default installation is a minimal base system, configured by the user to only add what is specifically required.
Disable Zorin OS telemetry
Zorin OS is a Linux distribution based on Ubuntu. It is customized to help users transition from Windows and macOS easily.
Disable Ubuntu telemetry
Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu, along with its upstream Debian, has many official (Kubuntu, Lubuntu, Ubuntu Studio…) and unofficial (elementary OS, KDE neon, Linux Mint, Pop! OS, Zorin OS…) derivatives.
Disable Zeitgeist activity logging
Zeitgeist logs files opened, websites visited, conversations, and emails and provides this information over an API to applications. It serves as a comprehensive activity log and also makes it possible to determine relationships between items based on usage patterns. It stores computer use actions such as files accessed, sites visited, and conversations held. The data is typically used to facilitate searches and "best-fit" to your local query only. There's no proof that it's uploading data. It do...
Disable connectivity checks (breaks Captive Portal detection)
(Reference: NetworkManager) can try to reach a web server after connecting to a network in order to determine if it is, e.g., behind a captive portal. Disabling connectivity protects against privacy leaks, but breaks captive portal detection. Connectivity URLs differ depending on the Linux distribution, e.g.: Arch Linux: "http://ping.archlinux.org/nm-check.txt" (in `/usr/lib/NetworkMan...
Similar Guides
About the Creators
These people have authored this documentation and written its scripts:
Reviewed By
This guide has undergone comprehensive auditing and peer review:Expert review by undergroundwires
- Verified technical accuracy and editorial standards
- Assessed system impact and user privacy risks
Public review by large community
- Privacy enthusiasts and professionals peer-reviewed
- Millions of end-users tested across different environments
History
We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.