Skip to main content

Disable OS data collection

Apply Now
Works with any Linux distroWorks with any Linux distribution that can run bash scripts.
  • Linux onlyThis script improves your privacy on Linux
  • Multiple actionsThis page belongs to a category, containing some changes with similar goal.
  • Impact: Minimum

    System Functionality / Data Loss Risk: Low

    This action improves privacy with minimal impact when you run the recommended script.

  • Bash (Shell script)These changes use Linux system commands to update your settings.
  • 24 scripts
  • 12 categories
  • Sudo/root requiredThis script requires privilege access to do the system changes
  • Fully reversible

    You can fully restore this action (revert back to the original behavior) using this website.

    The restore/revert methods provided here can help you fix issues.

Overview

All operating systems collect data. This is part of their work. Sometimes, this data has high privacy implications, especially when it is submitted to third parties. Some Linux distributions come with out-of-the-box data collection and submission. Most of the time, this data collection is opt-in, but not necessarily always.

Data collection and telemetry is not always a bad thing, and can help developers provide better software that can compete with proprietary and much more privacy-invasive alternatives.

Safe for General Use
This script has Normal protection level option. This is recommended for all users to improve without any noticeable impact on the system functionality.

Apply Now

Choose one of two ways to apply:

Download script

Download and run the script directly
  • No app needed
  • Offline usage
  • Free
  • Open-source

NormalEveryday Privacy (Enterprise-Grade)

  • Recommended for all
  • Safe for daily use
  • No impact on system stability

Read more about Normal and other protection levels

Help

How to apply or restore "Disable OS data collection" using script

  • ≈ 3 min to complete
  • Tools: Web Browser
  • Difficulty: Medium
  • ≈ 6 instructions
  1. 1

    Choose protection

    Choose one of the options with different impact levels:

    • Normal

      Some safe changes minimal system impact.
    • High

      Some potentially impactful changes with moderate system impact.
    • Maximum

      Some impactful changes with high system impact.
  2. 2

    Download

    Download the script file by clicking on the   Apply protection  button above.
    Use   Undo protection button above to restore changes.
  3. 3

    Keep the file

    If warned by your browser, keep the file.
  4. 4

    Open

    Open the downloaded file.
  5. 5

    Exit

    Once it's done, press any key to exit the window.
  6. 6

    Restart

    Restart your computer for all changes to take effect.

Apply with privacy.sexy

Guided, automated application with safety checks
  • Recommended for most users
  • Includes safety checks
  • Shows the code
  • Free
  • Open-source
  • Popular
  • Offline/Online usage
Open privacy.sexy
Help

How to apply or restore "Disable OS data collection" using privacy.sexy

  • ≈ 3 min to complete
  • Tools: privacy.sexy
  • Difficulty: Simple
  • ≈ 4 instructions
privacy.sexy is free and open-source application that lets securely apply this action easily with more advanced options.
  1. 1

    Open or download

    Open or download the desktop application
  2. 2

    Choose script

    1. Search for the category name: Disable OS data collection
    2. Check the category by clicking on the checkbox of the category.

    Applying Normal to limit the impact.

  3. 3

    Run

    Click on ▶️ Run button at the bottom of the page.

    This button only appears on desktop version (recommended). On browser, use 💾 Save button.

Explore This Guide

  • 24 Privacy settings
  • 5 Main categories
    • These settings are organized into 5 main categories for easy navigation.
    • Each main category contains subcategories, helping you find specific settings you might want to adjust.
  • 12 Total categories

Choose what to protect based on your needs:

Click any option to learn more about what it does.

Each change can be applied and reversed individually.

  • Some settings and commands may require technical knowledge to apply correctly.
  • Most users find the Normal protection above sufficient.

Disable Debian telemetry

Debian, also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project. Debian-based distributions include Ubuntu, Kali Linux, MX Linux, Pardus, Parrot OS, PureOS, Raspberry Pi OS, TAILS, and others. Debian contains some telemetry client libraries, and some packages depend or build-depend on them. Some pre-installed packages send data or facilitate sending data, which may risk your privacy to some extent.

Disable Arch Linux telemetry

Arch Linux is an independently developed, x86-64 general-purpose Linux distribution that strives to provide the latest stable versions of most software by following a rolling-release model. The default installation is a minimal base system, configured by the user to only add what is specifically required.

Disable Zorin OS telemetry

Zorin OS is a Linux distribution based on Ubuntu. It is customized to help users transition from Windows and macOS easily.

Disable Ubuntu telemetry

Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu, along with its upstream Debian, has many official (Kubuntu, Lubuntu, Ubuntu Studio…) and unofficial (elementary OS, KDE neon, Linux Mint, Pop! OS, Zorin OS…) derivatives.

Disable Zeitgeist activity logging

Zeitgeist logs files opened, websites visited, conversations, and emails and provides this information over an API to applications. It serves as a comprehensive activity log and also makes it possible to determine relationships between items based on usage patterns. It stores computer use actions such as files accessed, sites visited, and conversations held. The data is typically used to facilitate searches and "best-fit" to your local query only. There's no proof that it's uploading data. It do...

Disable connectivity checks (breaks Captive Portal detection)

(Reference: NetworkManager) can try to reach a web server after connecting to a network in order to determine if it is, e.g., behind a captive portal. Disabling connectivity protects against privacy leaks, but breaks captive portal detection. Connectivity URLs differ depending on the Linux distribution, e.g.: Arch Linux: "http://ping.archlinux.org/nm-check.txt" (in `/usr/lib/NetworkMan...

Similar Guides

Same Goal

Other guides in Linux 

See settings that are in the same category as this guide.

Using other actions in the same category may help you achieve your goal better.


About the Creators

These people have authored this documentation and written its scripts:

  • Avatar of undergroundwires. The creator of PrivacyLearn and privacy.sexy. Black and white portrait showing a person wearing a polka dot tie and suit jacket, reflecting the professional expertise behind the privacy protection tools.
    • Certified security professional
    • 7+ years experience securing banks
    • Open-source developer since 2005
    • EU advisor, Public Speaker, Moderator
    • Hundreds across the globe
    • Testers, reviewers, developers
    • Companies, military agencies
    • Community since 2017

Reviewed By

This guide has undergone comprehensive auditing and peer review:
  • Expert review by undergroundwires

    • Verified technical accuracy and editorial standards
    • Assessed system impact and user privacy risks
  • Public review by large community

    • Privacy enthusiasts and professionals peer-reviewed
    • Millions of end-users tested across different environments

History

We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.