Skip to main content

Disable Zeitgeist activity logging

Overview

About this category

This category contains privacy scripts for Linux.

These changes use Linux system commands to update your settings.

Zeitgeist logs files opened, websites visited, conversations, and emails and provides this information over an API to applications 1. It serves as a comprehensive activity log and also makes it possible to determine relationships between items based on usage patterns 1.

It stores computer use actions such as files accessed, sites visited, and conversations held. The data is typically used to facilitate searches and "best-fit" to your local query only.

There's no proof that it's uploading data. It does not send data over the network but still makes the system more vulnerable by storing usage information that can be used for further exploitation.

It is primarily used by desktop environments such as GNOME 2, Pantheon 3, and Unity 4. Furthermore, it is supported by applications (typically as optional functionality) such as Gnome Rhythmbox (as a plugin) 5, catfish (optional support) 6, and synapse 7.

Read more about Zeitgeist:

Not Advised

This category should only be used by advanced users. None of its scripts are recommended for daily use as it breaks important functionality. Do not run it without having backups and system snapshots.

Apply now

These scripts are written using Bash (Shell script) scripting language.

Choose one of two ways to apply:

  1. Automatically via privacy.sexy: The easiest and safest option.
  2. Manually by downloading: Requires downloading a file.

Alternative 1. Apply with Privacy.sexy

privacy.sexy is free and open-source application that lets securely apply this action easily.

Open privacy.sexy

It allows selectively choose parts of this action to conduct. You can fully restore this action (revert back to the original behavior) using the application.

privacy.sexy instructions
  1. Open or download the desktop application
  2. Search for the category name: Disable Zeitgeist activity logging.
  3. Check the category by clicking on the checkbox of the category.
  4. Click on Run button at the bottom of the page.

Alternative 2. Download

Consider restarting your computer for all changes to take affect.

Reversible

This action is completely reversible, you can restore your changes to the initial/default state. The restore/revert methods provided here can help you fix issues.

If something goes wrong, use the Revert script provided above.

All

This script includes Standard, Strict recommendation levels along with unrecommended scripts.

Not Advised

This script should only be used by advanced users. Some of these changes are NOT recommended for daily use as it breaks important functionality. Do not run it without having backups and system snapshots.

Download all scripts:

Download script

Restore these changes if you decide to revert them by downloading the restore script:

Download restore script

Explore further

This category includes total of 4 scripts but no subcategories.

Explore its 4 scripts:

Explore Categories

This action belongs to Disable OS data collection category. All operating systems collect data. This is part of their work. Sometimes, this data has high privacy implications, especially when it is submitted to third parties. Some Linux distributions come with out-of-the-box data collection and submission. Most of the time, this data collection is... Read more on category page ▶

Support

This website relies on your support.

Support now

Your donation helps keep the project alive and improves its content ❤️.

Share this page: