How to Protect Your Privacy on Linux
![How to Protect Your Privacy on Linux](/content/dam/financial-literacy/ddg-pms/750x420/How%20to%20Protect%20Your%20Privacy%20on%20Linux_750x420.png)
![How to Protect Your Privacy on Linux](/content/dam/financial-literacy/ddg-pms/750x420/How%20to%20Protect%20Your%20Privacy%20on%20Linux_750x420.png)
![How to Protect Your Privacy on Linux](/content/dam/financial-literacy/ddg-pms/750x420/How%20to%20Protect%20Your%20Privacy%20on%20Linux_750x420.png)
![](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux2-2.png)
![](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux2-2.png)
![](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux2-2.png)
3. Don’t use an admin account for daily activity.
For everyday computing, log in with a basic or standard user account. This is likely to be the default behavior when creating a new account, but it’s worth double-checking your account’s status. Note that some system-wide actions will require you to log in with the administrator account because of restricted permissions.
![](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux3.png)
![](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux3.png)
![](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux3.png)
4. Encrypt your data.
Full disk encryption is ideal, but it’s also possible to encrypt just your home directory, for example on a shared machine. This is usually done during installation and is difficult to do afterwards. In that situation, the easiest solution is to back up your data (always a good thing!) and then re-install the OS selecting encryption options. If you really want to try encrypting an existing system, the process varies depending on your distribution and disk partition setup so it's best to search for instructions relevant for your environment.
![linux4](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux4.png)
![linux4](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux4.png)
![linux4](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux4.png)
![linux5](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux5.png)
![linux5](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux5.png)
![linux5](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux5.png)
6. Review your installed applications.
It’s good practice to keep installed applications to a minimum. Not only does this keep your machine lean, it also reduces your exposure to vulnerabilities. As well as looking through your application list manually; there may be tools available for your distribution to make it easy, such as BleachBit.
![linux6](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux6.png)
![linux6](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux6.png)
![linux6](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux6.png)
![linux6](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux7.png)
![linux6](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux7.png)
![linux6](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux7.png)
![linux8](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux8.png)
![linux8](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux8.png)
![linux8](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux8.png)
9. Lock down remote connection settings.
If you use SSH for remote access, there are some simple steps to reduce the risk of attack. The easiest is to use a port other than the default port 22 (and below 1024). You can also prevent remotely logging in as root with PermitRootLogin no in the SSH config file.
![linux8](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux_ssh-2.png)
![linux8](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux_ssh-2.png)
![linux8](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux_ssh-2.png)
![linux10](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux10.png)
![linux10](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux10.png)
![linux10](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux10.png)
![linux11](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux11.png)
![linux11](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux11.png)
![linux11](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux11.png)
12. Restrict privileged access with SELinux or AppArmor.
These may be installed in your system by default but if not, it’s worth adding and configuring them. They both enable users to define rules that limit how applications can run or affect other processes and files. The benefit is that in the event of an attack, the damage to your system is limited.
![linux12](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux12.png)
![linux12](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux12.png)
![linux12](/content/dam/financial-literacy/ddg-pms/linux-screenshots/linux12.png)
How: Get the extension for popular browsers from https://duckduckgo.com/app
Congratulations! You’ve just taken a big step to increasing privacy and protecting the data on your Linux system.
You can also find privacy content from Linux in the below links: