Open In App

Anonymity and Privacy For Linux User

Improve
Improve
Like Article
Like
Save
Share
Report

Today, more than 3 billion of the world’s population is connected to the virtual world known as the internet in some way or another. And the size of the hard-wares and data centers is on the increase every year due to insufficient users’ information holding capacity. The lack of awareness and knowledge behind the proper functioning of the internet has made the word ‘privacy’-a weak issue. However, the internet is a virtual global network or a world where every person is exposed or at a high risk of getting exposed. Exposed here refers to location, site info, and IP addresses all can be and are traceable by the service providers and or government if they want and if required. Every free human has a right to privacy, then why do they need to know what you are doing in your private life on the internet? Why do they need to know whom you are talking to too and what you are sending and receiving? Why do they need to keep logs of every site you visit? What does your data packet contain? and so on. It’s a pretty simple concept behind great free services like Facebook, Google, Gmail, and WhatsApp; you give me your data and I will give you free service. In this fast pace world and the excitement of the new services provided by those big companies, it leads us ‘innocent users’ to introduce ourselves and our private life and information on the internet. This article is for Linux users, it is a basic but very prime step to follow to achieve anonymity on the internet. Readers are introduced to some tools and their uses to achieve privacy and anonymity over the internet while using Linux-based systems. There has always been a conflict on achieving anonymity on the internet and mixed answers about it mostly keep the users and readers in confusion. In this article, it has tried hard to keep the information simple yet still effective and useful.

1. Passphrase/Password

Passwords are the access keys to anything. Hence if the access key is compromised, then the package protected by the access keys gets compromised. The package might be a package full of passwords you have saved or maybe any valuable information. As the advanced encryption techniques arrived so did the decryption techniques. Due to advanced techniques for cracking passwords, it’s very vital today to have a password that meets certain criteria. It is difficult to remember long lists of passwords. In this case, a strong password manager can be utilized. Some safe practices include never saving your password in any auto-save credentials services and or cloud services. A password manager can be used if you have to deal with a lot of passwords. Tools like KeePassX, KeePass, universal password manager, and so on can be used. It not only saves your passwords but also can generate random passwords. The dice rule and some other methods can be implemented to increase the generation of a good password.

sudo apt-get install keepassx

install keepassx

2. Internet/Connectivity

Since the Internet is a service, we need a service provider to get internet connectivity. They are known as Internet Service Providers. Even mobile network companies provide internet and they are ISPs too including specialized internet provider companies. While the user pays for the internet service, it doesn’t mean that the following service provider protects your identity. Even the VPN/Proxy or any ISP promises no logs of your activities on the internet indeed collect those data from time to time and compromises your anonymity. Trusting open-source technologies where the source can be examined is far better to be used than that of services from the Government or other private entities. Readers are highly encouraged to read at least the overviews of a tool or service or application license and terms, and the permissions allowed when you sign up for a service or install something. since it gives you total knowledge about what are you allowing these services to tool to do with your device and personal data. Also, remember that the times you use technology can be used to build a profile of your location for identification. Consider changing up your times of connectivity. On forums, chat and other services, it may be worthwhile to disable the notification that outwardly displays when you are online or select invisible mode when applicable.

3. Firewall

A Firewall in terms of computer science is a great virtual wall or barrier which protects the user from untrusted external networks and elements. A firewall is a security system for networks which monitors and controls incoming and outgoing network traffic based on pre-made security rules. A firewall is present in almost every platform like Windows and Linux; however, it can be externally installed if not pre-available. In Linux, a firewall like UFW-Uncomplicated Firewall is an easy tool to configure the firewall. If not pre-installed, it can be installed in Linux:

sudo apt-get install ufw
sudo ufw disable
sudo ufw status

installing firewall in Linux - 1

nano /etc/default/ufw' /'IPV6 YES

installing firewall in Linux - 1

'sudo ufw enable'
'sudo ufw default deny incoming'
'sudo ufw default deny outgoing'

installing firewall in Linux - 1 You can use the following command to allow or deny certain port numbers only. To allow firewall access to TCP ports with port numbers.

sudo ufw allow port/tcp

To allow firewall access to UDP ports.

sudo ufw allow port/udp

using ufw in Linux To check UFW firewall status.

sudo ufw status numbered

To checks UFW firewall status. To stop the service, you can use the following command on Linux terminal

sudo ufw disable.

4. MAC Address

Every computer or device connected to the internet has a Media Access Control (MAC) address, which serves as a unique identifier for its network interface. Essentially, the MAC address can be considered as the device’s address, allowing it to be recognized among millions of other devices on the internet or network. Changing your MAC address can be a beneficial practice in certain scenarios to avoid detection and enhance privacy. Various methods and tools, such as TMAC for Windows or macchanger-h in Linux, can be utilized to update or modify your MAC address effectively, providing an additional layer of anonymity and security.

5. Disk Encryption

Encryption is the process of encoding information in a way that only authorized parties can access it, preventing unauthorized access. When it comes to disk encryption, users can apply the same principle by encoding or encrypting their entire disk, ensuring the protection of valuable information and mitigating the risk of data misuse. In the market, there are several disk encryption tools available, such as ‘Veracrypt’ and ‘TrueCrypt’, which offer powerful features for encrypting disks. These tools are particularly well-regarded among Linux users for their robust disk encryption capabilities. By implementing disk encryption, users can safeguard their data, maintain confidentiality, and enhance overall security.

Conclusion

Protecting online privacy is crucial for Linux users. By implementing strong passwords, using password managers, being cautious of internet service providers, configuring firewalls, modifying MAC addresses, and employing disk encryption tools, users can enhance their privacy and safeguard their valuable information. Taking control of online presence and prioritizing privacy is essential in today’s interconnected world.


Last Updated : 31 Jul, 2023
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads