This tutorial video is a Linux security and privacy guide to help to keep your online usage safe and secure.
Three zones are used depending on your threat model. You can tweak as needed for your personal circumstances.
Techlore aims to simplify the Linux debate regarding the various distributions avoiding unnecessary complications. The general message is to choose a distribution that is best suited to your needs. With Linux, no matter what you choose, you are going to be miles ahead of Windows in terms of privacy and security.
Three Linux distribution recommendations are given to have a look into...
- Fedora
- Debian
- Arch Linux
This tutorial video has stacks of Linux hardening recommendations. Although, in this article, I'll only explore some of the tips made in Zone 1. Explore the video to learn more about Linux hardening recommendations made in Zone 2 and 3.
Also see PrivacyTools for services, tools and knowledge to protect your privacy against global mass surveillance.
Strong Passwords to Login to Your Device
Something very simple here is to use a secure password for logging in to your device, whether that's a desktop or mobile device. It's your first line of defence for Linux users.
Also, remember your root password needs to be strong as well. Where possible use your sudo login to keep your root password login protected and rarely used.
Make Your Passwords Not only Strong but UNIQUE
Something else to note is to keep your passwords, not only strong but unique across all the services that you subscribe to. Prevent hackers, trying various services that may have the same password.
Nothing on The Lock Screen
On a side note make sure that any of your widgets and notification alerts are not accessible on your lock screen.
Encryption of File Data
With Linux, there is plenty of encryption options that allow you to encrypt your home directory or if needed the whole hard drive.
Many Firewall Options For Linux users
Most Linux distributions have many firewall options. That you can choose from whether that's IP tables NF tables or firewalld. All of these have their pros and cons.
Another option is UFW uncomplicated firewall, which is worth checking out. There is even a gooey version of UFW called GUFW, which makes things even simpler.
Another firewall worth exploring is safing.io,
Use a Safe and Secure Browser with Proven track Record
The next area of security is your browser? Your browser can track wherever you go on the internet. So, make sure you use a browser that has a proven track record with privacy. It's therefore not recommended to use Chrome.
Use a Search Engine that Isn't going to Track You Across the Web
The next area discussed is the search engine that you're using. Again there's a recommendation not to use Google. The better option for security and privacy is duckduckgo.com and startpage.com. Another search engine option is a search dot me. They are links on the tech law website, to keep you up to date with what these are.
Protect Against Third Parties Viewing Your Ip address
The next important thing to consider is your IP address. This can be tracked across the internet. The way to keep this private is to use a VPN.
Be aware that your ISP can also view your IP and activity. So use a trusted VPN service recommended VPN services are made available on the tech law website.
Be Aware of Your Dns Settings - Another Way You Can Be Tracked
The next area of concern is your DNS service. DNS services. Can track your usage activity across the web. Use a DNS service that has your privacy in mind.
If you're using a VPN service, this is likely to use their DNS settings. If not you can manually set your DNS to a server that is trusted.
Take a Minimalist Approach - Install only The Applications You Need
The next recommendation for security is to take a minimalist approach by uninstalling unused applications on your mobile or desktop.
It's a good idea to go through all the applications that you have installed on your desktop or apps on your mobile and uninstall the ones that you're not using some services. Use what is called? Progressive web apps. Therefore the application runs much like an installed application For these services.
You can uninstall the application and keep and use the web application. Only another recommendation is to go through your files, such as logs and cache files and remove them to free up space on your hard drive and get rid of any logging activity.
Another good recommendation is to go through the various settings, on your Linux, computer and switch off any of the services that you may not be using. This can avoid tracking.
Downgrade Application Permissions Where Needed
There is also a need to go through the various permission settings on all your applications. And installs and downgrade anything that doesn't need elevated permissions.
Use Auto-Update or Update Regularly
The final recommendation for the zone 1 section is to go to update regularly. Either put your switch or computer to automatic updates or update regularly. This will ensure that you have the most up-to-date security patches implemented on your computer.
Disclosure: Some of the links on this website are affiliate links of which Website Library receives a small commission from the sale of certain items, however the price remains the same for you. For more information please read the Affiliate Disclosure.