0% found this document useful (0 votes)
63 views3 pages

4 Anonymity and Privacy For Advance Linux

This document provides recommendations for maintaining anonymity and privacy when using Linux. It recommends using a strong password manager like KeepassX to generate and store secure passwords. It also recommends using Diceware to generate passwords from random word lists. The document notes that no VPN or proxy can completely protect privacy and to be aware that connectivity times can be used to build a profile. It provides instructions for setting up a firewall with UFW, changing the MAC address to avoid detection, and using an intrusion detection system to monitor for unusual activity.

Uploaded by

Gie Grajo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views3 pages

4 Anonymity and Privacy For Advance Linux

This document provides recommendations for maintaining anonymity and privacy when using Linux. It recommends using a strong password manager like KeepassX to generate and store secure passwords. It also recommends using Diceware to generate passwords from random word lists. The document notes that no VPN or proxy can completely protect privacy and to be aware that connectivity times can be used to build a profile. It provides instructions for setting up a firewall with UFW, changing the MAC address to avoid detection, and using an intrusion detection system to monitor for unusual activity.

Uploaded by

Gie Grajo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ANONYMITY AND PRIVACY

FOR ADVANCE LINUX

I. Strong Password
1. First off, it’s good to select a strong password manager.

Keypassx is a cross-platform, and has good security features, like encryption by password
and using a keyfile. It also allows you to generate strong passwords, so if you’re not
worried about memorization it’s good practice to let Keypassx generate secure random
passwords.

Download Link:
https://www.keepassx.org/

NOTE: It’s best not to use services that store your passwords in the cloud. If you need, you
can back up your encrypted password database, on a secure server, in an encrypted
directory, and store your keyfile in a separate location.

2. Passwords for encryption and critical access should be prioritized.

Diceware basically randomly chain several words selected from a word list based on dice
roles.

Download Link:
http://world.std.com/~reinhold/diceware.html

II. Internet Connectivity


No service provider should be presumed to completely protect your privacy. Even if your
VPN/Proxy or other ISP promises no logs, or identifiable information, time and time again
information has been collected and used against those seeking anonymity.

Notes and Reminders:


1. Remember that the times you use technology can be used to build a profile of your location
for identification.

2. Consider reading the Terms of Service any time you sign up for a service or install
something. Consider changing up your times of connectivity.
Setting-up Internet Connectivity Security:
1. Set-up the Firewall
UFW (Uncomplicated Firewall) is a great general firewall for Linux.

Install UFW:
$ sudo apt-get install ufw

Run the Firewall:


$ sudo ufw enable
$ sudo ufw default deny incoming

Limit outgoing ports (NOTE: to avoid some software to utilized outgoing traffic, like
encrypted UDP):
$ sudo ufw default deny outgoing

Or, specifically allow or deny the specific port of concern:


$ sudo ufw allow port/tcp
$ sudo ufw allow port/udp

Check the status when done:


$ sudo ufw status

For advance configuration, check this link:


https://help.ubuntu.com/community/UFW
2. Change your MAC Address
MAC Address is a hardware specific identifier for you network interface. In some cases,
it may be useful to change your mac address to avoid detection.

Use this Document:

For GUI:
$ sudo apt-get install macchanger-gtk

3. Intrusion Detection
The basic premise is monitoring the system for unusual activity.

You might also like