Systems Guides
The system we choose to use matters significantly, as it impacts our digital security and privacy. Each operating system has its strengths and weaknesses regarding privacy features and security protocols. For instance, some prioritize user anonymity, while others require extra configurations.
When you want to be more private the most important thing is your operating system. Flashing an operating system is often not as hard as it seems, the reason that people think it is scary is that people think you will have a big chance to ruin your computer. While flashing an OS on a computer, the risk is generally very low. The bigger risk is that you make a mistake such as turning off the computer in the middle of the process.
USB or SD Card?
We prefer USB since it’s compatible with more machines. The best thing in our opinion is generally only use SD cards when it’s a Raspberry Pi. We think both can be an option. Generally, USB is also faster than SD and typically has larger storage in case you want to boot your system from it.
Flashing Preparation
First and foremost, we want to have a USB for this, as we already talked about.
We will also need an ISO image, which is a file that contains the system we want to install. You do not need to pick from the list below. We recommend things that we know will be useful for our readers. If we find that another system is better for us, then we can use that. Here is a list of sites for the operating systems that we recommend:
And last but not least, we will also need to install balenaEtcher. When we go to the website of balenaEtcher, we need to press “Download balenaEtcher” or scroll down until we see the download links. Obviously, we have to download the software for whatever machine we have. Once we have downloaded and installed it, we do the following:
- Click on “Flash from file” then pick your ISO file.
- Then in the same fashion select your drive.
- Now click “Flash!”.
- Before you do next step, make sure your drive is backed up.
- Then if prompted that all contents on your drive will be erased, proceed to erase the drive.
Finding The Boot Menu
This can sometimes be a problem if we are flashing on someone else’s computer. We recommend looking online. The boot menu is usually accessed with one of the following keys: ESC, F12, F11, F10, F8, and F2. We didn’t have laptops with all of these, but this is what we found while researching online.
Booting Up And Post Boot.
Usually, we will get to a window similar to the BIOS. We use our arrow keys to select our USB and press enter. We will see the system starting to boot.
With systems like Ubuntu, we often boot from a live version. Then, what happens is that we get the option to install the system within the system, usually with a pop-up. We recommend that we first install the system on our Hard Disk Drive or SSD before changing any settings.
After clicking to install the system, the computer will usually restart and start the installation. When it’s done, we can then set it up, which we have guides for on our website.
The GrapheneOS setup and settings guide will help you get started with the most private and secure system in the world. First and foremost the GrapheneOS team has made an amazing guide on how to install it on your phone.After all I will therefore not be copy pasting or reinventing the wheel. Follow GrapheneOS’ Installation guide.
Initial Setup
To set up your GrapheneOS phone, follow these steps:
- Choose Your Language: Select your preferred language and click Next.
- Wireless Setup: Click on Setup without Wi-Fi.
- Date and Time: Set the time, date, and timezone, then click Next.
- Location Services: Uncheck the box for location services and press Next.
- Set a PIN: Create a secure PIN for your device.
- Fingerprint Setup (Optional): You can set up fingerprint authentication if desired.
- Restore Apps & Data: Choose to Skip this step.
- Swipe Navigation: Opt for Swipe to navigate your phone if you wish (optional).
- Finalize Setup: On the “You’re all set now!” screen, click Start.
Upon completing these steps, your GrapheneOS phone will be fully operational. Therefore we will now go directly to settings
Settings
Configuring settings is crucial for maintaining privacy. In GrapheneOS, you have the ability to manage permissions comprehensively:
- Go to Settings.
- Scroll down to “System” and click on “System update”. (Always keep your phone updated.)
- Click on Check for updates to see if there are any updates available.
- If updates are available, make sure to update before continuing.
Network Settings
This section allows you to block unwanted content and manage your always-on VPN for enhanced privacy.
- Go to “Network & internet”.
- Click on “Private DNS”.
- Click on “Private DNS provider hostname”.
- Enter your hostname (e.g., 12ab34.dns.nextdns.io).
- Click the back arrow at the top left corner.
It’s important to keep custom DNS enabled on your phone for optimal security. You should consider unblocking rather than disabling your custom DNS.
Connected Devices Settings
Control your connected devices for a more secure environment.
- Go to “Connected devices”.
- Click on “Connection preferences”.
- Click on “NFC” and disable it, then go back.
- Click on “Connected Cameras” and disable it.
- Return to the settings menu.
Security & Privacy Settings
This section is very important as it manages your security and privacy controls:
- Go to “Security & privacy”.
- Click on “Privacy controls”.
- Disable “Camera access”.
- Disable “Microphone access”.
- Ensure “Show clipboard access” is enabled.
- Click “Location” and confirm that “App location permissions” are off.
- Click on “Location services” and disable all options.
- Return to “Location” > “Privacy controls” > “Security & Privacy”.
Exploit Protection Settings
Ensure maximum protection against vulnerabilities:
- Click on “Exploit protection”.
- Set “Auto reboot” to 12 hours or less.
- Set “USB-C port” to “Charging-only.”
- Set “Turn off Wi-Fi automatically” to 1 minute or less.
- Set “Turn off Bluetooth automatically” to 1 minute or less.
- Set “Native code debugging” to “Block for third-party apps by default.”
- Set “WebView JIT” to “Disable for third-party apps by default.”
- Set “Dynamic code loading via memory” to “Restrict for third-party apps by default.”
- Set “Dynamic code loading via storage” to “Restrict for third-party apps by default.”
- Enable “Secure app spawning.”
- Return to “Security & privacy”.
I recommend keeping all exploit protection settings enabled, as they play a crucial role in safeguarding your device.
More Security & Privacy Settings
- Go to “More security & privacy”.
- Disable “Notifications on lock screen.”
- Disable “Show media on lock screen.”
- Disable “Allow Sensors permission to apps by default.”
- Disable “Save screenshot timestamp to EXIF.”
- Disable “Automatic exploit protection compatibility mode.”
- Return to “Security & privacy.”
Privacy Controls Settings
- Go to “Privacy controls.”
- Navigate to “Permission manager.”
- Scroll down to “Sensors” and click on it.
- Click each item and disable every option.
- Go back.
- Go to network and disable anything that does not need network access. (Only disable things you are sure of.)
Fedora Linux is a privacy operating system that has the aesthetics of Windows. The system works similarly to Windows but carries the protections of any other Linux distributions. Fedora has its own app store, which is used to fetch software easily, it actually works much easier than on Windows. Other differences are that it doesn’t run spyware natively or install ads on its system.
Initial Setup
For the USB part of flashing Fedora, see Flashing at the top of the screen.
When you first get into the Fedora you will see the “Welcome Center”. In the very center of this windows is a big installation button. You should click this and wait. It will open a window that says “Initiallizing…”. After that the screen with language and keyboard language comes up. pick your preference and press next. Adjust the date and time since it always seems to be far from the current and then again press next. When you clicked on next pick “Share disk with other operating systems” if you want to keep your old system. If you want to install it and erase everything from the previous system pick “Use entire disk”.
Data Encryption, Passwords & Account
- After pressing next, check “Encrypt my data”.
- Then write and confirm your passphrase.
- After that click on “Next”.
- Skip “Full name”.
- Make a generic “User name”.
- Make a passphrase that is not the same your encryption password.
- Confirm your passphrase.
- Press next.
Review & Install
After that Fedora will present you with a screen that shows what drives will be erased and what settings you choose. If there is any data you want to extract from your old system the time is now. Obviously it will be gone forever if you did not extract it beforehand.
- Check the “I understand that all existing data will be erased”.
- Click on “Erase data and install”.
Now the waiting game starts. Depending on your computer, it might be a shorter or longer waiting time for the installation process. Let the system install and do not turn off the computer as it could potentially corrupt your files. This would mean you’d have to redo all of the things we just did.
Post-Installation Of Fedora
After your system has installed it will tell you “Successfully installed”. Now you should pull out the USB, hold the power button till it turns off and then turn on your machine. Before the system finish booting, it will ask for your encryption password, enter it and wait for it to finish booting. Now enter your local account password. You may be greeted with a Fedora KDE loading screen and then a “Welcome Center” where they elaborate.
System Settings
Initially when you launch Fedoras system settings you see the “Quick Settings”. These are mainly optional but I think dark mode is best for all systems. This is because the battery will hold longer. These settings are optional but they’re worth at taking a look at.
Privacy & Security
Fedora don’t leave much for you to do here, there are much more security related things than privacy here.
In screen locking the default auto lock is set to 5 minutes which is fine. It should not be set to more. You could set it to less. This is mainly for physical security so it also depends on your usage.
Within “Recent Files” set “Remember opened documents” to “Do not remember”.
Also verify that “User Feedback” is completely off.
Appearance & Style
Fedora allows you to customize the appearance of your computer. Some prefer light colors, some prefer dark colors and some wants a rainbow of colors. Me, I prefer to turn all animations off. This will preserve battery and all the little extra time we can have before the battery is out is precious. On that note, in windows your battery dies fast because windows runs a ton of processes in the back with bad battery management. With Linux this is not the case.
Above the category, verify that remote desktop is off.
Updating Fedora
On your taskbar there is a bag icon, if you hover it, it will say “Discover”. Click it and go to “Updates”. This is your update center. First time you click updates it might take a while for it to finish as there are always over 700 updates to make at first launch. Wait for it to fetch the updates and proceed to install the updates. Before continuing I highly recommend that you install all updates.
Ubuntu is a popular open-source operating system based on the Linux kernel, designed with a strong focus on privacy and security. Its user-friendly interface makes it ideal for beginners transitioning from other systems.
Ubuntu comes with a wide range of pre-installed software, including essential applications like the Firefox web browser, LibreOffice for document editing, and various multimedia tools. This allows you to start using your system immediately without needing additional installations.
The operating system also features a vast software repository, giving you access to thousands of applications to customize your experience. Moreover, Ubuntu’s security capabilities include regular updates
Initial Setup
For the USB part of of this guide, see Flashing at the top menu.
When you first get into the Ubuntu you will see the “Welcome to Ubuntu” screen. From here pick your language and press next twice.
- Pick your language and press next twice.
- Then pick your keyboard language and press next.
- Verify that “Do not connect to the internet” and press next.
- Then verify that “Install Ubuntu” is selected and press next.
- After that verify that “Interactive installation” is selected and press next.
- Decide if you want essentials or the full package of tools and press next.
- Check “Install third-party software for graphics and Wi-Fi hardware” and press next.
- Verify that “Erase disk and install Ubuntu” is selected and press next.
- Enter an alias in “Your name”.
- Then enter an alias in”Your computer’s name”.
- After that enter an alias in “Your username”.
- Create and confirm a password and verify “Require my password to log in” and press next.
- Select “Location” and “Timezone”.
- Click on next and then install.
- Allow the computer to install Ubuntu.
- After it finishes click “Restart now”.
- Wait till it tells you “Please remove the installation medium, then press ENTER”.
- Follow the instruction and allow it to boot up.
After your system has installed, it will come up with a “Welcome to Ubuntu xx.xx.x LTS”. Now we will do settings.
First Launch
After first launch you will be greeted with a screen that says “Welcome to Ubuntu version-number LTS”. What we want to do is to click on “Next”.
- Verify that “Skip for now” is selected and press “Skip”.
- Check “No, don’t share system data” and press “Next”.
- Press Finish
Settings
After we finished our first launch part, we want to go into system settings. In the lower left corner is a circle icon with three dots on it. This is the “Show Apps” icon. Click this and find “Settings”.
- Go to “Privacy & Security” at the very bottom of the left menu.
- Click on “Location” and verify that it’s turned off.
- Then click on “Clear History…”.
- Go back and click on “File History & Trash”.
- Disable “File History”.
- Then enable “Automatically Delete Trash Content”.
- Also enable “Automatically Delete Temporary Files”.
- Set “Automatically Delete Period” to 1 hour.
Search & Notifications
- Click on “Search” in the left menu and disable all options in the “Search Results” section. Then disable “App Search”.
- Then click on “Search Locations”.
- Disable all and click the trash bin next to the “Desktop” option.
- Go to “Notifications” and then disable “Lock Screen Notifications”.
- Then go to “Ubuntu Desktop” and find “Position on Screen”.
- Here you can decide where to put the taskbar.
Updates
- Open the “App Center” it is the little orange icon on your taskbar that looks like a bag with an “A” on it.
- Then click on “Manage” at the bottom of the left menu.
This is where you can update your computer. Obviously it also updates your apps and if you go up to any of the above categories you will find apps you can install.
Tails is a privacy-focused operating system designed to provide users with a secure and anonymous computing experience. Built on Debian GNU/Linux, Tails runs from a USB stick or DVD, ensuring that no traces of the user’s activities are left behind on the computer. This project is developed by the Tor Project, which is well-known for its commitment to online privacy and security.
About The System
Tails is designed to forget all user activity when shut down, meaning no logs or files are retained, which ensures complete privacy. It routes internet traffic through the Tor network, providing strong anonymity and protecting users from surveillance and traffic analysis. Additionally, Tails includes various privacy and security tools, such as encryption for emails and files, along with applications like the Tor Browser for secure web browsing.
Despite its advanced privacy features, Tails offers a user-friendly interface that makes it accessible to all users. The development team consistently releases updates to keep the operating system secure against emerging threats.
Tails is ideal for sensitive communications, making it a reliable choice for journalists, activists, and whistleblowers. Using Tails on public or shared computers also helps protect personal data and online activity from potential snoopers. For anyone concerned about privacy, Tails serves as a powerful tool for evading government surveillance or unwanted tracking.
In a digital landscape ridden with privacy concerns, Tails stands out as a robust solution for protecting personal information and ensuring online anonymity. By utilizing Tails, users can confidently navigate the web without leaving a trace.
Pre-Booting
First, we need to acquire a version of Tails that we can use. We will need a USB drive and balenaEtcher to install it. Additionally, we should check the flashing tab for more information on how to flash it effectively. Once we have those resources ready, we can proceed with the installation process.
Post-Booting
We assume you looked at the guide on flashing. So lets move on to the next step.
- After booting, you will see the “Welcome to Tails!” screen.
- Set your language, keyboard layout, and formats.
- Do not create persistent storage; this system is meant mainly for temporary use.
- Click on the plus at the lower left corner and select the “Unsafe Browser” option.
Press “Add.” - Click on “Unsafe Browser” and select “Disable the Unsafe Browser.”
- Finally, click “Start Tails.”
That’s it, now you are in!
Now you can connect to Wi-Fi or a hotspot and browse in a secure way.