Linux-based operating systems have a reputation for being very secure and private. Linux is free and open source, unlike Windows or macOS. This makes its source code more open to scrutiny – harder for developers to add malware.
Many Linux distributions also have built-in features and applications for enhanced desktop security. But installing a Linux operating system is not the ultimate solution to protecting your desktop.
Fortunately, there are also plenty of free and open source (FOSS) software that can add more layers of protection to your desktop. Here are some of the best Linux apps to keep your computer private and secure.
1. Tor Browser
If you care about online privacy, you might want to stay away from Chrome. Google Chrome is notorious for collecting private user data, which also applies to Chrome-based browsers like Edge or Opera.
Alternatives like Firefox are good for everyday web browsing with privacy in mind. With the right Firefox privacy add-ons, Mozilla’s browser can protect your data even better online. But if you need to take online privacy to the next level, then Tor Browser will do wonders for you.
In great detail, we’ve shown how you can browse the web privately with Tor Browser on Linux. When you open a webpage through the Tor browser, your connection goes through a network of private computers called nodes. This website is designed to hide online traffic from Tor users. The browser and its network encrypt your IP address and block online trackers.
With Tor Browser you will become anonymous and safer on the web.
To download: Tor Browser (Free)
2. Report
Signal is a cross-platform messaging app that encrypts your conversations. It uses end-to-end encryption to prevent messages from being intercepted by malicious actors. Individual messages, group chats, shared files and calls are all encrypted.
The messenger is primarily designed for smartphone users. You can only register with a phone number through the mobile app. But a powerful desktop application is also available for PC users. Users only need to link their accounts on the mobile app to use the desktop version of Signal.
Signal is simple, secure and growing in popularity. It is perhaps the best secure messaging app today.
To download: Signal (Free)
3. Element
Many other encrypted messengers are available for users who might not have a smartphone. Element, with its Matrix protocol, is a powerful alternative and complement to Signal.
Matrix is a free, open source and decentralized online communication protocol. No server has all the data of the conversations made in Matrix. Matrix is not an application in itself. Instead, Matrix allows many client messaging applications to use the protocol.
Matrix can also support end-to-end message encryption. But not all Matrix-based apps are equally capable of encrypting conversations.
Element has the strongest encryption capabilities of any Matrix client application. With its advanced features, Matrix.org Foundation recommends Element to users who want to get into Matrix.
Element is also available on all platforms, including versions for web browsers and Linux.
To download: Element (free)
4. KeePass XC
Password managers are essential to truly securing your online accounts. They can be useful when you have 10 or 20 online passwords to track.
It would be unwise to reuse the same password for every online account. Using easy-to-remember but weak passwords can also leave your accounts vulnerable. There are many common password mistakes that can be difficult to avoid on your own.
Why not have a password manager create and maintain your strong passwords for you? Using a well-organized password manager can save you a lot of time and valuable data.
KeePassXC is a powerful, open-source, offline password manager. The application generates strong passwords and stores them in encrypted databases. KeePassXC started out as a KeePass port for Linux but now works on all platforms.
To download: KeePassXC (Free)
5. Authenticator
Two-factor authentication (2FA) is a login method to verify the user in addition to your password. 2FA is quickly becoming a standard for online security.
Today, there are many ways to authenticate user logins. The most common 2FA login method today is to send a one-time verification code via email or SMS after typing in a password.
Verifying your credentials with one-time online codes is convenient. But it is also vulnerable to email/SMS interception methods such as man-in-the-middle attacks.
If you need a more secure 2FA method, you might want to look into authenticator apps. An authenticator app is linked to your accounts so that the app can generate verification codes. It will generate unique codes to your accounts at regular intervals.
Authenticator apps don’t need to sign in to your apps after the first time. An offline authenticator app makes it much harder for malicious actors to intercept 2FA verification codes.
There are many 2FA apps out there, but one of the best is a no-frills app called Authenticator. It connects to your accounts and generates 2FA codes without any hassle. It is also free and open-source which makes the app more secure for its users.
Authenticator is also part of the GNOME Circle, the catalog of applications approved by the GNOME Foundation.
To download: Authenticator (Free)
6. Obfuscate
Obfuscate is an image editor with only two tools: blur and redact. Although it only has a few features, users should not underestimate Obfuscate. The app was designed to censor images in a jiffy. It has the potential to prevent your private information from being compromised.
Using Obfuscate only requires an intuitive click-drag-release on an image element that you need to obfuscate. This GNOME Circle app is lightweight and works like other image blur tools.
Why bother opening and configuring a heavy image editor like GIMP just to hide text on an image? Using the right tool for the right job can save you time, just like Obfuscate can save your private data when you share your images on the web.
To download: Obfuscate (Free)
7. File Shredder
Whenever you “permanently delete” a file, the computer just hides the file and marks it for overwriting. This deleted file will remain intact until new files are written over the old one.
If you need to permanently erase a file, you’ll need a tool that immediately overwrites that file.
Fortunately, Linux users have the shred command to erase files. Normally you would open a terminal to use shred. But with File Shredder, you can use Shred through a graphical user interface (GUI).
This application, like Authenticator and Obfuscate, is also part of the GNOME circle.
To download: File shredder (free)
8. VeraCrypt
Need to protect important files with strong encryption, while hiding them in plain sight? You can do all this with VeraCrypt, an application for creating and accessing encrypted file volumes.
With VeraCrypt, you can create file volumes within container files. You are free to choose the size of the file volumes, as well as the file type of the container file. All file volumes should be encrypted with a strong password and encryption algorithm.
For example, you can create a 4GB encrypted file volume hidden under a container file named Aladdin_1080p.mkv. Place the file in your Videos folder and you have a hidden VeraCrypt volume in plain sight!
Once created, VeraCrypt file volumes can only be decrypted and mounted through the application. Users can access and write to mounted volumes like any external drive.
VeraCrypt runs on Linux but is also available on Windows and macOS.
To download: VeraCrypt (Free)
9. Cleopatra
GnuPG is another reliable encryption tool for securing sensitive files and texts in Linux. GnuPG is the Linux implementation of the OpenPGP encryption standard. Many Linux distributions have GnuPG installed by default.
GnuPG allows users to create OpenPGP keys. Users can use these keys to encrypt and decrypt files and text. GnuPG is normally used via a command line. But with Kleopatra, you will be able to use GnuPG via a graphical interface.
Kleopatra is one of the default apps on Tails, a privacy-focused Linux distribution. You can learn how to use Kleopatra by following the Tails GnuPG tutorial.
To download: Cleopatra (Free)
10. Onion Sharing
OnionShare is an end-to-end encrypted file sharing application. It uses the Tor network for end-to-end encrypted file transfer.
To share files on OnionShare, you need to make sure that you can send end-to-end encrypted messages to your file recipient. Once secure communications are established, you can begin adding files to share.
When you’re ready, OnionShare will provide you with an address and private key to send to the recipient. Once the recipient has access to the address and key, they can securely receive the files you sent.
To download: Onion Sharing (free)
Protect your Linux desktop with the right apps
All of these privacy and security apps are not only powerful, but also free and open source. They uphold a key FOSS principle: privacy and security are a right that everyone should enjoy.
For the benefits they bring, all of these apps are just one of the many ways Linux protects its users.