Connect with us


Which Linux Distro Is Best for Privacy? We’ve Done the Research [Guide]

Best Linux Privacy Distro

This article is for people who want more online privacy and security. If you are in a hurry to find your distro, skip ahead to “How to Choose Your Best Linux Privacy Distro.” Why is Linux better than Windows or macOS? Independent security experts favor Linux over either Windows or macOS, explaining all the reasons […]

Which Linux Distro Is Best for Privacy? We’ve Done the Research [Guide] was originally found on Blokt – Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.

Republished by Plato



Best Linux Privacy Distro

This article is for people who want more online privacy and security. If you are in a hurry to find your distro, skip ahead to “How to Choose Your Best Linux Privacy Distro.”

Why is Linux better than Windows or macOS?

Independent security experts favor Linux over either Windows or macOS, explaining all the reasons why is an article in itself. We’ll touch on two of the big reasons most pros favor Linux over Windows and macOS, then zoom in on Linux distros.

Two of the biggest reasons experts say Linux is more secure than Windows or macOS are that Linux:

  • Is Built on Open Source Software
  • Is a “Small” Target for Hackers

Linux is Built on Open Source Software

The code that Linux is built on is open-source software. That means anyone can read or modify the code. While that may sound like a privacy nightmare, it is actually the opposite. Independent programmers from all over the world work on Linux code. That makes it almost impossible for a bad actor to add malicious code to Linux without someone seeing it.

Contrast this to proprietary operating systems like Windows or macOS. The proprietary source code is controlled by the company and hidden from outsiders. If you use a proprietary operating system, you have to trust the company. Will they ensure that no malicious code gets added by outsiders? Will they add malicious code themselves?

Windows 10, for example, has code in it that records all sorts of information about how you use your computer. Microsoft inserted this code intentionally to gather this information for their own use. In the Linux world, a small army of programmers guards the source code against this kind of behavior.

Linux is a “Small” Target for Hackers

According to Statistica, in 2017, there were over 1.3 billion users of Microsoft Windows in the world. They also stated there were over 170 million users of MacOS 10.

What about Linux? Around 28 million users. In other words:

  • There are about six times as many MacOS users as Linux users.
  • There are almost 50 times as many Windows users as there are Linux users.

If you were a hacker, which target would you choose? The 1.3 billion Windows users or the 28 million Linux users?

Social Engineering May Be the Biggest Threat of All

While the operating system you use is important to your online privacy, social engineering might be an even bigger threat than some piece of malicious software.

“The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.” Kevin Mitnick, Internet security expert and “world’s most famous hacker.”

Bad guys of all types use social engineering techniques to get around the protections built into your operating system. They take advantage of your trusting nature or curiosity to trick you into giving them the information they want.

See this article to learn about various social engineering attacks and how you can protect yourself from them.

Okay, so what exactly is Linux?

We’ve been talking about Linux and how it differs from Windows and macOS. But we haven’t said exactly what Linux is. Let’s do that now.

Linux is a family of free and open-source operating systems. It is based on core software called the Linux Kernel. Because the Kernel is free and open-source, anyone can use it to create their own version of Linux. When someone bundles together the Kernel and the rest of the software to make a fully functional operating system, it is called a Linux Distribution, or Linux Distro.

Developers have created hundreds of Linux Distros for a wide range of purposes. Some can replace Windows and macOS on the typical user’s desktop computers. Others run everything from the print server in your office to the most powerful supercomputers. Even the Android operating system running your smartphone is based on Linux.

While it is cool that Linux is used in so many places, that doesn’t help us much right now. So for the rest of this article, we’ll concentrate on Linux Distros that run on personal computers and are used for typical personal activities. We’ll ignore the versions running on smartphones, supercomputers, and other places.

Pros and Cons of Moving to Linux from Windows or macOS

Pros Cons
Most Linux Distros are free. Support can be limited/disorganized.
Linux is considered more secure. Most of the world runs Windows or macOS.
There is a Linux Distro for virtually any use case. The most popular software runs on Windows.
There are free and open-source programs that work like most popular Windows programs.
Less malware is written for Linux.
Linux Distros are usually faster/more efficient.

How to Choose Your Best Linux Privacy Distro

Choosing the best privacy distro is a personal thing. Perfect privacy is impossible to guarantee. And the greater the privacy you want, the more tradeoffs you will need to make.

In an ideal world, all our Personally Identifiable Information (PII) would be private. We would control who gets to see our information. The same goes for records of what we do and where we go when online.

Instead, all sorts of groups are trying to get their hands on this information for their own uses. You have to decide how much online privacy you need and how much you are willing to sacrifice to get that privacy.

The most popular operating systems and programs usually have the weakest privacy protections. But they also work with the most websites and have the most support. This makes them ideal targets for the bad guys.

Worse, the makers of these operating systems and programs often want your PII for their own uses. Remember the uproar when people saw what data Windows 10 collects about its users?

Moving to a Linux Distro eliminates many privacy and security problems. That said, every distro has its strengths and weaknesses. Read on to learn about several popular Linux Distros and the kind of privacy they give you.

Regular Linux Distros for Basic Privacy

If you use Windows or macOS, you can boost your privacy simply by moving to Linux. In this section, we’ll look at the privacy strengths and weaknesses of three popular Linux Distros.


Ubuntu is the most popular desktop Linux Distro. It is supported by a company called Canonical Ltd. Canonical funds development of Ubuntu with money earned, providing Ubuntu support to businesses. Unfortunately, Ubuntu has a spotty record when it comes to user privacy.

In 2012, Ubuntu recorded what users searched for in the files on their computers. It then sent that information to Canonical. Canonical used the information to run targeted Amazon ads on the user’s computer.

This prompted Richard Stallman, President of the Free Software Foundation, to call for the free software community to shun Ubuntu for spying on its users. Canonical eventually disabled this monitoring after much public pressure.

In 2018 Ubuntu began collecting a range of data from user’s computers and sending it back to Canonical. They say the data is anonymized, but the fact that they began collecting the data upset a lot of people. So did the way they set things up. New installations of Ubuntu 18.04 were set up to collect and send the data. Users should have to opt into giving up their data, not opt-out of Canonical taking it automatically.

Given this history, we recommend you look at other Linux distros if you value your privacy.

Linux Mint

Linux Mint is perhaps the version of Linux that Windows users will find easiest to adjust to. In particular, Linux Mint Cinnamon looks and feels much like Windows 7 did.

But what about privacy? This could have been a problem since Linux Mint is built on Ubuntu code. However, in their April 2018 newsletter, the Linux Mint team announced, “Ubuntu ships with “ubuntu-report,” which collects metrics and usage data. This package won’t be present in Linux Mint, and no data will be collected or sent.”

Linux Mint
Linux Mint

While Linux Mint doesn’t have the potential privacy issues that Ubuntu does, it certainly doesn’t provide the ultimate in privacy protection. Among other things, while it comes with all open-source software by default, Linux Mint does allow you to install proprietary video drivers and other software. This increases the risks to your privacy.

Linux Mint also uses unencrypted, non-anonymized connections to the Internet by default. This gives you the maximum in compatibility with websites and other online resources. But it leaves you exposed to all sorts of snooping unless you install and correctly configure tools like a VPN of Tor.

But if you are looking for a more private open-source operating system that’s easy to switch over to from Windows, Linux Mint could be a good option. One of our team has been using Linux Mint for several years now on multiple computers and remembers the switchover from Windows 7 as being very easy.


Debian is a Linux Distro that offers significant privacy improvements over Ubuntu or Linux Mint. But those improvements come at the price of some compatibility issues. Debian does not support any proprietary drivers or other components. This means that some popular commercial software won’t run on Debian.

On the other hand, the Debian community has created open source replacements for most any proprietary product you might need. As we said, there is some tradeoff of convenience for privacy.

Debian ships with Firefox-ESR (Extended Support Release) as its web browser. The personal version of Firefox ships with Ubuntu and Linux Mint. Firefox-ESR doesn’t include some of the privacy-threatening features that the personal version has. This makes the ESR version safer, but it may not work with some websites.

Emphasizing the Debian focus on user security and privacy, the team maintains a very detailed,

“step-by-step guide for setting up a personal computer with Debian from scratch to a fully configured system with high security, usability, convenience, and privacy protection.”

This SecurePersonalComputer guide is designed to help you go as far as you wish in securing your system from basic installation to advanced topics like:

  • Installing the OpenVPN client and using it with a commercial VPN service
  • Hardening the Linux Kernel against attacks
  • Installing an Intrusion Detection System and Security Auditing Tools
  • Installing Electrum, a free and open-source Bitcoin wallet

If you are looking for solid privacy and are willing to put up with some inconvenience and incompatibilities with the latest and greatest stuff on the Internet, Debian could be the Linux Privacy Distro for you.

Specialized Linux Distros for Privacy, Anonymity, and Security

The following three Linux Distros are specialized ones for people with more serious privacy needs.


Tails OS
Tails OS

Tails (The Amnesic Incognito Live System) is a Linux Distro designed to keep you anonymously and safe while online. So what’s with the crazy name? It will actually make sense if we look at each piece in reverse order:

  • Live System – A live system is an operating system that can runs from a USB Stick or DVD without being installed on the computer where it is running. A live system is also sometimes called a live OS.
  • Incognito – Tails uses the anonymous Tor network to connect to the Internet. Only the most powerful adversaries have the money and tech to defeat the Tor network. That means Tails can travel the Internet “incognito.”
  • Amnesic – Tails does not leave any traces of its presence on the computer you are using. Not only that, but by design, Tails itself doesn’t remember anything either. All the data from your current session in Tails is in the RAM of the computer you are using. As soon as you power down the computer, everything is forgotten, making Tails “amnesic.”

Just from decoding the name, we can see that Tails is off to a good start when it comes to protecting your privacy. Beyond those in its name, Tails has these additional privacy features:

  • Tails are based on Debian, itself a strong privacy distro.
  • Tails comes with state of the art encryption tech built-in, including PGP and OTR support, automatic HTTPS, the KeePassX password manager, and much more.

With all this built-in privacy and anonymity in a mobile, use-anywhere package, Tails far surpasses distros like Linux Mint and even Debian. In case you’re still not convinced that this is a powerful Linux Privacy Distro, you should know that Edward Snowden used Tails to keep himself safe when he was passing NSA secrets to reporters a few years ago.

This doesn’t mean that Tails is foolproof. Researchers find security issues in Tails from time to time. The Tails team fixes them, of course, but there is no guarantee that all the possible issues have been found and fixed.

How safe you are when using Tails (or any other privacy distro) depends in part upon who wants you, and how badly they want you. If you want to protect yourself from a typical threat (you ex’s lawyer perhaps), Tails is likely more than sufficient.

But if you want to protect yourself from a global adversary (like the NSA) who wants you really badly, it isn’t clear that Tails is sufficient to save you. To help you understand the risks, the Tails team has a page dedicated to warnings.

To summarize, if you need robust privacy protection, and you’re not being pursued by the NSA, the 5 Eyes, or some other gigantic adversary with a global reach, Tails could be your answer.


While you are running a live system like Tails, it is the only operating system running on your computer. You don’t have to worry about the security of the operating system and programs that usually run on the computer.

At the same time, running from a live system has drawbacks. You are limited to the software that comes with the live system. This software is designed to give you privacy but usually doesn’t include the latest features and technologies.

Normally, a live system like Tails won’t even keep data from session to session (remember the Amnesic part of the name). Setting up a Persistent Storage partition gives Tails the ability to remember data from session to session, but introduces its own security vulnerabilities.

Whonix isn’t a live system. It typically runs as two VirtualBox virtual machines (VMs) on top of the computer’s normal operating system. It relies on the VirtualBox virtualization program to keep the software running in Whonix isolated from the rest of the software on the computer.

Like Tails, Whonix is based on a modified version of Debian.

Whonix protects you by dividing communications and your workspace between the VMs. Whonix-Gateway is the communications part of the system. It uses the Tor network to handle all connections with the outside world. The other VM is called Whonix-Workstation. This VM comes with common applications that are installed and configured and ready to run. You do all your work within the Workstation VM.

Because it uses VirtualBox VMs, Whonix can run on the vast majority of computers. You can work in the secure Whonix Workstation and still use the computer normally. This is convenient but dangerous.

Have you ever accidentally typed in the wrong window on your computer? Imagine doing this on a computer running Whonix. Only the software running in the Workstation VM is secure. The software outside Whonix is just as vulnerable to spyware, keyloggers, and other spying as ever.

And remember, any programs using the Whonix Gateway communicate through Tor. But programs running outside Whonix do not. Your ISP and anyone else who happens to be monitoring your computer will be able to see these communications.

We think Whonix by itself is risky due to running on the (probably insecure) regular operating system of the computer you use it on. However, there is a pretty elegant solution to this problem. We’ll tell you about it shortly. But before we do, we need to talk about Qubes.


With much of the Western security apparatus (spy agencies) out to get him, Edward Snowden is one guy who has to stay on top of Internet privacy and security. As you just saw, Snowden used Tails when he was first leaking information from the NSA.

But Edward Snowden has stopped using Tails and now relies on the Qubes OS. While the Qubes team bills their product as “a reasonably secure operating system,” Snowden and other experts take it much further:

Qubes OS
Qubes OS

Qubes protect you using the “Security by Isolation” approach. Using Qubes, you define security domains, each of which runs in a virtual machine. This lets you isolate programs and even components of Qubes from each other. Things running in one security domain can’t affect things running in other domains.

Say you use a normal computer for personal banking. But you also use it to visit dodgy websites sometimes. If something on one of those dodgy websites manages to compromise your computer system, everything on it, including your banking information, is at risk.

What if you were running Qubes? You would likely have one security domain for banking, and another for visiting those dodgy websites. Now, if something from one of those sites compromises your computer system, it can only touch things in the same security domain. Your banking information stays safe.

To make this all happen, Qubes replaces your old operating system with the Xen hypervisor. The Xen open source, type-1 hypervisor runs on bare metal. In other words, it runs directly on your computer’s hardware.

Because Xen doesn’t run on top of Windows or some other operating system, it is fast and efficient. It also eliminates the risk that the underlying operating system might be compromised (since there is no underlying operating system).

As far as each security domain virtual machine (called an AppVM in Qubes documentation) can tell, it is its own separate operating system. Most AppVMs run Linux, but there is support for Windows AppVMs too. Qubes provides tools for securely passing data from one domain to the other.

As you can see, Qubes is quite a step up in complexity from even Tails or Whonix. At the same time, Qubes itself doesn’t provide anonymity or privacy. To add these capabilities, people sometimes run Whonix inside of Qubes or Tails inside of Qubes.

If high-end privacy protection is what you need, and you are willing to make a radical shift in your computing environment, Qubes could be your answer.

How much privacy do you really need?

Choosing the best Linux Distro for your own privacy is a balancing act. Each of the Distros we’ve looked at here offers a different balance of privacy vs. convenience.

We suggest you start by picking the Linux Privacy Distro that looks like the best fit for you. Read the detailed review you’ll find on this site or dive right in and test it out for yourself.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.



How did Bitcoin lending become so popular?

Republished by Plato



The rising valuation of Bitcoin witnessed the growth of several sectors involved with the digital asset. The crypto lending market has exhibited extraordinary growth as institutions-focused Genesis registered a 245% growth in their outstanding loans in 2020.

While the BTC lending market is young, its swift adoption has created a billion-dollar industry, which is one of the benchmarks of development for the current Bitcoin ecosystem.

Total Bitcoin collateral grew by 1170%

Source: Arcane Research

According to Arcane Research’s recent Banking on Bitcoin report, the total active collateral in the BTC lending market has increased to ~$25 billion from $2 billion in 12 months. It was estimated that the number of Bitcoin used for collateral at the moment is around 420,000 BTC, however, this estimation is based on a modest evaluation that only 50% of the active loans are backed by Bitcoin collateral, whereas various industry experts believe it could be close to 70-80%.

While there are various Bitcoin lending companies in the current market, the impact of the institutional lending organization such as BlockFI and Genesis have been vital.

As mentioned earlier, Genesis’ active loans outstanding improved from $649 million in Q1 2020 to a whopping $3,821 million in Q4 2020. From Q3 to Q4, the growth was roughly 80%.

BlockFi registered similar impressive numbers, with a 50x increase in retail loans BTC collateral from Q4 2018 to Q4 2020; from $10 million to $500 million.

Bitcoin lending’s popularity grows

There are multiple factors that played into the expansion of the BTC collateral market. Over the past 12 months, the asset has received significant recognition after recovering at a rapid rate following the March 2020 crash. However, some of the most common reasons include leveraging on an existing position, arbitrage plays, and covering operation costs without selling any crypto holdings.

Source: Arcane Research

Some of its innate properties have improved over the few months. Bitcoin’s market has a 24/7 availability, which can be traded all year round and it is easily updated. Other assets such as Gold are only trading during the working days of the week, which is close to 30% less than Bitcoin.

Its store-of-value credentials have also improved drastically, with 75% of Bitcoin remaining in profit throughout its history.

However, one of the major reasons involves the ease at which BTC loans can be processed. Traditional loan methods require a certain amount of credit score, a tediously long process, and a lot of paperwork.

With Bitcoin, users do not need to establish a relationship with their banks to get a loan and they can easily lend from the emerging borderless Bitcoin lending market.

Sign Up For Our Newsletter


Continue Reading


OLB Group enables crypto payments for thousands of US merchants

Republished by Plato



OLB Group (OLB), a New York-based e-commerce merchant service provider, is making it easier for businesses to accept cryptocurrency payments.

OLB’s more than 8,500 merchants are now able to accept Bitcoin (BTC), Ethereum (ETH), USDC and DAI at the point-of-sale through the company’s OmniSoft business management platform. Customers wishing to pay with cryptocurrency in-store or through their mobile phones can simply elect to do so with their cryptocurrency wallets. All payments are processed through SecurePay, a payment gateway that authenticates the transaction, converts the cryptocurrency to U.S. dollars and approves the final sale.

The decision to integrate cryptocurrency payments was partly driven by the growth of contactless and online orders during the Covid-19 pandemic. With the OmniSoft platform already providing merchants with several options to facilitate payments, cryptocurrencies were the next logical step. 

Ronny Yakov, OLB Group’s CEO, says the payment gateway and point-of-sale architecture are “familiar territory for merchants,” which makes integrating cryptocurrencies through such channels easy.

On the topic of cryptocurrency payments – a promising but underutilized use case for the industry – Yakov believes we are still in the very early stages of adoption.

“It’s very early in crypto-as-a-payment adoption, but we see increasing interest from merchants exploring this payment option as a means to meet their customers however and wherever they prefer,” Yakov tells Cointelegraph.

He also believes certain industries are more likely to adopt crypto payments before others:

“We anticipate that adoption will happen more quickly in higher-ticket transactions such as jewelry, B2B billing and real estate because the transaction fees for cryptocurrency processing are lower – often half of typical credit card fees.”

Cryptocurrencies like Bitcoin have struggled to become a viable medium of exchange, inviting criticism about their utility. Charlie Munger, the billionaire investor and Berkshire Hathaway vice chairman, recently criticizedBitcoin for being “too volatile to serve well as a medium of exchange.”

With development work on scaling and sidechains still in progress, it remains to be seen whether cryptoassets will ever function efficiently as payment systems. In the meantime, assets like Bitcoin and Ethereum are valued for their store-of-value and development capabilities, respectively.


Continue Reading


Litecoin, Monero, Dash Price Analysis: 28 February

Republished by Plato



Litecoin witnessed a downwards breakout from a parallel channel and moved to its support at $156.75. Monero was projected to move sideways as trading volumes and buying activity was suppressed. Lastly, a descending triangle emerged on Dash’s chart but a breakout largely depended on the direction of the broader market.

Litecoin [LTC]

Source: LTC/USD, TradingView

On the hourly timeframe, Litecoin broke below its parallel channel and moved to another region of support at $157.5. The On Balance Volume dipped as the price broke below the bottom trendline, but the index was recovering at the time of writing. A bullish crossover in the Stochastic RSI added some more optimism as LTC picked up from the $157 support line.

However, it was hard to overlook LTC’s bear market and stronger cues could be needed to back a move above the immediate overhead resistance. A spike in the 24-hour trading volumes could be one such signal that could project an upwards breakout on the charts.

Monero [XMR]

Source: XMR/USD, TradingView

The 24-hour trading volumes on Monero were muted as the cryptocurrency failed to break out from the $224.5 and $196.3 range. The  Bollinger Bands showed that volatility remained on the lower side as the bands were compressed. This also meant that massive movements were unlikely and XMR could continue to trade within its current channel over the next few sessions.

A bullish twin peak setup on the Awesome Oscillator was negated as momentum tilted in the favor of the sellers at the time of writing.

Dash [DASH]

Source: DASH/USD, TradingView

Dash formed a descending triangle on its 4-hour chart as the price formed lower highs since snapping a local high at over $330. The On Balance Volume also steadily declined as the sell-off was heightened by a correction in the broader market. The Stochastic RSI continued its southbound trajectory after reversing from the overbought region.

Further weakness in market leaders BTC and ETH could continue to have a negative impact on Dash, and support levels at $166.8 and $135.3 could be tested in the event of a downwards breakout. On the flip side, Dash’s pattern could be invalidated if the price moves north on the back of a broader market rally.

Sign Up For Our Newsletter


Continue Reading
Blockchain3 days ago

Gemini collaborates with The Giving Block and others, adds donations option

Blockchain4 days ago

Optimized Ethereum Mining Settings for Nvidia RTX 3060 Ti, RTX 3070, RTX 3080 and RTX 3090 GPUs

Blockchain3 days ago

NextGen Blockchain Platforms Self-Organize to Win Government Contracts

Blockchain4 days ago

Crypto Lending Explained 2021

Blockchain4 days ago

Traditional Banks get serious about enabling crypto-related services

Blockchain5 days ago

Kraken Reacts to Market Selloff

Blockchain4 days ago

Trailing Take Profit Explained

Blockchain4 days ago

BitMEX adding six new perpetual contacts: ADA, DOT, EOS, YFI, UNI, and XLM

Blockchain3 days ago

What Coinbase Going Public Could Do For Crypto

Blockchain2 days ago

Crypto Investment Fund to Sell $750M in Bitcoin for Cardano and Polkadot

Blockchain5 days ago

DeFi Orion Protocol Launches Staking Calculator

Blockchain4 days ago

World’s First Bitcoin ETF Records Stellar Growth, AUM Crosses Half A Billion Dollars

Blockchain4 days ago

MicroStrategy Completes Another $1 Billion Bitcoin Buy

Blockchain4 days ago

All of the Federal Reserve’s wire and ACH systems are down

Blockchain4 days ago

Traders remain bullish even as DeFi’s TVL falls to $54.4 billion

Blockchain2 days ago

This was avoidable – The lost Bitcoin fortunes

Blockchain4 days ago

ZelaaPayAE deploys Pundi X’s merchant crypto payment solutions for UAE

Blockchain4 days ago

Sam Bankman-Fried: The crypto whale who wants to give billions away

Blockchain4 days ago

Craig Wright Sues Bitcoin Developers Over Stolen BTC Worth $5 Billion

Blockchain4 days ago

Tatum helps donation-based betting app Fandona complete its blockchain MVP