- a credit card is traceable (through logs)
 - bitcoin is traceable (through ledger)
 - mobile phone in traceable (through logs, triangulation, etc)
 - finding someone locally to buy bitcoin is potentially anonymous, but hassle
 - buying paper printout of bitcoin locally is potentially anonymous, but hassle
 - don't rely on Tor for anonymity against state actors (see correlation attacks)
 - if Tor is ever comprimised, make sure it isn't your real IP they will find
 - consider using a mobile modem far away from where you live
 - keep mobile modem/secure location clean (make sure it was never used for normal activities associated with real identity)
 - buy throwaway sim cards anonymously
 - only use sim card in burner phone (with no history of normal, non-anonymous use)
 - setup firewall rules to prevent IP leaking if tor goes down
 - don't go against state actors, you will slip up somewhere
 - don't trust VPNs, they aid state-actors and law-enforcement, through fear of prosecution
 - VPN-over-Tor is not anonymous
 - Tor-over-VPN hides Tor use from ISP, but bridges may work better
 - only use 
torbrowserwith default settings and extensions - do not resize 
torbrowserwindow