- a credit card is traceable (through logs)
- bitcoin is traceable (through ledger)
- mobile phone in traceable (through logs, triangulation, etc)
- finding someone locally to buy bitcoin is potentially anonymous, but hassle
- buying paper printout of bitcoin locally is potentially anonymous, but hassle
- don't rely on Tor for anonymity against state actors (see correlation attacks)
- if Tor is ever comprimised, make sure it isn't your real IP they will find
- consider using a mobile modem far away from where you live
- keep mobile modem/secure location clean (make sure it was never used for normal activities associated with real identity)
- buy throwaway sim cards anonymously
- only use sim card in burner phone (with no history of normal, non-anonymous use)
- setup firewall rules to prevent IP leaking if tor goes down
- don't go against state actors, you will slip up somewhere
- don't trust VPNs, they aid state-actors and law-enforcement, through fear of prosecution
- VPN-over-Tor is not anonymous
- Tor-over-VPN hides Tor use from ISP, but bridges may work better
- only use
torbrowser
with default settings and extensions - do not resize
torbrowser
window