Was not expecting this many replies - thanks everybody for the useful information. I will now address your responses.
First, as a general point, I am not doing anything that should or would attract the attention of the police, NSA, or FBI. I'm actually just a computer science student who is interested in privacy. The most "edgy" thing I do online is lurking various chans. I just feel like the knowledge of remaining anonymous is something important and inherently powerful to have in our contemporary Big Brother society.
...load up TAILS on usb, spoof youre MAC maybe and your good..plus dont sign in your email or social media with the same proxy you use to do something illegal ( that should go without saying), and dont ever post or say anything that can later be traced to you..
I think this is all well said. Running TAILS off USB is something I was a little sketched out about seeing as they found some pretty major security breaches since their most recent update, but I agree with you that it's overall the safest OS to run.
As far as the debate between you and the other member about spoofing the MAC address, I agree with you. Spoofing the MAC address isn't exactly top-notch high speed security, but it should definitely be part of the equation. What the user "2460h1" is failing to recognize is that, in the case of some kind of investigation, raid, getting V&, or whatever, the MAC address of your computer is going to be otherwise identified by any router it touches - including the one you're using. So spoofing shouldn't be a mainline defense, but definitely helps.
I would just add 3 things to dotszilla's response: noscript, https everywhere, and make sure your box is completely clean.
Again, a valid point, although I don't know if there really is such a thing as "completely clean." I've actually never heard of noscript until I got onto this website, so thanks for sharing.
Art if Anonymity is stickied, that's the best there is.
Yes, I plan on reading this. Thank you.
Remember that each harware is unique and thus using any pc/laptop is identifying...
I'm kind of curious how true this. Supposing someone went online and theoretically browsed a webpage, I don't think any identifiable hardware would potentially be identifable besides the MAC address and possibly the screen resolution as available via the user agent.
...Otherwise tor+not all add ons since having lots of addons on a tor browser is done, since if one is compromised u are basically fucked (law enforcement).
I've actually never used or downloaded TOR. I always felt like the amount of faith people put in TOR alone is ridiculious, but you do make a good point.
if you load TAILS on a usbdrive you dont have to worry about that, since TAILS makes it really hard to save anything to the HD... so there wont be anything to clean..
That's actually not totally true, and is one of the things that was one of the security details upgraded in the newest version of TAILS. I don't want to get into specifics, but there are other areas where datagrams are saved besides the ones manually deleted by the distro - not including the fact that older versions of the distro have demonstrably failed in cleaning what they said they would.
TAILS doesn't save to hd, but the unlikely instance of BIOS malware or hardware bugs can't be stopped by TAILS.
This is also true.
If you've already made enough noise as to have attracted the feds, or worse, the NSA, then its too late for anonymity.
Like I said, I would be absolutely shocked if my behavior is enough to warrant any attention from anybody, especially considering what kinds of stupid / screwed up / patently illegal things people post up and / or admit to on some of the forums I've visited. I'm not up to anything crazy.
I would definitely start with booting a live distro, TAILS being the most efficient (most likely) as it has been designed from the ground up for privacy and anonymity. Next you'll need to configure how you will connect to the outside world. In this case since we're paranoid, so hop in the car and drive a few hours to a large metropolitan city (if you already live in one, then you might have to drive farther to find another.) Once youve found a suitable city, purchase a prepaid creditcard with *cash.* Before heading back home, find an open wifi network, or better yet hack an encrypted network (WEP is easy, WPA(2) with WPS would be a better choice.) Once your connected to the internet (while booted into TAILS) rent a server, use fake name, address etc and pay with your prepaid creditcard. Make sure your server is located offshore, in a privacy friendly country like iceland, denmark, france or switzerland. Configure a VPN server and TOR on your new box. Now you can go home.
Thank you for taking the original question seriously. This is probably the best post so far.
On this note, I've never actually configured a VPN. A lot of people seem to think that they're like the greatest thing since sliced bread, but it stands to reason that it leaves more of a trail than the security it provides is worth.
Now you'll need to purchase a prepaid burner simcard and mobile hotspot, probably would have been a better idea to purchase that before you came home... thats not your fault though, your new to this so I'll let you off on that one. Immediately once connected to your new hotspot, connect to your vpn and then out from your vpn through tor, to the internet.
Once on the web,
NEVER use your real name for anything
NEVER tell personal stories or the like.. no matter how arbitrary and generic you think they are.
ALWAYS spread disinformation, make a back story for your alter ego and stick with it.
NEVER order anything to your home address
NEVER communicate to personal friends or family while using your anonymous connection
ALWAYS disable javascript
NEVER install flash, or JAVA browser plugins
and lastly (because im getting tired)
ALWAYS use tor browser (as opposed to a common browser set to use tor as a proxy) this is because tor browser emits the same fingerprint no matter what device its installed on so every tor user using a vanilla copy of tor will all give the same fingerprint. browser fingerprinting has shown to be pretty accurate and it seems the more you do to try and avoid this the more unique your fingerprint becomes in most cases (i could go into detail but browser fingerprinting is beyond the scope of this rant, but i suggest anyone that isnt familiar to read about it.)
Excellent post and well stated.
To truly gain anonymity one will have to make sure that one can trust every single shackle in the chain.
This is simply not possible with untrusted hardware/software and infra.
Again, outstanding point. Hence the reason I'm hesitant in respect to VPNs. Especially a service you're paying for.
Thanks everybody for their feedback. I'd like to see this conversation continue, particularly as it pertains to VPNs.