Anonymity

No matter how much information I provide you with, someone's going to claim that my methods are flawed. That said, I've done several things which should've raised the eyebrows of cyber cops, and have yet to be found. A. Get a PAID VPN. If they aren't selling you a product, the product they're selling is you. There's a certain free VPN that claims to not keep logs. Well, it's a fucking lie. Sorry. I can't remember the site that says it, but just apply that to every free VPN out there. They all keep logs. On the other hand, SOME paid VPNs don't logs. BTGuard is a great example. If they kept logs, they would have to hand them over

No matter how much information I provide you with, someone's going to claim that my methods are flawed. That said, I've done several things which should've raised the eyebrows of cyber cops, and have yet to be found.

A. Get a PAID VPN.

If they aren't selling you a product, the product they're selling is you. There's a certain free VPN that claims to not keep logs. Well, it's a fucking lie. Sorry. I can't remember the site that says it, but just apply that to every free VPN out there. They all keep logs. On the other hand, SOME paid VPNs don't logs. BTGuard is a great example. If they kept logs, they would have to hand them over to authorities when requested. Since they don't, they have no logs to incriminate you with.

B. Run a few proxies. This is self explanatory. If you don't know how to run proxies then Google it.

C. Get Tor or i2p

Tor is a browser that protects your anonymity and allows you to access "hidden services". You can find it at www.tor-project.org. You might see some infographics stating that there are different levels of the internet and that near the bottom, the location of Atlantis can be found. As you might imagine, this is all bullshit. While I don't know very much about i2p as I don't use it, it's supposedly everything that Tor should be. It probably is, but I haven't tested it out as I'm satisfied with the Tor browser.

D. Other various tips...

Encrypt everything. Get wireless internet access from an external device. Run your computer(s) through encrypted external hard drives or throwaway flash drives, preferably a large Micro SD card that plugs into a USB reader so that in a worst case scenario you can swallow it.