Get a burner device
Get a burner laptop and phone by buying it using bit coins.
Setup an Email Account using Proton
Proton email is an end-to-end encryption.
Install Tails Linux OS
The Amnesic Incognito Live System is Debian based Linux that is used to preserve privacy and anonymity as an Operating System.
Virtual Private Network (VPN)
Setup a Virtual Private Network (VPN) which is used to establish a protected network connection when using a public network. VPN’s traffic is encrypted, and the network is virtual which makes it difficult for anyone to sniff your network connection
Proxy Server
A proxy is a server application that acts as an intermediary between a client requesting a resource and going to the Internet. It acts like a bodyguard and is used for caching.
TOR Browser
The Onion Router provides extra layers to your traffic like an onion. This tool is used for anonymous web browsing.
DuckDuckGo
DDG is an internet search engine that emphasizes protecting user’s privacy
Hide my IP and Hide my MAC
Spoofed your IP and MAC address so no one knows where your original location is established.
Private Browsing and Incognito Mode
Some web browsers use to disguise and add extra layer of privacy when surfing the Internet.
Public Wi-Fi
Use public Wi-Fi when connecting to the Internet instead of using your work and home ISP.
Encrypt
Use BitLocker or some form of encryption tool to cipher your data.
Heidi Eraser
Use Heidi Eraser to erase all your data by using Gutmann 35 passes or DoD 7 passes.
Degauss, Destroy, Shredd or Pulverize your Hard Drive
Use magnet or destroy your hard drive if you want no evidence.
Common Sense
Warning! There is no such thing as 100 percent anonymity when using digital or electronic connection so if you want to commit crimes using these methods there still a way you can get caught so do not be stupid!!!!!!