How to cover your tracks online and digitally

Get a burner device
Get a burner laptop and phone by buying it using bit coins.

Setup an Email Account using Proton

Proton email is an end-to-end encryption.

Install Tails Linux OS

The Amnesic Incognito Live System is Debian based Linux that is used to preserve privacy and anonymity as an Operating System.

Virtual Private Network (VPN)

Setup a Virtual Private Network (VPN) which is used to establish a protected network connection when using a public network. VPN’s traffic is encrypted, and the network is virtual which makes it difficult for anyone to sniff your network connection

Proxy Server

A proxy is a server application that acts as an intermediary between a client requesting a resource and going to the Internet. It acts like a bodyguard and is used for caching.

TOR Browser

The Onion Router provides extra layers to your traffic like an onion. This tool is used for anonymous web browsing.


DDG is an internet search engine that emphasizes protecting user’s privacy

Hide my IP and Hide my MAC

Spoofed your IP and MAC address so no one knows where your original location is established.

Private Browsing and Incognito Mode

Some web browsers use to disguise and add extra layer of privacy when surfing the Internet.

Public Wi-Fi

Use public Wi-Fi when connecting to the Internet instead of using your work and home ISP.


Use BitLocker or some form of encryption tool to cipher your data.

Heidi Eraser

Use Heidi Eraser to erase all your data by using Gutmann 35 passes or DoD 7 passes.

Degauss, Destroy, Shredd or Pulverize your Hard Drive

Use magnet or destroy your hard drive if you want no evidence.

Common Sense

Warning! There is no such thing as 100 percent anonymity when using digital or electronic connection so if you want to commit crimes using these methods there still a way you can get caught so do not be stupid!!!!!!