Yeah, I don't get OPs idea from the vantage point of one company having data and metadata. MS metadata can be significantly cut. If you're currently in criminal operations, theres only Linux, heads/Tails, Proton/Tutanota, drive/7Z encryption, and KeePass. I think all my data and metadata should be distributed, spread thin, user where possible. Also, a rule that Tor or VPN/location can only be used on that login/service.
They use IE and Bing, when options abound.
Owen Davis
OP is a really retarded child. You'd better use Linux (Tails is better than Ubuntu.), Tor Browser, and DuckDuckGo.com.
Isaiah Perez
I have a question. After giving your information to these companies, what guarantees are there that they will actually delete it all? Certainly they won't go through their tape archives and delete information there. I am not saying this is bad advice. It's great advice to limit data through one service. I just want to know if it's acceptable to leave that info on those other sites but from here on forwards to only use service.
Austin Baker
You have to go back.
Brayden Wood
What a fool. Google trackers are everywhere. How do you hide from that on Internet Explorer?
Anthony Cooper
This. I have my public profile where I do nothing but career related stuff and a shit ton of emails and accounts for personal stuff.
Grayson Sanders
You failed Skype nailed it! That's not how it works. They just put it on a shitty server and let themselves get hacked 'in a legal way' then all they'll have to wait to is wait for it to be sold on the deepweb and voila, plausible deniability brought to us by the big bad onion. All companies round-robin their metadata like it's Silicon Valley shuffling employees and insider knowledge. Acceptance is the key. Data is mined because of its value. Round-robin data. Plausible deniability. Reasonable doubt. Rinse and repeat. T-mobile is about the cleanest you can get but I'm not sure about now. I hope the TTL trick still works. If you want no one having your personal info you have to get those tourist SIM chips or data plan but that depends if the store asked you or you paid on card like a sucker. If you don't live in Singapore or have similar WiFi laws, you should just aircrack or brute a private WiFi or just connect to a nearby public WiFi with your yagi and decrypt the firewall cryptorhythmic geography.
Oliver Stewart
You have to start with the programs you use. If you are truly serious you have to follow these. If you can't because of the nature of your job then there's no point. As far as I know the email side isn't going any better. Cock.li or other allegedly "anonymous" servers are infested with the glowers. I can recommend using Mailpile to manage your emails on PC but if you use webmail I suggest you use Tutanota.
Office programs like MS office suite have replacements on linux but bear in mind that these might give you a bit of a learning curve but they're usable and being used by scientists and engineers too! Gotta avoid getting your latest patent sent through or or eaten by malware or stolen by some spying M$ employee right? They use Unix (open source) or GNU operating systems.
Now if you're comfortable with the apps and have no violent reactions whatsoever then that's the time to transition into Linux or BSD. Get comfortable with it by doing the so-called distro hopping. Try out different flavors. Gnome, KDE, Ubuntu. Manjaro and Ubuntu is recommended for beginners.
At this point you should stop using M$ services including online ones. Not even skype! IE? are you Chinese? Microsoft email? Hotmail? Okay I suspect you're either a Jap or some old school windows XP guy. Association happens when you get into your "private mode" and then switch to "identity mode". Private mode is the "you that you don't want to be spied" Identity mode is "your public figure" The two will mix if you do access them simultaneously. 3rd party Cookies or Javascript, facebook.net or google syndication meant to carefully track you, FaceID for pictures or your Skype photoshots or even webcam, non-privacy respecting mail servers and malicious phones, They're all designed to build you a metadata profile, an online profile you can imagine as 'creepy and impossible' but it happens now and it's only a matter of implementation costs which is CHEAP considering the worth of what they're getting. Consider using browser with Umatrix and block 3rd party cookies. If you also use your "private mode" and "identity mode" with similar IP address with your name on the ISP registration that's also a vector for association especially since you live in the Land of Free.
Jayden Barnes
Use services that cost money. If you don't pay, what do you think why and how the services exist? Poorfags wanting/expecting everything to be free is part of what brought us here.
Julian Harris
Don't use social media, don't use google, yahoo, bing, get some addons, and block ip's like a madman