...
How do you cope with your internet footprint?
It's easy faggot. "Delete" yourself and start using Tor Browser/tor+links for everything. I don't even have an email nor the phone and can function properly.
Why? You all are on the list anyway, because you are here. Now fuck off to /g/, goyim.
Why is that please elaborate. It is not nice to make such a claim and but then not explaining the reasons behind your reasoning.
Step zero: don't immediately seek most severe measures.
Don't search for Tails from Chrome on Windows 10 on a modern laptop.
1. Download Firefox.
2. Download a GNU/Linux distro.
3. From the GNU distro, download Tor.
4. Via Tor, order safe hardware.
5. From Tor on GNU from safe hardware, you are now free to educate yourself more fully.
That's the worst
I remember a website that you could input your email or a username and it would show all the websites with accounts created with them, but I forgot the name
In fact, do steps 1-3 from an internet cafe, if such institutions even still exist in the land of the free.
By definition, nothing.
The only way that piece of advice was harmful was the suggestion that using Tor for deanonymized purposes is somehow dangerous. As long as you remember to erase the circuits before site reuse, it's fine. Using Tor will be linked to your real identity anyway; in fact, you become marginally safer by using the proverbial facebookcorewwwi and thus implying that you only use it for social bullshit.
This is a horrible decision. While it may be possible to spoof the Tor Browser footprint perfectly in console, using Tor with Links basically serves yourself on a platter.
-be sure that you don't have the same pseudonym for your accounts same thing for you email addresses.
-be sure the generate a random password with dices and a truth alphabet (with special characters that can permute on the first throw).
-never use a computer to generate passwords, always use pen papers and burn the notes if you have any.
-Always use a different password for each account.
-To get away from the botnet you need to use a endorsed FSF distro, its not as good as gentoo like distributions but you get a whole new aspect of how the computer world is fucked up, you can see Trisquel or parabola if you want.
-For internet navigation there's only the Tor browser available today to be anonymous
-For email hosting it's VERY complicated (thank to very simple protocols that were made in a time were you didn't need to hide from spooks) either you can setup your own server on the Tor network or you need to find a webmail that doesn't block Tor and doesn't ask mandatory JS. You also need to use GPG for email encryption but be aware that even tho you benefit from that encryption you also become more likely to be traceable (except in the gnunet network that it's still now working right now).
-If you don't use tor and use a normal browser, you can use Icecat if you use a gnu/linux configuration, if you still use MS and god I hope you don't it's Firefox and you'll need to edit lots of thing in the about:config. You'll also need to learn how to use the browser firewall "umatrix" and configure it in whitelist mode (block everything enable what you need).
Delete all posts from platforms which allow you to do that, even if they don't get deleted on the backend it will protect you from scraping and casual web searching. Stop using cutesy aliases and handles which you have cultivated. Get a new email address from a provider like sdf.org rather than a botnet ad company. Stop using Twitter and Facebook and Google and Youtube entirely (block them on your router). Start doing all your browsing over Tor except banking and such (MITM over Tor is possible).
Nobody is forcing you to do any of this botnet shit, you're doing it to yourself.
While this is perfectly sound advice (I own a d10 dice for this very purpose), does it really make sense with regard to typical websites? Every single website should always be assumed to keep your password in plaintext anyway. Choosing a strong password is only really necessary with respect to personal device encryption; casual remote bruteforcing will be blocked by the site in question on the network level, and the government will simply ask for your data directly.