1. Buy a used machine cash, with cash you got after purchasing something else cash (to avoid the money strips that track you). Make sure no surveillance cameras saw you or wear a hat and sunglasses. Do not use ATM money to buy your used system.
2. Never take that computer to your house, or bring it around your other devices like your cellphone. Use a lead lined bag if you need to.
3. Find a secure location to connect to the web with no security cameras, don't bring any of your other devices with you like your cell phone. Best if you go on foot to this location (to avoid RFID in you license plate), go inside a mall or parking garage (to avoid the government blimps that track your movement) and wear shoulder pads that are removable and walk with a different rhythm so you give off a different "fingerprint" to the surveillance blimps. If you can't go on foot, then park in a garage underground like a mall and then walk from there. You can also crawl through a sewer or other underground system, change your cloths underground then move on to your next location. Repeat on the way back.
3. Clean the HDD on the system by writing 0's to the HDD max number of times. Remove the wifi card if you can. Get an common external one that is capable of having its MAC address changed. Cover up the camera and microphone, or better yet, remove them.
4. Boot a very common OS off a flash drive or CD that was never in one of your other systems. Best if it goes to RAM and not written to the HDD.
5. Use an external WIFI dongle or one that you can change the mac address on. Change the MAC once your booted up.
6. Download Tor or use an OS that already has TOR built in.
7. Connect to public WiFi. you might want to sit in a location next door to the WiFi your connecting to.
8. Connect to Tor, browse. Never type normally on the keyboard like you do your home system. Type with one hand, preferably your non dominant hand, and randomly pace your rhythm when you type. Your typing rhythm can be tracked and is unique to you.
9. Never use any name, email, or alias you have ever used ever on that system. Never log into any social media of yours or any account you've head. Use only newly created fake accounts that will ONLY be used from this system. Same goes for passwords.
-------------------------
You can also just use snail mail to pass messages, avoiding cameras, and never get your finger prints on anything, use cut out letters from magazines, don't write, or print anything with a printer or computer. Use a return address that is not yours but is real. Make sure you didn't look up this address on google, use a phone book.
-------------------
Other methods you could use it pass messages in public spaces and then have someone pick it up and then post the message form their device. Kinda like a real world TOR space where everyone picks up others real messages, and then posts if for them to the appropriate place online.
------------
Setting up some kinda lazer or mirror system using Morris code that transferred messages across real space and then had another user input them online for you.
Attached: 7aa15f63238ccd7ff67008c14a26fa8712269a418bc8c18e80cc715da60731c6.png (640x610, 29.69K)