Yes, you can be anonymous online. At least under the right conditions, but it is not necessarily easy. Your everyday identity is constantly being tracked by accounts you are logged in and third-party advertising companies hope to better target ads. This means that your favorite browser is usually full of trackers to keep tabs on what you do online.
Plus, who knows what happens to your ISP, passive (or active) government fundraiser and any other interlopers? The reason is that you must take conscious steps to ensure anonymous online anonymity.
As said, if all you want is an anonymous email account that nobody in your professional or home life knows, it's not that difficult. Still, everything needed to log in to your email account is required before securing your connection or accessing your non-anonymous identity at the wrong time, and your identity may be revealed.
This tutorial will go through you The necessary steps, and depending on how far you want to take it, you can either use all the advice within or collect it for only the parts you need. We explain why each step is necessary to help you steer your decisions.
Step 1: Get An Anonymous Workspace
The best thing you can do if you want to be really anonymous is to have a separate digital work space that is used only for your secret identity. In this way there is no risk of crossing between your daily accountant and your anonymous whistleblowing / Mr. Robotic Identity.
If you just created an account with a regular web browser on your everyday machine, there will only be someone who noses around your computer and oops! where your anonymity goes.
Here are some options.
Level 1: Install the TOR browser on a USB flash drive. If your inputs are quite low (that is, if your account is detected it is not the end of the world) then TOR of a USB device can be all you need. The TOR browser is a version of Firefox that connects to the onion router (TOR) network. This system sends your internet connection through several nodes (computers) before you sit on the open internet. When using TOR, your real IP address is hidden. In addition, the TOR browser saves your browsing history by default and keeps your business secret. To keep TOR as safe as possible check out Tor Project's tips on what to do to be as safe and private as possible online.
Level 2: More advanced users can run an entire operating system, e.g. the private protective Linux distribution. This is like having a completely separate computer without having a second physical device. Again, it is about putting a firewall between your actual identity and your anonymous account.
Level 3: If you are ultra-paranoid or find out, it means that it is not a life-threatening separate laptop that is only used for your secret identity. It is preferable to pay for your device in cash or with a shredded visa card to avoid the laptop being returned to your office building persona. The laptop should run a variant of Linux that is encrypted, but if you have to use Windows 10, you must activate your machine with a local account, turn off all possible tracking methods during installation and do not use Cortana. Do not install unnecessary software on this device and do not log into accounts from your regular life no matter what. The idea is to get as little extra information about this laptop as possible. Extra applications and mixing of your anonymous life with your actual life are great "no-nos". Don't forget to put some tape or paper over your webcam. It's ultraparanoid, but Mark Zuckerberg also does.
Step 2: Location, Location, Location
You never want to access your secret identity from home or work. This is just a bad idea because there is a chance to reveal an Internet Protocol (IP) address that can be traced back to you. Again, it would have to take a rather advanced sleuthing to find this, but part of being anonymous is that no one knows where you really are. Keep your anonymous activities to a local coffee shop, library or anywhere else that offers public Wi-Fi. If you are really paranoid, it is probably also a good idea to choose somewhere that is not so close to your everyday places.
For the superparanoid: Another important note is that other devices you use can also give you away. To keep things as separate as possible leave your phone at home, or turn it off and, if you can, remove the battery.
Step 3: Use TOR or a VPN (but not really)  Once you have a place that is not your home or work, from where you are going to make your shady email, it is time to connect to the internet . But wait! Before you do, you must either use the TOR network or a high quality VPN.
If you are already using the TOR browser via a USB thumb drive, skip this section because you already do so. For everyone else, we still recommend that you use TOR and not a VPN, because the TOR network's beauty is that you don't have to trust anyone. TOR works by running your encrypted connection through multiple servers before you release on the open network. That way, it is much harder to track you back to your real place, and only the last server that lets you out on the net really has a shot when you are spying on your activities, which prevents unexpected exploits, that is,