Listen to what Stallman recommends.
Building a very anonymous machine
use qubes for one, second if you want open hardware youre going to have to cross out a few ideas to get things working since you have to use ARM these days for floss hardware, check out the pinebook for example.
third, an anonymous machine is ideally set up in an internet cafe. you could also become your own isp in order to mess with cia niggers trying to find where you are and not knowing where you're based out of.
also, you'll want to browse the web by fetching web pages and viewing the html by itself. this makes the website unable to take browser information and track you by anything other than ip and request time.
on request times, the easiest way anyone on tor is found is when the cia niggers control both the entry and exit node, which in a lot of the cases they do, and they have close enough packet sizes and timestamps, the cia niggers can be relatively sure of the origin of the signal. for example a connection at 05:35 of 20.2mb was made from node A owned by nsa and a request of 20.2mb was made at 05:35 at node B owned by nsa. the nsa now knows your ip downloaded 20.2mb of data. so this is why you need to anonymize yourself by connecting through internet cafes and connecting through vpns that arent bought in your name and also using a fuckton of proxies.
keep your browser up to date or very obscure. i like to use lynx browser because all it is able to do is request html documents. no js, no video no pictures just html. put behind tor, a few proxies, a vpn and an internet cafe and some open hardware running a disposable vm using opsec methodology and you'll always be anonymous. at least as far as i know.
Did that pic work?
KILL YOURSELF
just buy a cheap ass laptop, remove the hdd, use a liveUSB with tails/heads and never connect to your personal network with it ever
Different scrub.
Currently using tails at home and have a few questions.
If I decide to go out to some other place for wifi would I be re-anonymized despite using tails at home? I'd be going without things that could track me.
If I am re-anonymized would using the unsafe browser to login compromise my anonymity?
I have no open source hardware. is that a big deal?
If there's no public wifi how would i get in with tails?(not a priority question)
How much of a fucking idiot are you?
google is collecting data off a Tor IP, and you can use temp profiles that delete any stored data when you shut them down.
And even if that's not your cup of tea:
This is why you configure it and save as a template, which you can upload to git and have others fine tune if they're interested in what you're doing.
If configuring stuff is an issue for you, what the fuck are you actually asking?
unless there's a critical update and you get MiTM'd before you even realize
are...are you for real?
I'm a fucking scrub and even I know the difference in a wifi MitM and having to fucking splice cables together is orders of magnitude in terms of difficulty.
This is also my concern with Whonix. You are able to modify the system (indeed, pretty much told to by the docs).
It worries me that a Whonix install is basically a work in progress, ready for an adventurous/naive user to screw up.
Tails gets this right - install and don't fuck around with it.