Zerochan was a honeypot made by some lulz tier redditor-tier crap (I no longer remember exactly though it's cringe like sjw).
might be confusing zerochan with something else but I don't recommend any of them.>>13399
you can use 'tor mode' on gnu icecat now though I don't trust icecat due to personal reasons and due to a poor experience with it.>>13409
careful now, don't expect VPN (not vnp) to hide your ass. VPNs are widely used for managing private networks of a company not for anonymity! in other words, it has nothing to do with 'privacy' but actually managed private networks where companies could keep logs and close look to what happens in or breaks in their networks.
you can however use VPN on top of a burner sim or a public/not your wifi.
if you're using it over your OWN network you're fucked for sure.
I heard a zenmate user who shitposted shota while on VPN got arrested and turns out the LEA had tracked him for so long and got all his VPN info the company just tossed it and to that anon's surprise it seems it had been going on for years (2 years until he got arrested or even earlier).
if it's really all about anonymity, you need to watch habits like:>never logging in social networks on anonymous network.>keep track of your fingerprints (DOM, cookies, LSO, canvas, webgl, frame)>never using unsafe device like a phone IF you're a complete n00b>never using proprietary drivers like GPU.
if possible, you should be using public wifi networks instead.
I know it sounds dumb but if you're let's say a wikileaks leaker and want to publish your freshly stolen private data whether "straight from that crooked politician's device by barging in their offices or homes", or "through remote exfiltration techniques" you should use public wifi though keep in mind avoid the security cameras of the city if you plan to 'commando' on a fucking coffee shop (there's an app that germans made for the camera thing).
it'd be completely harder to track some unknown guy using public wifi with a changeable MAC address at long range.
in summary,>wardrive with the trusty alfa network card>change MAC using a protected OS>connect to the public wifi otherwise crack'em at your own risk>use a protected browser - everything is the opposite. the caveat of every mainstream browser is they all have fingerprinting turned on by default>do your thing through a protected device at a protected place - anonymously>avoid social shit. they'll usually ask you for phone number at some point (like twitter or discord) and don't give your numbers away, use a burner. the phone number can be tracked through the CellID where it has been activated or where the sim was sold - they can extrapolate and triangulate you and it's only a matter of time so if you do use a burner, buy it from at least several miles away.
worst case is there's no public or any wifi available like a fucking desert, if that's the case, your only way of securing your anonymity would be using a burner internet sim though modems are not trustable.
wifi is almost available anywhere that most establishments have them for the glued-on-screen normies so it possibly won't ever be a problem.