>>106371341
>>Remove all Internet capabilities from home
wont raise any flags, theres still a few greatest gen fags who don't have internet. also ghetto scum niggers who dont pay for wifi and do everything over LTE
>dumbphone, only turn it on for calls
would stick out like a sore thumb as a burner/criminal phone, and they'd be very interested in visiting the location of said calls.
>public library computer
solid if your threat model doesn't include some pimply white nerd keylogging you. Bring your own keyboard if you're paranoid.
Try to blend in, look (dress,act,etc) like a 70 iq mountain man who doesn't have a PC at home, not some hopped up mr robot lookalike.
>tails on public hotspots
don't get caught on camera, randomize your MAC address. don't do it on a schedule, vary the locations and times.
>scrub all metadata
>disk encryption
>offline browsing of downloaded internet shit
solid stuff you should be doing already, just don't fuck it up. automate it as much as possible so you don't leak anything.

whatever illegal shit you're trying to do, stop immediately and read some fuckin articles and watch some defcon talks about tor users getting caught.
git gud or you'll git got.