Hacker
Use a secure operating system
Using a secure operating system is essential for protecting your identity while engaging in high-risk activities like hacking.
The Best Desktop Operating Systems for High-Risk IndividualsAlways use Tor
Only use Tor when connecting to the internet to protect your identity.
Navigating the Web Anonymously: A Guide to Tor BasicsStrict compartmentalization
Never use any personal accounts/devices that could link you to your hacking activities.