How to run your blog anonymously?
Earlier, we discussed in detail how important it is to change your IP in order to be anonymous, what is a distributed Tor network and what are VPN services, and now let's talk about how to create and maintain an anonymous blog.
What should I pay attention to?
It is important to anonymize the entire process of creating a blog, starting with its registration:
before creating an anonymous blog, be sure to register a new email address on a free online mail service that does not require your phone number from you. Gmail.com, mail.yandex.ru - they'll fit perfectly.
Register a mailbox anonymously using Tor and never use this mail service anonymously without Tor. Be careful, as it is very easy to accidentally declassify yourself. It is enough to enter this mailbox without anonymization, and the mail server will record your real IP address. In no case do not use your main email address to work with the blog;
use one of the free platforms to create your blog. Platform wordpress.com it will fit perfectly. On this platform you can create your blog for free. And this will only require an email address. No one will ask for your passport details, phone number or other personal information. And all this is available for free. Moreover, do not buy a domain name and do not use paid hosting, since at the same time you will have to use a bank card, and knowing your bank card details, it will not be difficult to find you;
create a blog only using Tor with the “Torbutton" button enabled or with VPN enabled. Never visit your blog anonymously, run it only through Tor or VPN;
do not use your real last name and first name for blogging;
ideally, it is better to blog via Tor or VPN not from home, but from an Internet cafe. But it makes sense to do this only if there are no CCTV cameras in the Internet cafe. Don't forget to enable Tor or VPN in this case as well;
change your presentation style, don't get caught up in linguistic analysis. I already wrote about this in the article: "Tor browser: be completely anonymous and encrypt all transmitted information" in the last section about possible errors.