MalterMhite What if my device is ,always routed through TOR via Orbot?
If your traffic is routed through Tor for sites you are logged into with a personal email/phone number/ID, your activities can be linked to that information. If you ever logged into a service with your real IP address and later use Tor to login, your activities can be linked to your real IP address.
MalterMhite What if i always use snowflake Bridges?
Than the isp does not know i am using tor right? Or could the isp still know that i am using tor because even if the first hop is not an official tor node, the traffic is still tor traffic?
The default Tor bridges are public knowledge and can easily be identified as Tor traffic. The only exception is meek-azure which routes your traffic through Microsoft, so at face value anyone monitoring your internet traffic will just see you are connecting to Microsoft servers. However, a determined adversary could uncover that it is Tor traffic via deep packet inspection.
You have to step back and realistically ask yourself: "Who am I protecting myself from?"
MalterMhite What is this with the tor exit nodes about you are talking about?
How could they "mess" with me if i always route all traffic through tor on my device?
Exit nodes do not know who the user is, but they can see "some Tor users are visiting so and so websites." This only applies to clear net sites as your traffic has to leave the Tor network at the exit node to communicate with the website, although .onion sites are unaffected as traffic never leaves the Tor network; so there is no exit node over the dark net.
The problem is that some exit nodes log which websites are being visited and if the guard node and the exit node are run by the same adversary, they can potentially connect your IP address to the clear net sites you visit over Tor, which can de-anonymize your activities.