id570 As already stated, your plan will not work. You will have to put a VPN on the device you are interacting with the internet from in order to receive the benefits from it.
A word on VPN's, they do not make you anonymous, they offer privacy and security. For a VPN to be anonymous you would need the following: a VPN account that is set up anonymously (it was given an alias name (if required), an alias email (that was created anonymously), and the VPN must be funded anonymously. EVEN IF you do these things, you must understand that the VPN provider can still see your public IP address from wherever you are connecting from, so to make it truly anonymous, you would need to use an internet source that is anonymous (anonymously setup home network, mobile hotspot, or public wifi). With VPN's you are trading trust from your ISP to the VPN provider. I think they are great tools and are definitely better than nothing, but people need to understand the limitations of the technology and choose their VPN provider very carefully.
For your threat model, I recommend you use Tor (torproject.org). Your exact user case is one of the main reasons the Tor Project endorses their network. It is decentralized, encrypyted internet. It is the best privacy tool that is available to civilians. There are still limitations and ways to be de-anonymized while using Tor, so please do your research on the literature. Also know, that if you are the only one using Tor on the sites you are connecting to that it does make you stand out. Additionally, the ISP will see that you are using Tor, Tor has thought of this and has implemented bridges and pluggable transports to help obscure the fact that you are using Tor. Please go on their site and read their literature: https://tb-manual.torproject.org/about/ and https://support.torproject.org/
Your threat model my also warrant you using Tails (tails.net). Tails ships with Tor Browser and is (arguably) the easiest way to use Tor since it is already setup and installed; you also gain all of the added benefits of Tails. Please research their literature as well.
Know to that anytime you use a hotspot or cell phone (with a SIM), you are connecting to cell towers. Even if your setup is perfectly anonymous in everyway, you are still being tracked by the mobile network. Understand that means it's pinging your location as you mnove around from day to day AND WHERE YOU SLEEP. Take this into consideration and know when you should cut cell tower connection to avoid burning your location in sensitive locations.
There are tons of other considerations, please make sure you take the time to research, understand the limitations of the technology you are using, and create a plan on how you are going to manage your OPSEC. I don't know where you live, but in certain places in this world under certain governments your OPSEC is nothing to take lightly. Know too, that even with good OPSEC, if you are being targeted by a government and it's unending resources, there is always a risk.
Understand that intelligence gathering and tracking comes in many different ways, not just related to your online presence. Physical surveillance, Financial surveillace, Vehicle movement with ALPRs, CCTV, Self registration of services (when you sign up for things), Talking too much, Tip offs, Cross platform tracking via multiple online accounts, all the way down to the analysis of language (linking multiple accounts by your style of writing), etc and so on.
Some tools I recommend you research and possibly implement:
- Secure e2ee messaging app: https://www.signal.org/
- Privacy focused OS for sensitive tasks: tails.net
- Mobile service that does not require ID verification: Mint Mobile
- VPN: ProtonVPN
- Password Manager: keepassxc.org
- VOIP numbers: mysudo (may not be available in your country), look for other VOIP providers that are.
- Protonmail (UNDERSTAND THE LIMITATIONS OF EMAIL, AND HOW TO USE IT), Proton can be forced under law to release email information, but it is still light years better than gmail or some spyware equivalent
- Daily driver computer OS (linux): Pop!_Os https://pop.system76.com/ (ships with full disk encryption)
- Alias email forwarding: simplelogin.io
- GrapheneOS (obviously)
- Kleopatra (pgp encryption for files and communication): Ships with Tails OS listed above
- Yubico yubikey (2FA): https://www.yubico.com/
"surveillance self defense" (electronic frontier foundation): Read their guides.
https://ssd.eff.org/
"digital security guides" (Tor Project):
https://community.torproject.org/training/digital-security-guides/
"digital safety kit" (committee to protect journalists):
https://cpj.org/2019/07/digital-safety-kit-journalists/
Encrypt everthing and do not use biometrics to unlock devices. I've only scratched the surface.
If you have any questions,
cheers.