Most of the time they'll probably get you via a browser exploit anyway, so whonix or tails...doesn't matter. I said VPN first then Tor then another VPN. If you go straight to Tor, your ISP can easily see who connected at what time in whichever area. Anyway, this stuff should only be a concern for the more serious cyber criminals.
Thumbs up.
Best type of email address to use for online orders?
Proton is good, but still has your emails in its server and they WILL give them up if a law enforcement agency sends an official request. Tor is not optimal because the exit node can be compromised. Use a no log vpn that can be purchased by anonymous means with no trail back to you or your ip...
thinksteroids.com