>>/29891/
Not sure if you could easily do this but the best opsec would be to run a 'burner laptop' (laptop with no personal info/never used for anything personal) with Linux installed, connected to a VPN network, then run another OS on a virtual machine that you can route through the Tor network, isolating any internet traffic from the virtual machine from the host burner laptop. This way it's near impossible to trace anything.

Although to be fair I do believe this is a bit overkill unless you are actually engaging in some sort of high risk illegal activity. I prefer using an old burner laptop with a VPN and if it was ever hacked there is no personal data or online account information to steal from it.