Pine thoughts:1. Using a laptop (they are super cheap nowadays and more than powerful enough) you bought with *cash* is a good idea.2. Loading your data onto a microSD is a good idea. Very easy to hide such a thing. Use your imagination. Running an OS from a microSD or a USB (apart from 1.0) won't be a problem at all, just get a decent one with decent speed (they have different up/down data transfer speeds depending on what you pay).3. If you take out the battery and run from power source, and you have your OS running in RAM e.g. live-usb, then there is literally zero evidence unless a SWAT team to freeze your RAM stick. Highly unlikely, it's a specialized operation. If somebody suddenly comes up behind you, simply moving the laptop 1/4 inch wipes everything. You could put all your stuff online in the cloud encrypted to the nth degree and download it onto an encrypted volume USB/microSD each time you use the laptop. Probably not necessary though unless you live in a totalitarian country which puts you in prison for not handing over your passphrase. Just encrypt it on the cloud or your USB/microSD.4. Buying hardware or software on SR is a dumb idea and it ALWAYS will be. Don't go down this path. Every time I hear about this being proposed it's such a WTF moment for me. Yes I'm looking at you "eddiethegun" and any others like you. What are you even thinking? Trustmeabsolutely.com in here.5. A bridge is used in a similar way to a proxy when you don't want your ISP or others doing preliminary traffic analysis (the list of Tor entry guards is public, so if you have traffic going to those IP addresses then your ISP knows you're using Tor) and then knowing that you're using the Tor network. Getting a public bridge is easy and probably everybody should get a public or private bridge. Obtain one and then hop to Tor -> Settings -> Tick "My ISP blocks connections to the Tor network." -> Add Bridges. Like somebody else said, you can make your own private bridge.6. Using a VPN is a good idea if you want all your regular internet traffic encrypted and can serve a similar purpose to the use of bridges to prevent people knowing you're using Tor. Deep Packet Inspection is defeated by a VPN unless they are working with LE. This is why all Bittorent users should be using them. VPNs don't exist to make you anonymous, this is a misconception, they exist to provide data privacy between two points, data from your computer to the VPN's servers is fully encrypted, which can be a useful thing if you're searching for "silk road" on filternet (you don't search for silk road on the regular web do you...? It's a no-no...). But don't pay with credit card obviously.7. Don't use a traceable payment method for your internet access. If you can't help this, then you need to invest in learning some of the above techniques. If the LE agents trace communications to your real IP, although damning, it's not evidence of anything. So if you had adopted the 'live laptop' approach, there's not much they could do (unless you regularly have kilos of weed and coke deposited about your dwelling, I mean WTF people! Why does this always happen! Why am I always reading about these guys?!)8. Ultimately everything just mentioned is icing on the cake. Nice-to-haves. Your threat model should determine how paranoid you are. Use Tor, use PGP, use your common sense and don't tell people you're from Ontario Canada like a guy just did in another thread.9. Buy bitcoins using OTC methods. Then launder them to boot. Major pain in the butt for LE. Do it. It's like putting a needle in a skyscraper made out of haystacks in Haystack City.