My goal is to build a perfect stationary workstation from which I can work anonymously.
Most instructions on being anonymous usually involve, at some point, moving around and switching from coffee shop to coffee shop. Is there any way around this?
Currently, my best-possible imagined setup involves tails OS plugged into an android device (anonymous second-hand cash purchase, no cameras) with a pre-paid 3g SIM (anonymous second-hand cash purchase, no cameras) and then everything goes through Tor (because Tails). But I expect that all ISPs are geolocating (via cell towers?) all cellular devices all of the time and storing this data, timestamped, alongside the device ID/SIM numbers and the IP they are allocated.
So if Tor can be compromised via some malicious third party with government-sized resources, perhaps by them owning significant numbers of entry and exit nodes which I unfortunately use simultaniously, allowing them to link end-to-end the original 3g IP with my web activity, then this malicious third party could then query my ISP for the geolocation data associated with the relevant IP address at that specific time and find out where I was.
Over time, they could profile my location and look for patterns. In the case of a stationary workstation, my cover is blown. In the case of a going to a new coffee shop every day, in the case that this malicious third-party has live monitoring of the TOR network and can instantly query the ISP in question, then the could litterally watch you as you work, totally destroying all anonymity.
Now, I am split on whether or not I believe a malicious third party has compromised Tor as such. On one hand, it seems quite doable, many research papers point to entry/exit vulnerabilities, and we have the recently pulled conference talk. On the other hand, Schiener, Snowden, and others still recommend Tails/Tor as sufficient to protect anonymity, and surely they know better than I. But it would be prudent to act in a manner, if possible, which allows me to be wrong without reprocussions.
What is the ideal anonymous workstation setup?