@TrevorGoodchild @Nickger Tor is preferable to a VPN; connecting to the VPN yields your IP to the VPN operator (if you can mitigate this by using an IP not traceable to you, this removes most of this objection), and unless you have paid for it untraceably (Monero or similar), the VPN operator has all of your doxx
if you're doing this on Twitter, better have used a burner phone (also paid for untraceably) or some other number to get past their "you must have a phone" identification scheme
if you can use a Unix, do so
redefine your expectations; learn to bear "unbearable slowness" and brokenness, "fast" and "convenient" are for honeytraps, the life of the online dissident is a maze of broken Javascript libraries, CloudFlare CAPTCHAs and frustratingly slow privacy gauntlets
part of this is a question of how effective you expect to be; if you're the usual person, you'll be an anklebiting annoyance to these people, and little more
(no shame in this; so am I)
therefore, your threat model tops out at "can they pick up your identity using a couple of automated tools, or smallish amounts of free semi-retarded antifa drug-addict labor"; if the answer is "yes", you have a hard time coming, but if it's "no", they're going to forget about you and just accumulate info until they find a fact they can use to nail your identity
if you get "hot", though - let's say you create the ur-meme which really pisses off the jews - they will burn more resources to find you, and at certain levels of resource burn, you cannot remain hidden at all
I've created several infographics to get your head in the right space for anonymity purposes (picsrel), and it's worth reading them to get a sense of how to think about such things