Is it okay to log in to my actual social media account via Tor?
If I log in to my account that includes my name, will my previously anonymous device now be associated with my account? What if I do the same in TailsOS?
A couple things will happen. Regardless of how you access tor (Tor browser bundle, tails, whonix, etc)
Your social media account will be associated as a Tor user.
Any cookies associated with the session, any browser fingerprinting, the browser, that you logged in via tor will now be tied to your social media identity. So if you look up a recipe for lemon meringue pie, and then in the same browser log into your social media account, even though it's via TOR, someone will be able to say this social media user looked up a recipe for lemon meringue pie
Many social media accounts, will flag the account as high risk now, and require you to do extensive verification of your identity. This is honestly a good thing, to prevent people from attacking your account
What you're describing, is very much like cutting out magazine letters, dropping a letter into the mail from a random city, and then in the letter identifying who you are with your full name and address. You can do it, but what's the point?
It's up to you, if this fits your threat model, the EFF has some good guides, privacy guides also have some good guides, you need to decide how you want to use the internet.
A lot of that depends on your architecture and how you use your systems.
Nothing will keep your activities separated if you do two things in the same session. Depending on your browser you could persist cookies across sessions, or browser plugins, or just a outdated version of whonix could be enough to link accounts
My objective is to make my actual personal identity not be traced across the web to the many accounts I have made on sites where I chose not to give any personal info.
If I open Facebook under my own name, then log into lemmy, I do not want my own identity to be linked with my lemmy account. I know I will be tracked if I do both in the same session or via my browsing history/cookies on the same browser. But what can I do to seperate the link between them?
Is using another browser/rebooting enough? Should I change my Tor connections? Or do I have to use TailsOS on a USB where I restart the PC before logging in to different accounts?
I want to know how much is just enough so my two accounts/identities don't get linked.
ok, let me restate - You want to use TWO social media services at the same time without them being linked to each other and yourself. Fair enough.
Some methods:
Qubes - Setup a VPN netvm, to a different VPN, for a VM tied to each social media account. This ensures your network paths, cookies, browsers never cross
SPN Is interesting, each site would have its own circuit, then you use independent browsers for each account. This is more experimental, but a interesting option, not as guaranteed as Qubes.
Run your own VMs, one per identity, with their own TOR connections, and their own VPNs on whatever computer you normally use (you could use the VMs for whonix or whatever); Just don't cross contaminate the TOR circuits
Whatever you do, only one account/identity per setup, never mix! Never re-use.
These types of setups are vulnerable to timing information (you turn on the computer and connect to the same 2 social media accounts at the same time, and turn off the computer and disconnect at the same time, every day for example)
That is such a problematic statement, depends on your threat model, how much effort they are willing to spend to identify you. Honestly, truly, read the EFF guides, and privacy guides to help you establish your threat models.
Any two online identities that use different, and consistent paths, without cross contamination will be sufficient for social media like having two facebook accounts so one for friends and family and one for your alternative lifestyle without cross contamination.
One more option I forgot to mention, if you're not really worried about your security, this is more of a nice to have:
Some VPN software like mullvad browser extension Will let you set site specific VPN exit points. So you could have multiple profiles of Firefox or even Chrome running, each with the browser extension, each specifying different VPN exit points. I wouldn't consider this high security, but for having two social media accounts coming from two IP addresses with separate browsers and separate cookies this will work
Under the hood, it just uses different socks proxy servers that known IP addresses, so you could set it up without using the extension, but the extension makes it really easy