I read something somewhere sometime and want some clarification.
What information can get traced back to you after a successful / unsuccessful attack? After a quick brainstorm I thought of the following:
I currently spoof my MAC, and use PIA to mask both IPs and DNS (confirmed by dnsleak.com). In addition I will use proxychains if I really want even more protection.
Am I missing anything?