>Secure tor usage and configuration,In general you want to break "the rules" of the tor project as little as possible / not at all unless you have a valid reason for it. That being said, there's many cases where using tor or a VPN isn't going to help you.
>torrentingYou cannot torrent over tor. I use a VPN service - Private Internet Access - that supplies a proxy, and proxy my torrents through there. Another thing to watch out for is any VPNs which don't give you a dedicated IP address won't be accepted on many private trackers (laintracker is one exception, apollo is not).
>javascriptI don't think tor browser disables javascript by default or not, but you have to turn on noscript to get that to work. Fortunately, noscript comes preinstalled on tor. tor can be deanonymized with javascript, so you should use js as little as possible.
>openWRT routerThere exists firmware software for routers that allows you to torrify all internet access:
https://openwrt.org/ . Keep in mind that this is a non-standard usage of tor, and there may be other issues that arise from not using the tor browser bundle.
>TailsTAILS is a live system that completely torrifies itself and deletes everything from the host machine after you remove it. This is useful for a number of reasons, however as a live system you'll have trouble saving documents or keeping configurations, aka maintaining it as a 'daily driver'. Do some research on that. In general to stay anonymous you don't want to change anything that will affect how you look on a network.
>WhonixWhonix is a VPN you run on your computer using OpenBox or something else. It will anonymize everything you do through Whonix and makes it easier for the tor -> VPN connection.
>non-standard tor usage in generalProducts which are not the tor browser bundle, but ship with tor, such as android applications, may be less secure than the TBB in general. They may allow you to torrify more applications, which enables anonymity across more mediums, but you will have to research any issues the individual project might have.
>Pros and cons of tor alternativesI can't tell you about all the other anonymizing networks that you can't startpage / searx for yourself, but you should definitely do this. Maybe another lain could help you?
>VPNsI know less about VPN usage and I think they will make you in general less anonymous. For complete anonymity, you want to connect to tor, and then connect to a VPN through tor. So the setup is tor -> VPN. This is because VPNs hide what you're doing, but tor hides who you are. However, this level of anonymity is not really necessary if you aren't being actively hunted by a TLA (NSA, CIA, FBI, etc) or someone with their tools (distribution is unknown). AKA don't need it unless you decide to hack some servers or become a high-profile enemy of the state.
>Purchase using bitcoinYou also want to anonymize your bitcoin wallet by setting it up over tor and exchanging your money to bitcoins using localbitcoins or some other cleaner. Since the blockchain is essentially a giant distributed log of all bitcoin purchases, bitcoin is not inherently anonymous. This I learned from the jolly roger's security guide -
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/ . There are bitcoin wallet services on the onion network itself.
>WebRTCThere's a vulnerability in the WebRTC protocol that leaks your IP address through VPNs. You can get a browser addon called "WebRTC control" that fixes this. Tor has WebRTC disabled, so you needn't worry about it, but if you choose to use a VPN it's important to do that. I believe the uBlock origin (emphasis on origin) addon also provides this feature, but I haven't gotten it to work properly.
>what VPN to getsimply using a VPN is not a magic bullet. You need to pick the right VPN. I've been suggested Trust Zone, but the exact one you choose is a personal decision based on your needs. This site should be useful to that end:
https://thatoneprivacysite.net/
>And finally how does lain stay anonymous?I use a mix of tor and VPNs depending on what I'm doing. However my non-anonymized IP address is shared with others, so the info that can be gotten to it will at best allow someone to track down what regional network I'm on. Because of this, and the banning of VPNs on different sites, I don't always use VPN usage. I also use a huge list of browser addons to give me marginally more anonymity:
generally, uBlock Origin + uMatrix is my go-to. uMatrix is a general request blocker, kinda like NoScript but for all web requests (like frames, css, images, plugin usage, XHR and setting cookies). uBlock Origin is the best aad-blocker I've come across that also allows blocking other requests that may track you, and I use it as a fallback in case uMatrix is disabled for some reason. I also use uBlock for tor because it makes websites go so much faster.
But I also have an addon to spoof / remove referrers, a "supercookie" blocker which manages flash cookies called BetterPrivacy, an addon called TrackMeNot which sends random google, yahoo, and bing searches of New York Times headlines, HTTPS everywhere, an EFF project that forces HTTPS usage on websites, Beef Taco which sets the "do not track" opt-out cookie for many websites, Cookies Manager + which gives you more control over the cookies you use, and Google Privacy which replaces links on google, facebook, and other sites away from their soykafty redirects that track you to the actual site you're using.
My setup is probably overkill / nominal in that I could do something simpler that gives me more anonymity, but the problem with doing that is that I don't have access to every website I'd like to use. You really have to make tradeoffs on what you value, which is soykafty, but welcome to the 2010s internet. In general, you want to have a good idea of threat modeling. Here's other helpful websites:
https://prism-break.org/en/https://privacytools.io/https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/https://securityinabox.org/en/https://en.wikipedia.org/wiki/Threat_modelhttps://www.eff.org/http://www.logicalincrements.com/firefox/take everything with the amount of salt you find appropriate.