I'm going to assume you get a PC built with hardware that is secure and not going to fuck you over, that's the first step, try as much as possible to stay away from pre-built computers and components made by companies known to be asssholes.
Best option is to install TailsOS, then install a VirtualBox Virtual Machine on Tails, then install the WhoNix OS on the VirtualBox, and then on that you use a VPN that is run by people who can't or won't give away your information to any corporation, government, or international institution, also try to find one that changes the address up frequently, and one where a lot of others will be using the same address as you (thus keeping the initial list of suspects wide open).
After all that, you must use the correct configurations for each installations in the chain of privacy software, and practice proper OPsec in your internet activity.
Even after all the tech behind someone like Dread Pirate Rodgers, he was found because he became overconfident and gave away information that was used to identify him.
Do not put too much faith in your security tech and configurations, they aren't flawless just because no flaws have yet been identified in them, a man was busted for his pedophilic habits on facebook involving 13 and 14 year old girls, he was using Tails and the way he was busted was because the FaceBook corporation was willing to work with American law enforcement to hire a team of white hats to find a security vulnerability in Tails, and with that they found his IP address.
The Tails team said that they were unaware of the flaw, and worked to patch it up, as well as run a new diagnostic on finding other exploits in their system, but if they missed one as big as this in the past, they may miss more that exist in their system, the best way to avoid being caught by the authorities is to not make yourself worth all the time effort and money it takes to track you down through your security.
Also, if you use all this stuff, and they can narrow your location down to a specific area, they can bust you on the logic of the process of elimination, because when you use this stuff, people who manage your internet activity will be able to see it, not your activity, but the fact that you are connecting through something like TOR or a VPN.
A VPN is the last step because it adds another layer to the amount of security the feds will have to dig through to find you, more work means that they will be less willing to go after you and there's more you can do before they decide that you are worth their time.
Like I said, the best security feature is not being someone the feds are willing to waste their time on, if they don't go after you in the first place, your security goes up quite significantly.
It's more than just tracing the tech, it's also looking for clues in the content coming from you, and finding similar content elsewhere, and seeing out any scrap of info that could help them narrow the search down to who you are, old fashioned police work has not disappeared just because of the involvement if technology, if anything, it's become more relevant in the hunt, so try to review the stuff you put out there, think on how unique it makes you compared to all the other internet users out there.