Not saying don't use them, saying use them with these:
I've seen some great opsec models like using decodo static ip as a base, then chaining mullvad, vultr , and dolphin, but I dont even see anyone talking about hardware air gaps, firewalls, and anonymization... why not take a orbic...