Because SoftOrbits Privacy Protector for Windows 11
To prevent any tracking info from online activity one method is to use Tails, a privacy oriented Linux distro that can run in RAM off a USB stick/drive. It defaults to the TOR browser and nothing is saved to the Linux disk itself.
zdnet.com/article/obsessed-with-privacy-keep-tails-on-a-usb-drive-and-secure-most-any-computer/
zdnet.com/article/serious-about-online-privacy-this-live-linux-os-is-for-you/
Want to use Windows rather than Linux? Sign up for a Microsoft Windows Insider account, then download a Windows Enterprise ISO. The Enterprise version of Windows will try to activate using a server that you don't have -- it will never try to activate based on your hardware, never set up OneDrive, never set up a Microsoft linked account, will work just fine without activation [you cannot customize your wall[paper for example]. Use that to set up a VirtualBox VM [Virtual Machine]. That VM will be stored on a .vdi VHD [Virtual Hard Disk], which is a single file -- you can store a copy anywhere, then use it to replace the file with the VM you've just been using. That way the old Windows hard disk, with whatever data might have been written to disk, no longer exists.
microsoft[.]com/en-us/windowsinsider/register
virtualbox[.]org
If you need to, you can save data using a Windows VM or Tails to a separate storage space. That might be a file on a micro SD card that can be [hidden] stored anywhere, a VHD encrypted with VeraCrypt, or an encrypted VHD hidden inside another encrypted VHD using VeraCrypt. If you want/need to preserve whatever in the Windows VM you were using, you can store an encrypted version of the VHD the same way, inside another VHD.
When you connect online to any address, your IP address & MAC address are recorded -- the IP address is how a web site for example knows where to send the data making up a web page. The IP address tracks to the building or apartment where the computer is, and the MAC address tracks to the individual device that was used -- every network access device [e.g., card or chip] has a unique MAC address permanently assigned to it. A proxy server takes your computer's request to visit an online address and makes that request for you, sending you the result. In that way the site never sees your IP address. The TOR browser bounces your activity through several anonymous proxy servers -- the kind folks behind it suggest you try to use the TOR browser during periods of peak internet activity to lessen the odds of someone matching activity coming from your computer with a response from a monitored site. A VPN is essentially a network of proxy servers that encrypts the data going between your computer and the proxy server. Note that if privacy is your concern, you want to make sure that any proxy server does not log all of your requests, since those logs could defeat your purpose of being anonymous. VirtualBox allows you to select & use a random MAC address whenever & as often as you like. In Windows & Linux you can use MAC spoofing software to do the same thing.
Microsoft, Google, Meta etc. collect data from you and what you're doing, where you are and so on because aggregate telemetry data is worth money. Data brokers OTOH take that data, & sell it to people who break it down into individual profiles that they use &/or sell -- government & law enforcement are buyers. Big tech might use &/or sell your data for targeted advertising, but otherwise it doesn't have much value to them. Some of that data also helps them monitor & possibly adjust or improve their services. Turning off location monitoring & using a local [e.g., non-Microsoft] account may be enough to meet your concerns -- that's much harder to do with Android phones -- since whatever data collected can't easily be traced to you.
If you're worried about someone getting ahold of your PC/laptop and looking for evidence you're talking operational security. Operational Security, whether you're a spy, have a repressive government, or are doing something naughty, is quite another thing, and something you should heavily research. Personally I wouldn't go anywhere near Windows, wouldn't have anything written anywhere besides external encrypted media, would use nothing wireless, would only copy/paste text online [no typing] possibly after an AI rewrite, and then only in a windowless room with a faraday cage etc. You can also buy anti facial recognition clothing and accessories.