“Well, yes and no. If you wanted to send an anomous email you could go to almost any library, sign on to their public computers and set up an email account. Send the email and then never use the account again.”
The video system at the library has you using that computer. So does the ISP have the logs.
Re:”The video system at the library has you using that computer. So does the ISP have the logs.”
That was my first thought.
What about those “burner phones” you read about crooks using? I don’t know anything about them, not being a crook myself. Could someone set up a fake email account on one of those and then toss the phone?