Re:”The video system at the library has you using that computer. So does the ISP have the logs.”
That was my first thought.
What about those “burner phones” you read about crooks using? I don’t know anything about them, not being a crook myself. Could someone set up a fake email account on one of those and then toss the phone?
No phone, used in any way, shields you from scrutiny and tracking.