Your steps are full of flaws:
- Any Linux OS. There are many distros that are really weak, they are not oriented to give you a secured environment. Unless you use a Red Hat distro that is really prepared to serve secure environments you gain nothing by using Linux.
- Extensions that report you to the IRS? Why would you use them?
- Vpns, really? People think that they can really hide their IP,. All that authorities have to do is to request your details to your VPN provider, they will give you away immediately.
- Chrome extensions, that one made me laugh
- Weak passwords, the final nail in the coffin.
It is actually a list of how not to do it.
If you want to secure your wallet you don't need any of what you have recommended. You have to secure your .dat files and for that all you need is an encrypted drive, for example an encrypted S3 bucket on Amazon. Cheap and secure.
Even banks use Amazon buckets and Dynamo DBs.
Don't follow lists that you see on the web, it is obvious that you copied the steps from somewhere else, from the way to write I can tell that security is not your forte.
Hey stupid fuckface, I've been doing linux for over 10 years and never been hacked
I don't know a single linux user that has been hacked, you being an idiot will probably be hacked many times
If you don't believe me or don't get it, I don't have time to try to convince you
For the uninitiated, there are some keywords on this thread
1. dedicated -
Ubuntu Linux is a mature software, keep it updated, it is secure. Bitcoin core is a mature OSS. Update it as needed. It is secure. Google chrome is a good software, keep it updated. Metamask is a good software, keep it updated through Google auto-update
dedicated means not installing any stupid software on the linux OS computer. Don't watch pr0n or install torrent software on this computer. If you must watch pr0n, do it on the Firefox browser (after logging out of your fake google acount) and use incognito
2. VPN is optional but HIGHLY recommended
It is to hide your crypto activities from your ISP and its employees who are aware of where you live
It is also an obfuscation tool of your location to the endpoints you connect to, such as other bitcoin nodes, but most importantly, it is to tell Metamask back end infrastructure, the PoS network validators, the Infuria servers, the smart contract platforms that will refuse your connection if you are in the US or other crypto unfriendly nations that you are in South Korea
. All that authorities have to do is to request your details to your VPN provider, they will give you away immediately.