Goal is to run a software (GUI or TUI), that presumably does intense tracking, the maximum it can, while making it after all think the user might just be “a normal PC user, can be Windows”, if not possible then “a normal Linux user, can be any distro and any kernel”, if not possible then “a normal Linux user with X.X.X kernel, Debian, but can be any Debian distro and that kernel is also used by all the people who are normal and don’t understand in the world of privacy, security, Tor”, etc. “normal”, not “extremist”. You get me.
It is totally acceptable to use special software to achieve this, but it must be freedom software and trusted.
The reason I believed this is possible despite System Identity Camouflage and Virtual Machine Cloaking and Protocol Leak and Fingerprinting Protection is that these documentations might have meant 1) compromization, malicious software running, where I agree that yes it is practically impossible to hide system information, or 2) talked about the default, did not take into account the possibility of using a special software, a tool, to achieve that. Also another reason I believed it is possible is the existence of “XPrivacyLua” for Android that makes me say “will it be possible on Android and not on Linux?” Also the understanding that certainly applications do not just stretch their hands and get that information but instead they request it first from some system component and then that gets it for them - so maybe we can edit that system component or so.
If still impossible (please tell whether only CPU is the impossible or that many others are,) then what for emulators? It is stated in the CPUID wiki: “Perhaps emulators might be able to hide this information since the CPU is fully emulated (as opposed to be being virtualized) but these are too slow to be considered for production use”. Providing that the use case is very lightweight, how could that be effectively used? Note CPU hiding is least priority as most used CPUs are famous anyway, just hiding the rest / the enough to appear as “a normal, non-privacy-or-security-savvy, non-extremist person”, plausible deniability, is needed.
Lastly, sys-vpn will be used to use VPN after Tor, to lastly hide Tor usage from the application to also appear as a “normal person just used a VPN”.