why would you buy a chromebook?I've found the much easier solution for people who are not technical or in the field is to but a Chromebook. Inexpensive, and will provide the experience you want for your little side.
There are many options, and I currently have an ASUS Flip C434 (~$500) on the way to evaluate. There are much more inexpensive models available. I would love a Pixelbook but can't beat to pay the price tag. If anyone is interested or would like some technical advise please send me a message.
There are also great selections of refurbished laptops that would be great for this use if price is a factor ($200-300). If you would like some help, please reach out here or in Twitter. It would be my pleasure to help you out!
I'm @aberrantlyme on Twitter.
I wouldn't do anything sensitive on a shared/public computer, you have no trust/control over it or the network it's connected to.What if you're in the library or something like that? What should you do?
It does not matter what computer phone or tablet you use if you are on a private network your traffic and browsing can be watched and tracked, no computer or network is secure. I always warn people who use my network don’t go somewhere you would not want me to know about. But I’m also structured with a proxy server for antivirus proxy surfing plus massive ad blocking. Another thing to consider for privacy or less possibility of being found out is to use a private vpn proxy service. This is what I majored in in college and what I do professionally BS Computer Info Systems — Network Security/Digital ForensicsYour phone is not only insecure but very much more easily lost/stolen and mined for personal data.
TAILS (link posted by Musashi) on a USB stick is highly regarded by security experts as a portable "computer-on-a-stick", or just any live USB stick Linux install - Ubuntu, Mint, Debian all have them available.
A VM doesn't offer much if any security over private browsing mode in a browser as the host can still see all the network traffic etc. and is in control. If you can't trust the host machine you can't trust a VM inside it.