in theory assuming you don’t need a phone number you could make a nearly anonymous social media account
you would want to do the following:
Network setup:
BrowserQube → VPN → rotating shared residential proxy → tor bridge → tor entry → tor middle → tor exit → into a another anonymous rotating residential proxy that you never EVER connect to in any way outside of after leaving tor → then from that proxy go to the site
this way the site can’t know who you are as you seem to be either the anonymous proxy hoping form place to place, or the anonymous VPN
or ISP can’t tell apart your normal internet from your anonymous internet activity, seeing as all they would know is that you are connecting to a VPN only
the first VPN would only know you are connecting to a rotating shared proxy service, that service even with logs/timing attacks would only know you are connecting to some random server (the tor bridge servers are specifically not associated with tor)
then the host of the tor bridge would just see you as some random resident somewhere connecting to tor through their bridge
you’d go through tor, connect to the anonymous proxy and then the site
you could then use that qube to access social media accounts, with relative anonymity assuming you have access to an anonymous email
but automating a system for making/deleting accounts would be a useful tool, would me quite a challenge as many sites want your phone number which is not an easy requirement to get around, but if you did you could make it so that it is part of a disposable qube that has different launchers for each service create a new social media account etc each time you launch them. But it def wouldn’t be trivial, just as setting up the needed networking wouldn’t be trivial
but you could still be de-anonymized via advanced timing attacks, as well as speech pattern analysis, and simple social engineering etc, nothing is fully anonymous but I think that is the closest you could get
it would be an interesting project, if one likely bound to fail