Here are the techniques I use, loosely inspired by Michael Bazzell:
> E-mail isolation (different emails for each service)
< Register an email account at Protonmail, Tutanota, CTemplar or Danwin1210
< Register an email forwarding account on AnonAddy or 33mail
> Usernames
< Use a completely different one for each community you visit, and don't post information that can bridge the gaps between your identities (the minor details make a huge difference)
< Use a very generic dictionary word whenever possible to register accounts. This will make it harder for people to find accounts tied to you (e.g: google, duckduckgo, sherlock) unless you make a lot of noise online.
> Passwords
< Get a password manager. People can search data breaches for unique passwords which can leak your "true" identity.
> Browsing
< Firefox (clearing everything on exit, add ublock origin, https everywhere, cookie autodelete, container tabs)
< Tor Browser (recommended alternative, much better for most cases)
< VPN (only to hide your IP address if you're browsing outside of Tor)
> Hiding information or misinformation?
< Depends on your threat model, but I'd say a mix of both works well.
now op, the list is not exhaustive, but it covers the needs of alot of people. the best way to avoid getting doxed is to be as boring and forgettable as possible.
do some research and you'll find lots of resources.