

Google collects and stores information such as search queries. If Windows cannot be avoided, make sure you update it regularly-automatic updates are the way to go. This is due to the inherent security bugs and vulnerabilities that come with it. On the subject of operating systems, using Windows is not a good idea. If a potential attacker is able to figure out what OS you are using then Tor can't protect you. If your OS is outdated, then third-parties could exploit loopholes in it to get past your Tor shield and compromise your data. Tor is only as safe as the system running it.

After a while, a temporary email address will be deleted.

Temporary email services should only be used where you don't need routine access. Use Tor-based or temporary email services, and transact in anonymous cryptocurrencies. If you are using Tor properly, create a persona and stick to it.
