Use the Tor browser
The Tor browser makes it very difficult for website operators to view your IP address (and thus your approximate location), and for your internet service provider (ISP) to view which websites you visit. This is especially important if you live under an authoritarian government, or one that is currently moving in that direction.
You can download the Tor browser from the Tor project website's "Download" section. The Tor browser manual provides much helpful advice. The browser is free to use, though if you have money to spare, the project does accept donations.
If everything works correctly, the tor browser will prevent your ISP from seeing which websites you visit. However they can tell that you are using the Tor browser, and they will happily hand over those records to the government. If the only people using Tor are those facing persecution, they will be found. If more people use Tor, especially for their regular every-day browsing, it will become difficult to single people out for using it. By using Tor, you don't just protect yourself, but everyone in your country.
Run a tor relay
If you want to actively make the Tor network stronger, consider running a relay (node). The project has a set of guides for relay operators.
Keep in mind that the network benefits from a diverse set of relays:
- If too many relays use the same operating system, a vulnerability in that system could put the entire network at risk. Currently, most relays use Debian Linux. If you are experienced with a BSD system, using that for your relay could be a good idea.
- Too many relays on the same hosting provider increase the risk for the same reason. Consider using a less common hosting provider, or your own physical servers (but don't run an exit relay from your home).
- Geographic concentration increases the risk for certain types of attacks. For example, if both the entry and exit relay of a connection are in the same country, or in two countries with cooperating law enforcement, a traffic correlation attack becomes possible.
The OrNetStats page provides useful statistics about active relays (providers, os, etc.) All properly operated relays help the network, but those in less common countries and using less common systems are most useful for the resilience of the network.
Run a hidden service
The Tor network can also be used to protect the IP address of a server hosting a website. Such sites are known as "hidden services". This can be a useful way to communicate and organize online safely, away from corporate platforms. If you already know how to operate a website on the clearnet, and are comfortable with the command line, this is not terribly difficult. But be sure to read the community guide Set up Your Onion Service and the Operational Security guide. Furthermore, riseup.net has a Best Practices for Hosting Onion Services guide.
In principle, any web software can be hosted as a hidden service. Be aware that the default Tor browser configuration restricts certain features, such as autoplaying video, so it's best to avoid those. A good idea is to host widely used, relatively simple open source software. MediaWiki is relatively easy to setup and allows users to collaborate on pages. crabgrass, used by riseup.net, provides similar functionality.