So many thoughts on this, but all the major countries represented here already have all their consumer telcos back doored. If you're running a TOR node or hitting a VPN or something they are intercepting you or seeding you into their own routes from your Telco POP or nearby. You're not getting around it. Some novel means of wardriving notwithstanding unless it's your full time job it's not viable to be anonymous.
You took a bunch of tech sounding words and strung them together in a way that makes absolutely zero sense which betrays that you have no fucking idea what you're talking about.
Nobody with the capacity to tap undersea cables and infiltrate an ISP gives a singular fuck about shitposting on KF I assure you. If the government needed to get at someone, they'd simply send a request to 1776 Solutions on official letterhead using known channels to obtain the relevant information about that user. Null is very open about this.
Running a Tor exit node != using the Tor network. Running a Tor exit node is a good way to piss your ISP off though, because you've volunteered your computer to act a bridgehead server between the Tor network and the rest of the internet.
VPN providers, even ones that advertise zero logging likely keep logs, if nothing else, then for service management. They don't pipe everything into /dev/null and you'd be foolish to think they did.
"They are interepting or seeding you into their own routes from your Telco POP or nearby". There are actually ways to do this, but if you think lolcows can operate a man-in-the-middle at the ISP level or that they'd break into a POP to do so, assuming they'd know what a CMTS or equivalent and a core router looks like or how it fucking worked along with the physical and logical security measures put in place to prevent such intrusions???? What kind of next level schizo autism is this???
Wardriving? You mean driving around with kismet and looking for wireless networks? You think evil people are driving around trying to find out who you are by rolling through your neighborhood with a laptop looking for ways to break into your wireless network????
It's also absolutely viable to remain anonymous, the level of anonymity and countermeasures taken need to accurately reflect the threat actor. For this schizopost idea you made up in your head, you might as well throw away everything you own that talks to something else and go live in the fucking woods.