What "anonymous" actually means.
The single word "anonymous" hides three different protections. They are independent. A host can implement one of them brilliantly and the other two not at all — and most do. The thread that runs through this whole guide is that the careful customer has to evaluate each property separately.
Layer 1 — signup. Did you have to give the host your name, your email, your phone, your identity document, your address? An honest signup floor for a privacy host is one or two of those at most. NordBastion asks for an email and a password, nothing else; SporeStack does not even ask for an email and operates a token-only signup; HostKey publishes a KYC verification page and asks for documents on some products. These three are different in kind, not in degree.
Layer 2 — payment. Even if signup collects nothing, the way you paid for the server links to a wallet that links to an exchange that links to your bank account that links to your legal name. Bitcoin is pseudonymous and chain-traceable; Monero is not. Cash by mail is anonymous if posted from a public box; cards are not. The host should accept payment methods that match the threat model.
Layer 3 — network. The connection you make to the panel, the IP you SSH from, the network the server itself reaches out from — each leaks something. Tor masks the inbound; an egress firewall and OPSEC manage the outbound. A host that refuses Tor for sign-in is making a layer-3 decision against you, even if layers 1 and 2 look clean.
