There are three main uses for Tor:
Some good proxy testers out there that will be able to bypass Tor's and reveal browser information and network location:
Some identifiable strings sent by the browser can be blocked depending on the proxy used to relay to Tor. The
X-Forwarded-For proxy variable, the referrer and the user-agent string can be spoofed or blocked and privoxy allows you to do this.
After making the changes to privoxy, you could should privoxy to forward all requests through Tor:
### Testing ## http://www.saunalahti.fi/parazite/cgi-bin/env.pl forward-socks4a / 127.0.0.1:9050 . ### Testing
and then access http://www.saunalahti.fi/parazite/cgi-bin/env.pl to figure out what leaks should be plugged - your IP, at the very least, should not show up.
For a setup that will allow you to browse both
.i2p domains, see the proxy chaining page.