There are three main uses for Tor:
.onion
websitesDo not expect much from using proxies to anonymize your HTTP or HTTPS traffic. Using Java and Flash/ActionScript it is possible to snoop your MAC address or your IP address. Tor should only be combined with a browser that has Java, Javascript, Flash, and others disabled.
Some good proxy testers out there that will be able to bypass Tor's and reveal browser information and network location:
Some identifiable strings sent by the browser can be blocked depending on the proxy used to relay to Tor. The X-Forwarded-For
proxy variable, the referrer and the user-agent string can be spoofed or blocked and privoxy allows you to do this.
After making the changes to privoxy, you could should privoxy to forward all requests through Tor:
### Testing ## http://www.saunalahti.fi/parazite/cgi-bin/env.pl forward-socks4a / 127.0.0.1:9050 . ### Testing
and then access http://www.saunalahti.fi/parazite/cgi-bin/env.pl to figure out what leaks should be plugged - your IP, at the very least, should not show up.
For a setup that will allow you to browse both .onion
and .i2p
domains, see the proxy chaining page.