To address your points (albeit from a while ago):
Originally posted by Arbitrageur The chrome browser may be fast as browsers go, but the tor speed problems have more to do with the fact that your data is bouncing through many different tor nodes before it gets to you, and not so much with the browser. Hopefully you know what you're doing with Chrome and maybe you do, but the Tor developers recommend Firefox.
Of course TOR itself causes the slowness, as it constantly relays your browsing, but Firefox is, on general, not exactly the best browser. Yes, I also have Opera and Internet Explorer, but Chrome is still my choice for speed. However, I usually use the actual TOR system for Deep Web browsing.
Why would you recommend this when the Tor developers have offered a solution which leaves no traces on your computer in the first place. You can get a USB stick, and load the Tor browser bundle (TBB) on it, and run tor from the USB stick. The way it's configured, once you end your session, there's nothing for Ccleaner to find. It leaves nothing on the USB stick or on your computer after your session is finished. That said, I'm not sure the latest versions are entirely stable.
And if you don't go the USB stick route, you're probably better off running it in a virtual machine.
Unfortunately, I, unlike many people, do not have a safe system of computers to work with. I carry my one Unix netbook around on my business trips, as I know that in some of the places I travel to (Egypt, Greece, Singapore) the computers are a wee bit . . . spotty, if you know what I mean. I use CCleaner and Glary Utilities on my computer so that the transactions that I do are concealed. (Bitcoins cannot run on a USB drive, in my experience.)
If you believe the guy who helped develop bitcoins, this is not such a good idea:
Update: Jeff Garzik, a member of the Bitcoin core development team, says in an email that bitcoin is not as anonymous as the denizens of Silk Road would like to believe. He explains that because all Bitcoin transactions are recorded in a public log, though the identities of all the parties are anonymous, law enforcement could use sophisticated network analysis techniques to parse the transaction flow and track down individual Bitcoin users. “Attempting major illicit transactions with bitcoin, given existing statistical analysis techniques deployed in the field by law enforcement, is pretty damned dumb,” he says.
Well, unless you want to go about giving out your Credit Card number on the Deep Web (of all things). . . At least bitcoins are a lot more difficult to trace. Of course, nothing is impossible . . .
To address my idea that bridges help dislodge cookies, I apologize for that glaring inaccuracy. Of course I use Firefox with cookies unabled, and I forbid scripts globally. However, what I meant to say is that, once someone realizes that you are using TOR, they could potentially trace back your IP address, which would obviously endanger anonymity. This is why I use bridges.
As for this . . .
Just a random info-dump,What would be nice is less randomness, and more accuracy.
I sign off most if not all of my posts in this manner, so I apologize for my . . . well . . . non-perfection.
Hopefully more accurate and less of a random info-dump for your likings,