um. If you care about anonymity, you can disable most of that in the browser. I recommend Firefox for the best nuanced control of these parameters.
There's a good guide here:
http://advocacy.globalvoicesonline.org/projects/guide/
yrs,
Shava Nerad
former Tor staff, current volunteer
Actually, if you look at how Tor works, the links are encrypted and tunneled together such that it is nearly impossible to trace a well formed route -- of course, assuming flash or a torrent client aren't giving up your IP within the data packets before it enters or after it exits the cloud.
You should think about learning more about how Tor works at http://torproject.org -- it's a lot more than a simple 3-hop proxy.
yrs,
Shava Nerad
former Tor staff, current volunteer
Sorry, didn't log in on the above comment -- but I'm not really anonymous or cowardly, just slack...:)
Shava
Academic from Cambridge University have documented possible shortcomings of Chip and PIN machines used to authenticate debit and credit card transactions.
Actually, if you're using an unpatched browser, you might not even have to download the file they offer to be infected. The web page includes Javascript exploits for half a dozen security vulnerabilities, which will install the trojan without user interaction. I've posted an analysis of the malware code on my blog.
Despite what the article says, Storm isn't using Tor (other than trying to exploit it's reputation) and the download isn't a trojaned version of Tor – it's much too small to be that. What's more, the botnet operators appear to have dropped this strategy. While on Thursday the links in the spam went to a fake Tor download page, on Friday they showed a fake YouTube video, and now they show a fake NFL game tracker.
If God is perfect, why did He create discontinuous functions?