Use Tor: Browsers, Hidden Services, Stream Isolation, Individual Programs, and OS-Wide Proxying.