(assuming default configuration)
If you use Firefox, use Tor Button to prevent DNS leakage (and other privacy problems with cookies, plugins, etc).
Maybe your internet access at your office (school, internet café, etc) is restricted, filtered and/or monitored and you don’t want that. In my case Trend Micro OfficeScan blocks a lot of web-sites as false positives (including www.ip-phone-forum.de). A solution is this:
It is not an bad idea to restrict the memory Polipo will use with the following additional option:
chunkHighMark=1048576
Unless you restrict the IP addresses that can access dropbear, my advice is to disable password login and to use host-based authentication.
It is also possible to encapsulate SSH traffic using STunnel, for cases where only http/https traffic is allowed.
Beware that DNS requests could still be monitored, see the section about Tor about how to prevent this. (it is possible to use Tor Button without Tor)
It is possible to tighten security by using these options:
tunnelAllowedPorts=443;allowedPorts=80,443
This prevent tunneling through the proxy and access to the freetz web interface.
Using the extra options it is possible to specify a file with forbidden domains, like this:
forbiddenFile=/var/media/ftp/uFlash/polipo/forbidden
Add the domains you want to block on separate lines, like this:
doubleclick.net
googleadservices.com
google-analytics.com
googlesyndication.com
facebook.com/plugins