Agreed.But that makes you use those anonymous proxy server's which you've no diea who's controlling?
Let me ask you this,how do you find & trust that machine?
Also could you list other reasons as well ,maybe it could add a layered sense of security to what I already practise.