Your level of privacy should be relative to your threat model
Unless you're in Hamas or something you probably don't need to use Tor to watch a YouTube tutorial on how to make chocolate chip cookies
Your level of privacy should be relative to your threat model
Unless you're in Hamas or something you probably don't need to use Tor to watch a YouTube tutorial on how to make chocolate chip cookies