"Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."
All this is interesting from a technological point of view, and as a practical tool to help defend your online privacy and anonymity from criminals, terrorists and police states.
However, despite "several hundred thousand" users of worldwide, the size and distrubution of the "Tor cloud" of volunteer donated Tor server bandwidth is worryingly small.
Today there are just over 300 servers in the "cloud", but major portions of the the worldwide internet are unsupported e.g. there appear to be more Tor servers in Communist China than in Japan and South Korea (with their huge numbers of internet users and available high speed bandwidth) combined.
Even more embarrassingly, the United Kingdom currently sports fewer than 30 Tor servers i.e. fewer than the city of Berlin in Germany does ! Obviously the "location" is based on the whois information pertaining to theregistered offices of the ISP, but there are plenty of other Tor servers in the rest of Germany.
Give something back to the internet community, and do something to protect your own privacy and freedom, as well as that of others, and run a Tor server.
You do not need to be a *nix guru in order to configure a Tor server: the new Vidalia (a type of onion) GUI front end configuration tool and network map display, makes things as easy as setting up , say, Internet Connection Sharing, on a Windows XP box.