Tor has several important limitations. You should be aware of them before you rely too heavily upon it.
The most obvious problem is that if you’re accessing an unencrypted website, the exit node can potentially monitor your Internet activity. The exit node could potentially be keeping track of the web pages you visit, searches you perform, and messages you send. You do not choose which exit node you use so you cannot guarantee who it is that is actually running that node. You have some protection in that your path through the Tor network is changed regularly but you need to ask yourself how much you trust someone who you don't know, have no commercial relationship with and probably can't even find who they are.
This isn't just an academic theory. As far back as 2007 researchers were able to intercept passwords and email messages by running Tor exit nodes. One Swedish computer security consultant posted the user names and passwords for hundreds of e-mail accounts as a result of collecting data in this way.
There is a way of avoiding such monitoring by an exit node: encrypt your traffic. If you use a site that uses HTTPS the exit node can intercept but not read your data, just like any other surveillance. So, choose your online services with care to avoid the first bear trap.
Again this is not simply a theoretical risk. In 2011, researchers were able to determine the IP addresses of 10,000 people who were using a BitTorrent client through Tor. The users thought that they were avoiding detection when accessing material that might be suspect but the BitTorrent client was exposing their IP addresses.
So what's the lesson here. Simply that if all you wish to do is view plain HTML pages then Tor might well protect you, assuming you trust the exit node operators. Ideally you'd use encrypted services only and not use services that required browser plug-ins. As ever, Tor is useful but it's not the panacea many believe it to be.