I missed that part
The time from opening the browser to having a fully loaded site is minutes.
I think it depends on the region. To me, full browser restart with reconnect is maybe 10 seconds tops, usually less. I use Tor Browser as a default one on my phone, and it opens random links quite okay.
For me, the main issue is exit node blocking, then I need to restart the browser 1-2 times.
This question is unironically very deep. As it’s privacy we’re talking, you decide what to trust on your own.
My understanding is that Tor provides anonymity for my threat model (ad-tech corporations).
But trust need to be placed somewhere. Do we trust Mozilla? All their emploees? Do we trust OSS? Does anybody actually review open-source code? What about supply chain attacks?
I am, a nobody, was personally invited to a Contagious Interview (a person, pretending to be a client for consulting was trying to place a rootkit on my machine via GitHub repo).
What about AI-assistet coding that actively tries to eliminate security gates?
The NSA wasn’t able to break Tor fundamentally, even with spanning numerous exit nodes to intercept traffic, and high-scale traffic correlation between enter and exit nodes
“We will never be able to de-anonymize all Tor users all the time.” It continues: “With manual analysis we can de-anonymize a very small fraction of Tor users,” and says the agency has had “no success de-anonymizing a user in response” to a specific request.

• Top-secret documents detail repeated efforts to crack Tor• Tool is funded by US government and relied on by dissidents and activists• Agencies have failed to break core security of network but have limited success in attacking users' computers
The alternative is a literal Nazi posting racist cartoon depicting Obama as monkey, not to mention a few murders here and there, and a promise to deploy armed Gestapo to watch the election. But worry not. You prople did very well not woting for a weak candidate.
Alas, you have a strong one now.