spivonious said:
Just remember that no matter how many places you put your connection through, it can always be traced back to you; it just takes a little more time.
Well, there are ways around it, like leeching off someone's wifi (bonus points if you break WPA2), or renting your own dedicated server and then running your own anonymizing proxy service on it, that way you'd have plausible deniability.

or just use Tor?