In addition to what's already said, you might consider carrying around a small usb stick containing the bootable [TAILS OS][1] (short for The Amnesic Incognito Live System) which routes all your internet traffic through Tor by default, and doesn't store anything on the local hardware as everything done on it is erased after a reboot.

If you'd rather prefer the fact that you're using Tor stays unknown from the local network admin/ISP/government; you should [configure Tor/Tails to use Bridge Mode][2]

Note however Tor isn't a silver bullet solution for everything and you should read the appropriate documentation before trusting any software with sensitive information. 

In addition, because of Tor's architecture username/password information can be observed by the third hop in its obfuscation network (in whats termed an exit node) so you should be using HTTPS to prevent this. Try the EFF's HTTPS Everywhere extension to make it easier.


  [1]: https://tails.boum.org/
  [2]: https://tails.boum.org/doc/first_steps/startup_options/bridge_mode/index.en.html