Tor and Tails don't protect you by making you look like any random Internet user, but by making all Tor and Tails users look the same. It becomes impossible to know who is who among them.
Your Internet service provider (ISP) and local network can see that you connect to the Tornetwork. They still cannot know what sites you visit.To hide that you connect to Tor, you can use a [[Tor bridge|doc/anonymous_internet/tor]].
The sites that you visit can know that you are using Tor, because the <a href="https://metrics.torproject.org/exonerator.html">list of exit nodes of the Tornetwork</a> is public.
Parental controls, Internet service providers, and countries with heavy censorship can identify and block connections to the Tornetwork that don't use Tor bridges.
No anonymity network used for rapid connections, like browsing the web or instant messaging, can protect 100% from end-to-end correlation attacks. In this case, VPNs (Virtual Private Networks) are less secure than Tor, because they do not use 3 independent relays.