Tor is slow because it encrypts all of your internet traffic and routes it through another computer and then another computer and then the final computer otherwise known as an exit node which decrypts your traffic and then it hits the internet. Proxy clients are not ip generators, proxies work by routing your internet traffic through one or more computers, basically acting as barriers between your computer and your final destination on the internet. Disabling the spying features on windows 10 does nothing, if you use a traffic analyzer such as wireshark, you'll see that your windows 10 system is still transmitting packets back to Microsoft and its affiliates. If you read microsoft's terms of service, you'll find out that you do not own the windows system on your computer, you have a license to USE that software.
Most people are completely unaware of how the technologies they use on a daily basis work or how it could be used to ruin their lives, as an example: Say in a hypothetical situation I wanted to compromise 'hack' into your computer or hijack your network. You mentioned you use windows 10, a highly vulnerable operating system. You post on this internet forum, you probably don't use any sort of proxy when posting, do you? I could start running scans if I wanted, and I could obtain your real ip address. Once I have the ip address of your network, I can see everything on your network even in the "microscopic" view, components that you did not even know existed. There's a difference between what is actually on your network and what you think is there. Since I would have a thorough view of your network, I could see just about every little crack, hole 'vulnerability', and after I exploit just one vulnerability, I can compromise your device and after I compromise one device, I can compromise your whole network. I can even change the hardware-software functions of your computer so I can activate your web cam and microphone without it lighting up or any other indication of such activity, I can sniff all the keystrokes on your computer, intercept all of your web traffic. And I could do all of this without detection, assuming you don't do a packet analysis of your network with a tool like wireshark, but even then I could modify that program so none of my activities would be detected. And I can go much, much further.
Most people don't care about computer security or anonymity. Post something on the internet and I could easily get your ip address, and with that ip address I can obtain your social security number. Not only can I have a full backdoor into your network, but also your life as well. <---- How I would do that is not something I would be willing to share, however.
This may or may not be of any interest to you, but just be careful of what you do on the web.