Tor is not the best for generic use. Because of its nature, it's usually very slow compared to other browsers, and needs to be used in a combination with a VPN you really trust.
Firefox is just a mainstream browser which is said to care more about your privacy. Comes with more options to do that, but you need to activate these as well.
At any case, Google Chrome, especially with your account signed in, is the opposite of privacy...
Tor is significantly faster than it used to be. As long as you're okay with an extra ~0.1 seconds of latency, and aren't downloading huge files, it's barely noticeable (other than captchas). Also, you shouldn't use VPNs with Tor, since they violate some of the circuit path construction assumptions, create a single point of failure for traffic fingerprinting, and don't really add any security if your connection is encrypted to the destination (TLS, SSH, etc.).
I agree with the fact that TOR is much faster than it used to be, and you can't really tell the difference on most non-heavy website (I noticed a difference when going to facebook, for example, but that can also be because of the many other things FB throws at you that other browsers just nod and smile at)
The second bit though... TLS encrypts your traffic, but there are still a few key things they can see:
Which websites you go to, how long you've been there, how much data you downloaded (did you just browse or actually went to a torrent site and downloaded something?)
There's also the issue of who's the exit (or even entry) node. There was this whole thing about Russian affiliates creating their own nodes just to lure traffic in. These folks have all the data, and even if encrypted, that's a bad thing.
As for SSH, how is that practical when surfing... SSH to where? Who's on the other side of the tunnel? Perhaps you meant this just as an example - if not, I'd be interested to get a practical example, could use it myself (no sarcasm!)
I'd say this:
If you just want a faster browser with much smaller memory footprint, go for Firefox. If you want privacy and you know what you're doing (at least basics) go with TOR - but don't use TOR blindly thinking you're safe.
As for SSH, it was just an example of an encrypted connection. There are technically some sites that provide SSH browsing functionality, but mostly as a neat trick. I do use SSH over Tor a lot, but almost always via Onion Services, for NAT punching and a secure DNS alternative on my personal machines, which means it's already e2e encrypted anyway.
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!