Could that be that I was attacked or there were any problems with Google Notebook, Gmail over CLEANLY* HTTPS?
I don't think you've been attacked using "sslsniff" alike approaches. If, you would most probably haven't noticed it.
The "connection timed out" give a pretty good indication that there was either a slow network or a general network problem.
I am not aware about problems at the Google services you noted, but you have to remember that you don't just dial-in to Google itself... your connection hops several network connections. This means that it only takes one of the servers along the way to be out-of-order for a short time and you'll notice "connection timed out" messages.
Besides, such a message can point to attacks, but most of the time they don't.
I'm using Privoxy because it could defend me from sslsniff like attacks [FIXME] -> so that HTTPS connections could get degraded to HTTP.
You forgot about the fact that "sslsniff" uses MITM-alike (Man In The Middle) attacks, which works in a way that neither endpoint of the connection actually notices that the connection is degraded.
Since Privocy (being nothing more than a filtering proxy) runs on your local machine, it will only get the same information your machine generally gets... Privoxy has no way of detecting if the connection has been tampered with in most cases of "sslsniff attacks, since you - being one of the two endpoints - receive information that makes your computer thing the connection is still a secure HTTPS connection.
That is - what makes "sslsniff" such an often-discussed toolset. It shows that there are security problems that HTTPS actually shouldn't have.
my opinion
All in all, I think you've created a nice set of rules for Privoxy which help you to surf as you like. But I also think you are expecting a bit too much security from a non-caching filtering proxy you're running on your local machine.
Privoxy was never build to be a security tool to protect and secure HTTPS connections. Privoxy was and still is a filtering proxy which was initially made to filtered stuff like advertising... not something that will make sure your https connection is secure.
As a reminder, here's the description from the privoxy website itself:
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
My 2 cents: you can't expect such a tool to do a job it was never build for. Remember: we're talking network security here, not advertising banners and killing links to malware and phishing websites!
UPDATE
In fact, when talking about "sslsniff" or even "sslstrip" (which won't cause ssl errors when in effect), it's known that even tools like "HTTPS Everywhere" fail.
I saw someone answered that "HTTPS Everywhere" would be the perfect choice. And yes, it is indeed a "better choice than Privoxy". Note though that even "HTTPS Everywhere" won't protect you from every kind of HTTPS attack.
For details on "sslsniff", "sslstrip" and the "HTTPS Everywhere" limitations related to it, you might want to check Does HTTPS Everywhere defend me against sslsniff-like attacks?
But "HTTPS Everywhere" is definitely a better choice than relying on Privoxy.