Cover Your Tracks Like a Master Hacker Using Dual-VPN & TOR-VPN(PersSec105c)

gujtruytyiu.jpgToday I'm going to show you some of the most extreme ways you can cover your tracks & identity online. There are some situations in life where you REALLY need to be untraceable and not being so is a risk to life, limb, or freedom.

NOTE: Though many VPN's offer "dual-VPN's" and VPN+TOR these should be considered unsafe. This is because if that company is compromised or logs data it won't matter what type of connection you use. Therefore I recommend you follow this guide as it will provide additional and spread out layers to your security. Additionally VPN+TOR does not make you much safer than just using TOR, but TOR+VPN does and functions far better on most sites!

By the end of this you'll be armed with 3 powerful ways to do so. They include:

  • Using a dual VPN setup(combining a virtual machine or router VPN + normal VPN)
  • using TOR+VPN(and vice versa)

These techniques work for Windows/Linux and are quite simple especially once set up. I will cover the most simple methods first and each method will be labeled with a security rating. Let's get started.


  • Two VPN's from separate companies (paid for via aged gift card bought in cash or crypto like Monero)
  • Tor Browser
  • Whonix VM & Windows/Linux VM(if you haven't created VM's go to my tutorial here before continuing)

The Methods:


When To Use It:
  • When doing something that most people wouldn't consider serious but you still need anonymity(i.e. if you do get caught is unlikely to lead to extended jail time) and you still need speed.
    How To Do It:

    To do this is very simple. Buy 2 VPN's anonymously(crypto like XMR is best though gift cards can work). Once you've done that you simply install the VPN program on your main system(or router) and then run a VM(running Windows for example) with the VPN installed. For greatest safety have both IP's be from countries such as Russia, China, Iran, Romania, etc...


    I do not recommend this as in my experience it's no better than using TOR by itself however I'm including it because it's simple and it does hide the fact you're using TOR from your ISP.

    When To Use It:

    If your ISP or government block TOR traffic or using TOR can be suspicious.

    How To Do It:

    Simply have your VPN program running and use the TOR Browser.
    This will result in the following hops- Your PC-ISP-VPN IP-TOR IP


    This is the mac daddy of all techniques. It puts your traffic through 4 hops with the final IP being that of your VPN and the others being TOR. This means you will be able to access many sites that block TOR as well as protecting you from malicious exit nodes. It is as anonymous as you can be with current technology.

Using this method results in the following trail: You-ISP-TOR-VPN meaning both the VPN would need to be malicious and a timing attack would need to occur(a huge undertaking though technically not impossible) in order for you to be traced.

When To Use & Why:

When you need maximum anonymity but still need to be able to access sites that block TOR

How To Do It:
  • Open your Whonix machine
  • Install VirtualBox on Whonix: * sudo apt-get update
    • sudo apt-get install virtualbox
  • Create VM in Whonix and install your VPN(paid for anonymously) on VM. When you visit the IP should be that of your VPN server. Use this machine only for your most sensitive stuff and never anything containing real life identification.

There you have it you now know how to cover your tracks. There are other methods such as RDP's's and VPS's which will cover in subsequent posts but these methods should be sufficient for most things. There's one thing to remember and that's that no amount of TOR or encryption will be able to help you if you do not practice security in all things you do or you make a silly mistake. Therefore I highly recommend you check out my previous posts in numerical order(all part of the PersSec series)to understand how to protect yourself in every facet of your electronic life.

In my next posts I'm going to cover browser hardening, the dangers of metadata(and how you can prevent it), and how to encrypt your phone calls. This series covers just the basics and soon we'll be diving deep into real-life practical examples of hacking, forensics, and fraud.

If you found this useful please upvote and follow. If you have any questions leave them in the comments and I'll get back to you ASAP. Until then happy hacking and always use these skills for good.

Comments 1