If you require privacy while connected to the internet – and I mean really require it – there is no reason to only make it part of the way to being safe. In the world we live in today, it’s foolish to ever assume you’re completely untraceable. The most we can accomplish is making it as difficult as possible for the tracing to happen. Nearly every tool we use for privacy has been compromised in some way or another; users are repetitively making careless mistakes and the government is successfully capitalizing on them. Nobody is secure.
That being said, there are ways to make tracking you down so increasingly difficult that only the most well-funded and militantly dedicated entities will pursue you. One instance of this type of set-up, while not as complex as it could be, involves running Tor with multiple VPNs—inside virtual machines. It’s admittedly a major pain in the ass, but it’s one of the most secure ways to access the internet. I’ll be covering the basics of running Tor within a VPN within a virtual machine.
VPNs can be very secure – in fact, a good one could be potentially unbreakable. It’s important to make absolutely sure