VPN Chaining is a technique in which multiple virtual private network (VPN) servers are chained to improve online privacy while on the Internet.
Basically, what it means is that you are not connecting to a single VPN but to multiple ones in a layered system that looks like Your PC > 1st VPN > 2nd VPN > Internet.
Before we take a look at the how, we should discuss why you would want to do that. One argument is that you cannot trust any of the VPN providers out there.
While most claim these days that they don't log, there is virtually no way to prove that this is indeed the case.
And even if they don't log user activity, they may still be forced to cooperate and log activity of certain users connecting to the system, for instance when forced to do so by a court of law or when coerced.
VPN Chaining improves privacy by connecting to multiple VPN servers operated by different companies who -- preferably -- operate in different jurisdictions.
The advantage is that it becomes increasingly difficult to track users when they chain VPN servers.
There are disadvantages however, for instance that the setup is complicated, that maintaining multiple VPN accounts is more expensive than just one, and that there is still a possibility of being tracked.
|Improved privacy||complicated setup|
|more expensive (unless free services are used)|
|slower speeds, higher latency|
|Possibility of being tracked is still there|
Unless you operate all VPN servers that you want to chain, you cannot simply connect to the first VPN in the chain and be done with it.
Connecting to multiple VPNs simultaneously on the same device does not work as well which that leaves virtual machines as the best solution to get the ball rolling.
Basically, you connect to one VPN on the device you are using, and to others that you want as part of the chain in virtual machines.
A simple chain would look like this: PC > 1st VPN > Virtual Machine > 2nd VPN > Internet
You would have to perform all activity using the Virtual Machine to take advantage of the chaining.
How it works:
You can verify that the VPNs are chained by checking IP addresses. You will notice that the host device returns a different public IP than the virtual device.
Crazy chaining: you can add as many VPN services to the chain as you like, but you need to install a virtual machine inside the virtual machine for each of them.
Installation of VirtualBox and the host operating system should not pose problems to most users. The installation of the VPN service on the other hand may, but most VPN providers offer instructions on their web pages that detail the installation process on various operating systems including Linux.
VPN Chaining improves online privacy and while it does not offer 100% protection, it offers far better protection than a single VPN (which in turn offers better protection than connecting directly to the Internet).
Now You: Do you use a VPN?
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.