For you to actually maintain anonymity while engaging in your nefarious (just kidding... ethical) hacking activities, this instruction is more conceptual in nature.
Here is an overview (which is excessive, but the idea is sound):
Begin with a native device (turn it on, dummy).
Use your Torguard VPN to access the internet (purchased with Bitcoin).
Set up VMware.
Install Kali Linux inside of VMWare (this will be your Kali Linux ONE machine).
Reconnect to the web using your Torguard VPN (again).
The Kali Linux ONE system should have Virtualbox installed.
Install Whonix Gateway on your VirtualBox by downloading it (this sends your connections through the Tor network).
Install and start the Whonix Gateway computer.
Install Kali Linux 2 inside of Virtualbox.
Make sure that all traffic is routed through the Whonix Gateway while setting up this second Kali Linux computer by setting the adapter to "Internal Network."
By doing this, Kali Linux will make sure that all traffic is routed through the Tor network.
It takes a bit to set up and is sophisticated, but it can get beyond GMail's intricate and sensitive security measures, which makes it very awesome.
Here is an overview (which is excessive, but the idea is sound):
Begin with a native device (turn it on, dummy).
Use your Torguard VPN to access the internet (purchased with Bitcoin).
Set up VMware.
Install Kali Linux inside of VMWare (this will be your Kali Linux ONE machine).
Reconnect to the web using your Torguard VPN (again).
The Kali Linux ONE system should have Virtualbox installed.
Install Whonix Gateway on your VirtualBox by downloading it (this sends your connections through the Tor network).
Install and start the Whonix Gateway computer.
Install Kali Linux 2 inside of Virtualbox.
Make sure that all traffic is routed through the Whonix Gateway while setting up this second Kali Linux computer by setting the adapter to "Internal Network."
By doing this, Kali Linux will make sure that all traffic is routed through the Tor network.
It takes a bit to set up and is sophisticated, but it can get beyond GMail's intricate and sensitive security measures, which makes it very awesome.