@rosskan
In theory, when you tunnel a 'VPN1' over another 'VPN2', VPN2 will see the originating IP as the one belonging to VPN1, not your real WAN IP.
So far, ok.
That said, when you subscribed to VPN1 and VPN2, you probably used your ISP IPv4 ^^
You installed the VPN1 (or2) application on your crappy laptop ?, if so, 'forget about it' ^^ 'as they know', the app is at an end point, and can see 'everything'.
Don't forget that you pay for your VPN subscription, but you give them more then your money.
They can see and use your data connection for 'data mining'. And they will make use of that data - by selling it. Why ? Because the share holders want a good financial result.
If you need to connect two (your !) networks (or sites) together, use your own VPN solution. Don't use a commercial company. For example, take the ones you got with pfSense.
If you really need to use that public network (aka : the Internet) to contact public servers, you are aware that the connection is already encrypted end-to-end ? That's what https is all about. 'http' doesn't really exist anymore / shouldn't be used.
Also, you need to take other steps to be safe : you really should start with removing "windows 10" out of the equitation ....
@rosskan said in What information can vpn provider see when I use wireguard?:
does wireguard share the mac address of the ethernet port of the crappy laptop with vpn provider #2?
MAC addresses travel on a local segment. Your laptop's MAC doesn't travel any further then the first hop, this is most probably your first router (gateway) like pfSense.
Packet capture your traffic to check this. The Ethernet headers are not encrypted.