Talking about them here certainly does attract attention. However, the actual setup doesn't attract attention. On either end, it just looks like you're using a VPN, which has become quite common with attacks on torrent users. The fact that you're using Tor isn't apparant until one of the VPNs is compromised. However, even if both VPNs were compromised, attackers wouldn't know that they're looking at a VPN>Tor>VPN setup. They wouldn't know that until they had compromised Tor, which is nontrivial. If, on the other hand, you deanonymize yourself by revealing personal information, the process of attacking your Internet connections will quickly reveal the VPN>Tor>VPN setup. Even then, confirmation would require considerable effort, I believe.