The phrase in the title is a common trope that comes up when VPN services are discussed. While this statement is technically correct, it can be misleading, as it implies that all providers handle law enforcement requests and prepare for worst case scenarios similarly, so their conduct cannot be a differentiating factor when you evaluate them.
Soooo how to split the packets up between 3 VPNs to make each providers piece useless?
You’re about 15% of the way to re-inventing Tor.
check out Nym, they are doing this kind of network
Sounds very similar to Safing Privacy Network. They route different applications across nodes (Tor-esque).
That does not work unless you involve yet another party after the VPNs and before the destination to rebuild the packets, as the destination won’t know what to do with these split packets.
At that point you may be better off using an anonymity network with or without the VPN.