Yes it could be a hacker or a woops from YouTube. To bypass the need for a proxy or a tor network a hacker will use everyday websites to send information to and from computers. They could have infected you with apps to upload encrypted keylogs to an email account and retrieve them from a remote location which bypasses the ip to ip setup. They could also send you commands by sending an email to a remote server and having a pre configured script to check the emails and use the info to run a command script.
It sounds confusing but this is how it works.
I infect your computer with a virus to check emails at email@example.com
once it receives an email it decrypts it and interprets as a command. I could ask it to extract this attachment which is a keylog virus and record all keystrokes and save to an encrypted file. I then send an email for it to send that file to firstname.lastname@example.org
then i decrypt the keylogs to find bank statements chat logs and so on.
To stop this you will need to have virus protection and a good firewall to see what programs are communicating through your computer. you will need to learn what programs are suppose to communicate through the computer and how. This is very advanced hacking and it probably isn’t evan happening in this instance but I thought I would give the forum users an fyi.