

Therefore, it’s irrelevant that VIP72 offers a Double VPN feature, or that OpenVPN encrypts your data using the powerful AES-256 cipher – the risk is not worth it.

This may cause you to become an unwitting participant of a cyberattack or worse. A 2015 analysis by the popular anti-malware company Malwarebytes Labs revealed that VIP72 is responsible for spreading the Bunitu trojan, which turns users’ computers into machines on a botnet. Moreover – and this is a big “moreover” – there’s reason to believe that VIP72 is a delivery mechanism for malware. OpenVPN is generally thought of as a solid tunneling protocol, but that depends on the encryption cipher used with it. The level of security is very uncertain because the website has practically no information about it. You can use VIP72 through the Windows OpenVPN-based client or a SOCKS client. There’s reason to believe that VIP72 is a delivery mechanism for malware. Read our full VIP72 review to learn more, but make sure you give this one a hard pass. The service has been linked to the infamous Bunitu botnet, and shouldn’t be trusted by anyone. It looks like a digital fossil, offers very little information, and presents everything in English so broken not even MacGyver could fix it. One look at the VIP72 website should stop anyone from using this god-awful VPN/proxy service.
