Trellis for China

When the Internet Is Blocked, We Keep You Connected

当互联网被封锁时,我们让你保持连接

The Great Firewall is the most sophisticated censorship apparatus ever built. It blocks VPNs, monitors every message on WeChat, censors search results in real time, and punishes citizens for circumventing it. Trellis works anyway.

Download APK → How It Works

Inside the Great Firewall

China operates the world's most advanced internet censorship system. Over 900 million internet users live behind a digital wall that grows more sophisticated every year.

311,000+ Domains Blocked
900M+ Internet Users Affected
100+ VPN Services Blocked
1.2B+ WeChat Users Monitored
10,000+ Censors Employed
178th Press Freedom Ranking
2003

Golden Shield Project Launched

China deploys the Great Firewall at scale. Deep packet inspection, DNS poisoning, and IP blacklisting form the backbone of the world's most comprehensive censorship infrastructure. Google, Facebook, Twitter, and YouTube are progressively blocked.

2017

VPN Crackdown Intensifies

China mandates that all VPN services must be state-approved. Apple removes hundreds of VPN apps from the Chinese App Store. Individual users face fines and detention for "unauthorized" VPN use. The noose tightens.

2019-2020

Xinjiang & COVID Censorship

Complete internet blackouts in Xinjiang during Uyghur detention campaigns. COVID whistleblowers silenced on WeChat and Weibo. Dr. Li Wenliang's warnings censored before his death. Information control costs lives.

2022-Present

AI-Powered Censorship

Machine learning models now detect and block VPN traffic in real time. Protocol fingerprinting identifies and throttles encrypted tunnels within seconds. Even state-of-the-art obfuscation tools are caught within hours. The Great Firewall has become adaptive.

Ongoing

Social Credit Integration

VPN usage now factors into social credit scoring. Citizens caught circumventing the firewall face reduced access to travel, loans, and employment. Digital compliance becomes a prerequisite for daily life.

“The Great Firewall is not just a technical system. It is a system of control that shapes what 900 million people can know, think, and say.”
— Freedom House, Freedom on the Net Report

VPNs Are No Longer Enough

China's censorship infrastructure evolves faster than traditional circumvention tools. The Great Firewall learns, adapts, and blocks new protocols within days.

Deep Packet Inspection

Every packet crossing China's borders is inspected in real time. Standard VPN protocols like OpenVPN, WireGuard, and IPSec are identified and blocked within seconds. Traffic analysis detects even encrypted tunnels by their patterns.

Active Probing

The GFW doesn't just passively monitor — it actively probes suspected VPN servers. It connects to them, tests whether they respond like a VPN, and blocks them if confirmed. Server IPs are burned within hours of deployment.

AI-Driven Adaptation

Machine learning classifies traffic flows and detects new circumvention tools automatically. The firewall trains on captured VPN traffic, learning to identify new protocols before they gain widespread adoption. A cat-and-mouse game where the cat has a supercomputer.

“China's internet censorship apparatus is not a wall. It is an intelligent, adaptive system that learns from every attempt to circumvent it.”
— Citizen Lab, University of Toronto

Built to Defeat the Great Firewall

Trellis doesn't rely on any single bypass technique. It layers multiple anti-censorship technologies, each designed specifically for the Chinese internet environment.

Domain Fronting

Traffic is routed through major cloud CDNs — Alibaba Cloud, Tencent Cloud, Cloudflare. The GFW sees connections to legitimate cloud services. Blocking these would break China's own internet economy. Your communication hides inside traffic that can't be blocked.

V2Ray / VMess Protocol

Designed from the ground up to bypass the GFW. WebSocket transport makes traffic look like normal web browsing. mKCP protocol mimics video streaming. Multiple transport options auto-switch when one is detected. The protocol that GFW researchers call their biggest challenge.

Trojan-GFW

Indistinguishable from normal HTTPS traffic. Runs on standard port 443. Presents a legitimate TLS certificate and serves a real website to probing connections. The GFW cannot tell the difference between Trojan-GFW and a regular HTTPS website. Perfect stealth.

Mesh Networking

When the internet is completely unavailable, Trellis creates device-to-device networks using BLE and WiFi Aware. Messages hop from phone to phone without touching any infrastructure. No ISP. No GFW. No kill switch. Communication that needs nothing but nearby phones.

Shadowsocks with AEAD

The original GFW bypass tool, evolved. AEAD encryption defeats replay attacks. Traffic is indistinguishable from random noise. Automatic server rotation keeps IPs fresh. Combined with SIP003 plugins for additional obfuscation. Battle-tested by millions of Chinese users.

Stealth Mode

App disguises as a calculator, weather app, or notes application. Fully functional decoy interface. Secret gesture reveals Trellis. If police check your phone, they see a calculator. Running processes show innocent names. No trace of censorship bypass on your device.

Anti-Forensics

Defeats device inspection tools used by Chinese authorities. RAM-only data storage leaves no recoverable trace. Hardware keystore encryption. 3-pass deletion. If your device is seized, there is no evidence of Trellis or your communications.

Free for All Chinese Users

Geofencing auto-detects users inside China and grants full premium features for free. No payment required. No account needed. Mesh-earned credits for optional features. No one is left unprotected because of where they were born.

How Trellis Reaches China

Google Play is blocked. The App Store is censored. Getting Trellis to 900 million people requires distribution methods the GFW cannot control.

APK Sideloading

Direct APK distribution through encrypted channels. File size optimized for transfer via AirDrop, Bluetooth, and local file sharing. Chinese Android phones support sideloading natively — no Play Store needed.

QR Code Sharing

QR codes are ubiquitous in China. Scan a code to download the APK directly. Codes can be shared in person, printed on flyers, or embedded in images. Each code is disposable — blocked codes are replaced instantly.

Mesh Distribution

Once one person in a building has Trellis, they can share the APK to nearby phones via mesh. The app spreads like a virus of freedom — no internet required. Each new install becomes another relay node.

Diaspora Bridge Network

Chinese communities abroad run Trellis relay nodes. These bridge the GFW — connecting mesh networks inside China to the global internet through residential IP addresses that are hard to block at scale.

CDN Tunneling

Distribution servers hosted behind major CDNs used by Chinese businesses. Blocking the download would mean blocking legitimate commerce. Updates delivered through the same channels. Always available.

Every Layer of the Firewall, Defeated

When the GFW Is Filtering

V2Ray with WebSocket transport. Trojan-GFW over TLS 1.3. Shadowsocks with AEAD. Domain fronting through Alibaba Cloud. Traffic that looks identical to normal HTTPS browsing. Automatic protocol rotation when detection is sensed.

When VPNs Are Actively Probed

Trojan-GFW serves a real website to probing connections. V2Ray responds as a normal web server. No server reveals itself as a proxy under any form of active probing. Probe-resistant by design, not by luck.

During Regional Shutdowns

BLE mesh networking creates local communication grids. WiFi Aware extends range. Messages propagate across neighborhoods, campuses, and protest areas without touching the internet. The mesh cannot be firewalled.

When Your Device Is Inspected

Duress PIN shows a clean, convincing fake interface. Stealth mode disguises Trellis as a calculator. RAM-only operation. Anti-forensic protection. No recoverable evidence. Full plausible deniability under device inspection.

Information Is a Human Right

900 million people live behind the Great Firewall. They cannot read uncensored news. They cannot speak freely on social media. They cannot access the tools the rest of the world takes for granted. Every search is filtered. Every message is scanned. Every VPN that works today is blocked tomorrow.

Trellis was built because no one should have to choose between their safety and their right to information. V2Ray, Trojan-GFW, Shadowsocks, mesh networking — these are not just protocols. They are lifelines. When the firewall adapts, Trellis adapts faster. When the internet is cut entirely, the mesh keeps going.

84 patents pending. Not for profit. For freedom.
— Trellis Project · Built in the Open

Break Through the Wall

Download the APK. Share it with someone inside China. Every new device strengthens the mesh. Every relay weakens the firewall.

Download APK → Share with Others →

Simplified & Traditional Chinese supported · Free for all Chinese users · 84 patents pending