Trellis for China
When the Internet Is Blocked, We Keep You Connected
当互联网被封锁时,我们让你保持连接
The Great Firewall is the most sophisticated censorship apparatus ever built. It blocks VPNs, monitors every message on WeChat, censors search results in real time, and punishes citizens for circumventing it. Trellis works anyway.
Inside the Great Firewall
China operates the world's most advanced internet censorship system. Over 900 million internet users live behind a digital wall that grows more sophisticated every year.
Golden Shield Project Launched
China deploys the Great Firewall at scale. Deep packet inspection, DNS poisoning, and IP blacklisting form the backbone of the world's most comprehensive censorship infrastructure. Google, Facebook, Twitter, and YouTube are progressively blocked.
VPN Crackdown Intensifies
China mandates that all VPN services must be state-approved. Apple removes hundreds of VPN apps from the Chinese App Store. Individual users face fines and detention for "unauthorized" VPN use. The noose tightens.
Xinjiang & COVID Censorship
Complete internet blackouts in Xinjiang during Uyghur detention campaigns. COVID whistleblowers silenced on WeChat and Weibo. Dr. Li Wenliang's warnings censored before his death. Information control costs lives.
AI-Powered Censorship
Machine learning models now detect and block VPN traffic in real time. Protocol fingerprinting identifies and throttles encrypted tunnels within seconds. Even state-of-the-art obfuscation tools are caught within hours. The Great Firewall has become adaptive.
Social Credit Integration
VPN usage now factors into social credit scoring. Citizens caught circumventing the firewall face reduced access to travel, loans, and employment. Digital compliance becomes a prerequisite for daily life.
“The Great Firewall is not just a technical system. It is a system of control that shapes what 900 million people can know, think, and say.”— Freedom House, Freedom on the Net Report
VPNs Are No Longer Enough
China's censorship infrastructure evolves faster than traditional circumvention tools. The Great Firewall learns, adapts, and blocks new protocols within days.
Deep Packet Inspection
Every packet crossing China's borders is inspected in real time. Standard VPN protocols like OpenVPN, WireGuard, and IPSec are identified and blocked within seconds. Traffic analysis detects even encrypted tunnels by their patterns.
Active Probing
The GFW doesn't just passively monitor — it actively probes suspected VPN servers. It connects to them, tests whether they respond like a VPN, and blocks them if confirmed. Server IPs are burned within hours of deployment.
AI-Driven Adaptation
Machine learning classifies traffic flows and detects new circumvention tools automatically. The firewall trains on captured VPN traffic, learning to identify new protocols before they gain widespread adoption. A cat-and-mouse game where the cat has a supercomputer.
“China's internet censorship apparatus is not a wall. It is an intelligent, adaptive system that learns from every attempt to circumvent it.”— Citizen Lab, University of Toronto
Built to Defeat the Great Firewall
Trellis doesn't rely on any single bypass technique. It layers multiple anti-censorship technologies, each designed specifically for the Chinese internet environment.
Domain Fronting
Traffic is routed through major cloud CDNs — Alibaba Cloud, Tencent Cloud, Cloudflare. The GFW sees connections to legitimate cloud services. Blocking these would break China's own internet economy. Your communication hides inside traffic that can't be blocked.
V2Ray / VMess Protocol
Designed from the ground up to bypass the GFW. WebSocket transport makes traffic look like normal web browsing. mKCP protocol mimics video streaming. Multiple transport options auto-switch when one is detected. The protocol that GFW researchers call their biggest challenge.
Trojan-GFW
Indistinguishable from normal HTTPS traffic. Runs on standard port 443. Presents a legitimate TLS certificate and serves a real website to probing connections. The GFW cannot tell the difference between Trojan-GFW and a regular HTTPS website. Perfect stealth.
Mesh Networking
When the internet is completely unavailable, Trellis creates device-to-device networks using BLE and WiFi Aware. Messages hop from phone to phone without touching any infrastructure. No ISP. No GFW. No kill switch. Communication that needs nothing but nearby phones.
Shadowsocks with AEAD
The original GFW bypass tool, evolved. AEAD encryption defeats replay attacks. Traffic is indistinguishable from random noise. Automatic server rotation keeps IPs fresh. Combined with SIP003 plugins for additional obfuscation. Battle-tested by millions of Chinese users.
Stealth Mode
App disguises as a calculator, weather app, or notes application. Fully functional decoy interface. Secret gesture reveals Trellis. If police check your phone, they see a calculator. Running processes show innocent names. No trace of censorship bypass on your device.
Anti-Forensics
Defeats device inspection tools used by Chinese authorities. RAM-only data storage leaves no recoverable trace. Hardware keystore encryption. 3-pass deletion. If your device is seized, there is no evidence of Trellis or your communications.
Free for All Chinese Users
Geofencing auto-detects users inside China and grants full premium features for free. No payment required. No account needed. Mesh-earned credits for optional features. No one is left unprotected because of where they were born.
How Trellis Reaches China
Google Play is blocked. The App Store is censored. Getting Trellis to 900 million people requires distribution methods the GFW cannot control.
APK Sideloading
Direct APK distribution through encrypted channels. File size optimized for transfer via AirDrop, Bluetooth, and local file sharing. Chinese Android phones support sideloading natively — no Play Store needed.
QR Code Sharing
QR codes are ubiquitous in China. Scan a code to download the APK directly. Codes can be shared in person, printed on flyers, or embedded in images. Each code is disposable — blocked codes are replaced instantly.
Mesh Distribution
Once one person in a building has Trellis, they can share the APK to nearby phones via mesh. The app spreads like a virus of freedom — no internet required. Each new install becomes another relay node.
Diaspora Bridge Network
Chinese communities abroad run Trellis relay nodes. These bridge the GFW — connecting mesh networks inside China to the global internet through residential IP addresses that are hard to block at scale.
CDN Tunneling
Distribution servers hosted behind major CDNs used by Chinese businesses. Blocking the download would mean blocking legitimate commerce. Updates delivered through the same channels. Always available.
Every Layer of the Firewall, Defeated
When the GFW Is Filtering
V2Ray with WebSocket transport. Trojan-GFW over TLS 1.3. Shadowsocks with AEAD. Domain fronting through Alibaba Cloud. Traffic that looks identical to normal HTTPS browsing. Automatic protocol rotation when detection is sensed.
When VPNs Are Actively Probed
Trojan-GFW serves a real website to probing connections. V2Ray responds as a normal web server. No server reveals itself as a proxy under any form of active probing. Probe-resistant by design, not by luck.
During Regional Shutdowns
BLE mesh networking creates local communication grids. WiFi Aware extends range. Messages propagate across neighborhoods, campuses, and protest areas without touching the internet. The mesh cannot be firewalled.
When Your Device Is Inspected
Duress PIN shows a clean, convincing fake interface. Stealth mode disguises Trellis as a calculator. RAM-only operation. Anti-forensic protection. No recoverable evidence. Full plausible deniability under device inspection.
Information Is a Human Right
900 million people live behind the Great Firewall. They cannot read uncensored news. They cannot speak freely on social media. They cannot access the tools the rest of the world takes for granted. Every search is filtered. Every message is scanned. Every VPN that works today is blocked tomorrow.— Trellis Project · Built in the Open
Trellis was built because no one should have to choose between their safety and their right to information. V2Ray, Trojan-GFW, Shadowsocks, mesh networking — these are not just protocols. They are lifelines. When the firewall adapts, Trellis adapts faster. When the internet is cut entirely, the mesh keeps going.
84 patents pending. Not for profit. For freedom.
Break Through the Wall
Download the APK. Share it with someone inside China. Every new device strengthens the mesh. Every relay weakens the firewall.
Simplified & Traditional Chinese supported · Free for all Chinese users · 84 patents pending