Encrypted Tethering

SECURE HOTSPOT GATEWAY

Your Phone Becomes an Encrypted Access Point

Turn any phone into a VPN-protected WiFi hotspot. Every connected device gets full encryption, kill switch protection, and stealth routing — automatically.

Four Steps. Total Protection.

From hotspot activation to full encryption in under a second. Every connected device is automatically protected.

Step 01

Enable Hotspot

Tap once to activate the Secure Hotspot Gateway. Trellis configures NAT routing, firewall rules, and SSID broadcasting automatically.

Step 02

VPN Tunnel Activates

WireGuard kernel tunnel establishes an encrypted corridor. All tethered traffic is forced through the VPN — no exceptions, no bypasses.

Step 03

Devices Connect

Phones, laptops, tablets — any WiFi device connects normally. Captive portal greets users with a branded security dashboard.

Step 04

All Traffic Encrypted

Every byte from every device is encrypted, disguised, and routed through the VPN tunnel. Zero leaks. Zero exposure. Total protection.

Phone
Laptop
Tablet
Trellis Hotspot
VPN Tunnel
Internet

Complete Hotspot Protection

Every feature engineered for one goal: every connected device gets the same level of protection as the host.

VPN Failsafe

If the VPN connection drops for any reason, all tethered traffic is blocked instantly. No data ever leaks outside the encrypted tunnel. Connected devices experience a brief pause, never an exposure.

Zero-Leak Guarantee

Captive Portal

Branded security dashboard greets every connecting device. Shows VPN status, encryption level, connected device count, and security posture. Professional-grade access management.

Branded Dashboard

Stealth SSID

Randomized SSID mimics common consumer router names. To network scanners and surveillance systems, your hotspot looks like a regular home WiFi — not a VPN gateway.

Invisible

Mesh-VPN Bridge

Extends VPN protection to mesh-connected devices. If you are part of a Trellis mesh network, every peer that connects through your hotspot gets full tunnel protection.

Mesh + VPN

Per-Device Management

Kick devices, monitor real-time bandwidth usage, set data limits, and view connection history. Full administrative control over who connects and how much they consume.

Full Control

ARTA Integration

Security posture adapts dynamically based on ARTA threat level. When threats are detected, the hotspot automatically tightens encryption, enables stealth SSID, and restricts new connections.

Adaptive

Technical Specifications

Built on battle-tested Linux networking primitives. No black boxes. No proprietary magic. Just solid engineering.

Networking Stack

  • iptables NAT routing with MASQUERADE
  • WireGuard kernel-space tunnel (no userspace overhead)
  • Captive portal probe interception via DNS redirect
  • dnsmasq for DHCP + DNS resolution
  • Bandwidth monitoring via sysfs counters

Captive Portal Support

  • Android: connectivitycheck.gstatic.com
  • Apple: captive.apple.com
  • Windows: msftconnecttest.com
  • Firefox: detectportal.firefox.com
  • Samsung: samsung-hub.samsung.com

Security Architecture

  • AES-256-GCM encryption for all tunneled traffic
  • Kill switch via iptables DROP default policy
  • DNS leak prevention with forced resolver override
  • Per-device ARP isolation to prevent lateral attacks
  • SSID randomization with consumer router name pool

Who Is This For?

Real-world scenarios where a Secure Hotspot Gateway makes the difference between exposure and protection.

Journalism

Reporting from Restricted Zones

A journalist in a censored country enables Trellis Hotspot. Their entire reporting team — photographers, editors, translators — connects and gets encrypted internet access. Stealth SSID prevents the hotspot from appearing on government network sweeps.

Education

Secure WiFi on Field Trips

A school provides encrypted WiFi during field trips using a teacher’s phone. Students connect for research, and every query is protected. Content filtering and bandwidth limits prevent misuse.

Emergency Response

Secure Communication Hub

An emergency worker creates a secure communication hub in a disaster zone. First responders connect to coordinate via encrypted channels. VPN failsafe ensures that if cellular becomes unstable, no sensitive location data leaks.

9
Secure Hotspot VPN Gateway
Patent-Protected Technology
16 Independent Claims
Protect Every Device.
One Tap.

Your phone is more powerful than you think. Turn it into an encrypted gateway and protect everyone around you.