Censorship Circumvention

STEALTH VPN

Invisible. Unstoppable. Undetectable.

Not just a VPN — a traffic obfuscation engine. Your encrypted data looks like ordinary web browsing. Even deep packet inspection can’t tell the difference.

50+
Countries
Zero
Logs
DPI
Resistant
< 5ms
Overhead

See the Difference

Standard VPNs announce themselves. Trellis hides in plain sight.

Standard VPN
DPI Firewall
VPN
BLOCKED — VPN signature detected
Trellis Stealth
DPI Firewall
HTTPS
PASSED — Looks like normal HTTPS

Three Modes. One Mission.

Every network is different. Trellis gives you the right tool for every situation.

WireGuard Mode

Maximum Speed

Modern protocol with best-in-class performance. Ideal for streaming and downloads where speed matters most.

< 5ms Overhead

OpenVPN Mode

Maximum Compatibility

Battle-tested protocol that works on every platform and network configuration. Reliable and proven.

Works Everywhere

Trellis Protocol

Maximum Stealth

Our proprietary obfuscation protocol. Traffic is indistinguishable from normal HTTPS browsing. Built for hostile networks.

DPI Invisible

How Stealth Works

Four layers between your data and anyone trying to intercept it.

Step 01

Encrypt

Your data is encrypted with AES-256-GCM. Military-grade encryption that would take billions of years to crack.

Step 02

Obfuscate

Encrypted packets are wrapped in HTTPS-like headers and padded to match normal browsing traffic patterns.

Step 03

Domain Front

Traffic is routed through legitimate CDN domains. Censors see connections to allowed services, not to Trellis.

Step 04

Deliver

Decrypted at the exit node and delivered to its destination. No trace, no fingerprint, no evidence.

Key Features

Every feature designed for one purpose: keeping you invisible.

DPI Resistance

Deep packet inspection cannot distinguish Trellis traffic from normal HTTPS browsing. Tested against the Great Firewall of China and proven effective.

Auto Protocol Switch

If one protocol is detected or blocked, Trellis automatically switches to another. Seamless, invisible, instant. You stay connected no matter what.

Kill Switch

If VPN drops unexpectedly, all traffic is immediately blocked. No data ever leaks outside the encrypted tunnel. Zero exceptions.

Split Tunneling

Choose which apps use VPN and which go direct. Bank locally, browse globally. Full control over your traffic routing.

Multi-Hop

Route through 2 or more servers in different countries for extra privacy. Each hop adds a layer of anonymity that is nearly impossible to unravel.

Zero-Knowledge

No logs. No usage data. No connection timestamps. We could not identify you even if compelled to. True zero-knowledge architecture from the ground up.

Built for the World’s Most
Restricted Networks

Trellis Stealth is specifically optimized and tested for countries with advanced censorship infrastructure.

Iran
Maximum Stealth
China
DPI Bypass
Russia
Active Evasion
Turkey
Optimized
Egypt
Optimized
Myanmar
Active Evasion
Belarus
Optimized
Venezuela
Optimized
ARTA automatically activates maximum stealth settings when it detects you are connecting from a restricted country. No manual configuration required.

Server Network

Servers strategically placed across 50+ countries for maximum coverage and minimum latency.

50+
Countries
200+
Servers
Auto
Server Selection
< 20ms
Latency Routing
Browse Free. Browse Invisible.

Join thousands who trust Trellis to keep their communications private, secure, and unstoppable.