Censorship-Proof Connectivity

TRELLIS VPN

Unstoppable Internet Access

A lightweight, multi-protocol VPN engineered to defeat censorship. Nine protocols. Automatic rotation. Traffic that looks like normal HTTPS — invisible to deep packet inspection.

9
Protocols
84
Patents
Zero
Logs
100%
Open Audit

Your Data, Fully Encrypted

Every byte is encrypted, disguised, and routed through our global network. Nobody sees what you send.

YOUR DEVICE
INTERNET
AES-256-GCM Encrypted Tunnel

Built Different. Built to Last.

Not just another VPN. A censorship circumvention engine designed for the world’s most hostile networks.

Anti-Censorship

Multi-protocol rotation defeats DPI and deep packet inspection. When one protocol is blocked, Trellis automatically switches to another. Censors cannot keep up with a moving target.

Stealth Mode

Your VPN traffic is disguised as normal HTTPS browsing. Deep packet inspection sees ordinary web traffic — not encrypted tunnels. Invisible to censors, ISPs, and firewalls.

Lightning Fast

WireGuard core with smart server selection delivers blazing speeds with less than 5ms overhead. Stream, download, and browse without lag. Speed and security are not a trade-off.

Every Tool for Every Network

Nine distinct protocols, each optimized for different censorship environments. Automatic selection or manual override.

WireGuard

Modern, high-performance protocol. Minimal attack surface with state-of-the-art cryptography. Best-in-class speed.

Fastest

OpenVPN

Battle-tested, open-source protocol. Works on any network configuration. The gold standard for reliability and compatibility.

Universal

V2Ray / VMess

Advanced proxy protocol with WebSocket and TLS transport. Tunnels through CDNs and load balancers undetected.

Stealth

Shadowsocks

Lightweight encrypted proxy designed to bypass the Great Firewall. AEAD encryption with obfuscated handshake.

Anti-GFW

Trojan-GFW

Mimics legitimate HTTPS traffic perfectly. Undetectable to even the most advanced DPI systems. Password-authenticated.

Invisible

Psiphon

Multi-transport circumvention tool. Automatically finds working transport in restrictive environments. Proven in 30+ countries.

Resilient

Outline

Jigsaw’s access-focused protocol built on Shadowsocks. Simple deployment, strong encryption, hard to detect and block.

Accessible

Hysteria2

QUIC-based protocol with brutal speed. Custom congestion control algorithm designed for high-loss, high-latency networks.

QUIC Speed

Domain Fronting

Routes traffic through major CDN domains. Censors see connections to Google or Amazon — blocking those breaks the internet.

CDN Routed

Four Steps to Freedom

From tap to access in under a second. Here is what happens behind the scenes.

Step 01

Connect

One tap. Trellis scans the network environment, detects censorship signatures, and selects the optimal protocol automatically.

Step 02

Encrypt

Your data is encrypted with AES-256-GCM. Every packet gets a unique nonce. Forward secrecy ensures past sessions cannot be decrypted.

Step 03

Disguise

Encrypted packets are wrapped in HTTPS-like headers, padded to normal traffic patterns, and routed through CDN endpoints. Invisible.

Step 04

Bypass

Traffic flows through the firewall undetected. Censors see normal browsing. You get unrestricted, private internet access.

Everything You Need

Every feature designed for maximum privacy, security, and reliability. No compromises.

Kill Switch

If VPN drops, all traffic is blocked instantly. Zero data leaks outside the encrypted tunnel. Always on, always watching.

DNS Leak Protection

All DNS queries routed through encrypted tunnel. No ISP snooping, no DNS hijacking, no leaks to third-party resolvers.

Split Tunneling

Choose which apps use VPN and which go direct. Bank locally, browse globally. Full control over your traffic routing.

Auto-Connect on WiFi

Automatically activates VPN when you join an untrusted WiFi network. Coffee shops, hotels, airports — always protected.

Multi-Hop

Route through 2+ servers in different countries. Each hop adds a layer of anonymity. Nearly impossible to trace back to source.

Bridge Mode

Use Trellis as a bridge relay for others in censored regions. Lend your bandwidth to help someone access the open internet.

P2P Mesh Relay

When servers are unreachable, traffic routes through peer mesh nodes. Decentralized fallback that cannot be taken offline.

Stealth SSID Hotspot

Share VPN-protected internet via hotspot. Randomized SSID mimics consumer routers. Connected devices inherit full VPN protection.

Speed Test & Health

Built-in speed testing and connection health monitoring. Dynamic server list updates in real-time based on latency and load.

Available Everywhere

Trellis VPN runs on the platforms that matter most. Desktop support coming soon.

Android

Available Now

iOS

Available Now

Windows

Coming Soon

macOS

Coming Soon

Free to Start. Premium to Unlock.

Start with 3 free servers. Upgrade to unlock the full network, stealth protocols, and advanced features.

Free
$0/mo

Get started with essential protection.

  • 3 Server Locations
  • WireGuard Protocol
  • Kill Switch
  • Zero Logs
Download Free
Take Back Your Internet

Millions of people live behind digital walls. Trellis VPN tears them down. Download free today and browse without borders.