TRELLIS VPN
Unstoppable Internet Access
A lightweight, multi-protocol VPN engineered to defeat censorship. Nine protocols. Automatic rotation. Traffic that looks like normal HTTPS — invisible to deep packet inspection.
Your Data, Fully Encrypted
Every byte is encrypted, disguised, and routed through our global network. Nobody sees what you send.
Built Different. Built to Last.
Not just another VPN. A censorship circumvention engine designed for the world’s most hostile networks.
Anti-Censorship
Multi-protocol rotation defeats DPI and deep packet inspection. When one protocol is blocked, Trellis automatically switches to another. Censors cannot keep up with a moving target.
Stealth Mode
Your VPN traffic is disguised as normal HTTPS browsing. Deep packet inspection sees ordinary web traffic — not encrypted tunnels. Invisible to censors, ISPs, and firewalls.
Lightning Fast
WireGuard core with smart server selection delivers blazing speeds with less than 5ms overhead. Stream, download, and browse without lag. Speed and security are not a trade-off.
Every Tool for Every Network
Nine distinct protocols, each optimized for different censorship environments. Automatic selection or manual override.
WireGuard
Modern, high-performance protocol. Minimal attack surface with state-of-the-art cryptography. Best-in-class speed.
OpenVPN
Battle-tested, open-source protocol. Works on any network configuration. The gold standard for reliability and compatibility.
V2Ray / VMess
Advanced proxy protocol with WebSocket and TLS transport. Tunnels through CDNs and load balancers undetected.
Shadowsocks
Lightweight encrypted proxy designed to bypass the Great Firewall. AEAD encryption with obfuscated handshake.
Trojan-GFW
Mimics legitimate HTTPS traffic perfectly. Undetectable to even the most advanced DPI systems. Password-authenticated.
Psiphon
Multi-transport circumvention tool. Automatically finds working transport in restrictive environments. Proven in 30+ countries.
Outline
Jigsaw’s access-focused protocol built on Shadowsocks. Simple deployment, strong encryption, hard to detect and block.
Hysteria2
QUIC-based protocol with brutal speed. Custom congestion control algorithm designed for high-loss, high-latency networks.
Domain Fronting
Routes traffic through major CDN domains. Censors see connections to Google or Amazon — blocking those breaks the internet.
Four Steps to Freedom
From tap to access in under a second. Here is what happens behind the scenes.
Connect
One tap. Trellis scans the network environment, detects censorship signatures, and selects the optimal protocol automatically.
Encrypt
Your data is encrypted with AES-256-GCM. Every packet gets a unique nonce. Forward secrecy ensures past sessions cannot be decrypted.
Disguise
Encrypted packets are wrapped in HTTPS-like headers, padded to normal traffic patterns, and routed through CDN endpoints. Invisible.
Bypass
Traffic flows through the firewall undetected. Censors see normal browsing. You get unrestricted, private internet access.
Everything You Need
Every feature designed for maximum privacy, security, and reliability. No compromises.
Kill Switch
If VPN drops, all traffic is blocked instantly. Zero data leaks outside the encrypted tunnel. Always on, always watching.
DNS Leak Protection
All DNS queries routed through encrypted tunnel. No ISP snooping, no DNS hijacking, no leaks to third-party resolvers.
Split Tunneling
Choose which apps use VPN and which go direct. Bank locally, browse globally. Full control over your traffic routing.
Auto-Connect on WiFi
Automatically activates VPN when you join an untrusted WiFi network. Coffee shops, hotels, airports — always protected.
Multi-Hop
Route through 2+ servers in different countries. Each hop adds a layer of anonymity. Nearly impossible to trace back to source.
Bridge Mode
Use Trellis as a bridge relay for others in censored regions. Lend your bandwidth to help someone access the open internet.
P2P Mesh Relay
When servers are unreachable, traffic routes through peer mesh nodes. Decentralized fallback that cannot be taken offline.
Stealth SSID Hotspot
Share VPN-protected internet via hotspot. Randomized SSID mimics consumer routers. Connected devices inherit full VPN protection.
Speed Test & Health
Built-in speed testing and connection health monitoring. Dynamic server list updates in real-time based on latency and load.
Available Everywhere
Trellis VPN runs on the platforms that matter most. Desktop support coming soon.
Android
iOS
Windows
macOS
Free to Start. Premium to Unlock.
Start with 3 free servers. Upgrade to unlock the full network, stealth protocols, and advanced features.
Get started with essential protection.
- 3 Server Locations
- WireGuard Protocol
- Kill Switch
- Zero Logs
Full power. Full stealth. Full freedom.
- All 50+ Server Locations
- All 9 Protocols + Stealth
- Multi-Hop & Bridge Mode
- P2P Mesh Relay
- Stealth SSID Hotspot
- Priority Support
Millions of people live behind digital walls. Trellis VPN tears them down. Download free today and browse without borders.