Privacy & Security

Get your identity hidden online, your IP Address will be masked with our server IP. Also your connection will be encrypted.

Bypass Cencorship

Bypass your school, government or your office internet cencorship. Unblock any site and enjoy Internet Freedom.

Boost Internet Speed

Our service may boost your internet speed and make your connection stable (stable PING). This differ by country.


Just choose which server you want.

What is Trojan Ws ?

Trojan Websocket tunneling is a method of transporting arbitrary networking data over an encrypted Trojan WS connection. It can be used to add encryption to legacy applications. It can also be used to implement VPNs (Virtual Private Networks) and access intranet services across firewalls.

Trojan Over Webscoket is a standard for secure remote logins and file transfers over untrusted networks. It also provides a way to secure the data traffic of any given application using port forwarding, basically tunneling any TCP/IP port over SSH.

We can improve the security of data on your computer when accessing the Internet, the Trojan Ws account as an intermediary your internet connection, Trojan will provide encryption on all data read, the new send it to another server.

Using Trojan Ws accounts for tunneling your internet connection does not guarantee to increase your internet speed. But by using Trojan Ws account, you use the automatic IP would be static and you can use privately.

What is Trojan Ws VPN?

n unidentifiable mechanism that helps you bypass Go. Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations. Trojan is not a fixed program or protocol. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever. We are the GreatER Fire; we ship Trojan Horses.

On penetrating Go, people assume that strong encryption and random obfuscation may cheat GFW’s filtration mechanism. However, trojan implements the direct opposite: it imitates the most common protocol across the wall, HTTPS, to trick GFW into thinking that it is HTTPS.

Keywords: trojan gfw, trojan vpn, free trojan vpn, trojan Ws.