←back to thread

Tailscale raises $100M

(tailscale.com)
854 points gmemstr | 1 comments | | HN request time: 0s | source
Show context
throwaway92394 ◴[] No.31260376[source]
Am I the only one that has an issue with a VPN that I can't self host? Presumably if Tailscale get's PWN'd or subpoenaed then your network is breached no?
replies(7): >>31260409 #>>31260514 #>>31260521 #>>31260540 #>>31260615 #>>31260804 #>>31261420 #
cpuguy83 ◴[] No.31260615[source]
Tailscale's data plane is [1] mostly p2p except for some cases where it doesn't work and it goes through an encrypted relay. So your data does not run through Tailscale servers.

There is an oss [2]coordination server that does let you totally self-host.

[1] https://tailscale.com/blog/how-nat-traversal-works/

[2] https://github.com/juanfont/headscale

replies(1): >>31268145 #
1. ignoramous ◴[] No.31268145[source]
If the tailscale control-plane is pwnd, outside of compromised ACLs (access controls) and DNS routes, I don't think it affects anything critical on the data-plane like passwords (because SSO) or private-keys since tailscale machine keys and node keys never leave the device: https://tailscale.com/blog/tailscale-key-management/