Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

  • milicent_bystandr@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    3 hours ago

    Tailscale is great. The principle concern to me is that your super easy mesh network depends on Tailscale so if they want it they have control, and if they change their pricing or options you depend on them, and though they can’t see the data you send they can see the topology of your network and where all your computers/devices are.

    I use Nebula, which is more work to set up and doesn’t have some of the features, not But if you slap the ‘lighthouse’ (administrating node) on a cheap VPS it works great. And it has some advantages. But Nebula also troubles me: though it’s fully open source and fully in your control, the documentation isn’t great. Instead, you can now get “managed nebula”, which puts you in the same problem as Tailscale: the company sees and controls your network topology. I fear the company (Defined Networking) is trying to push things that way. Even their android app you can’t fully configure unless you use their ‘managed’ service.

    For now, Nebula is great, and my preferred mesh network (I looked into all the main ones). And for Tailscale you can run the administration server yourself with Headscale and be fully in your control.


    Actually I wish Tailscale the best as a profitable business. They’ve created a fantastic service and system. But for me, I’d rather my network be in my own hands and for my own eyes. And, as is OP’s main point, once they have enough dependent users, the service might turn much worse.

  • Lka1988@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    22
    arrow-down
    1
    ·
    edit-2
    4 hours ago

    Tailscale never sat right with me. The convenience was nice, but - like other VC-funded projects - it followed that ever-familiar pattern of an “easy” service popping up out of nowhere and gaining massive popularity seemingly overnight. 🚩🚩🚩

    I can’t say I’m surprised by any of this.

    • fuckwit_mcbumcrumble@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      3 hours ago

      Would you rather a difficult and hard to use program?

      Easy to use means people will want to adopt it, and that’s what VC companies want. Nobody wants to pay millions of dollars to make a program that nobody wants to use.

      • Lka1988@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        13
        arrow-down
        2
        ·
        edit-2
        3 hours ago

        My problem isn’t directly with the programs - my problem lies with VC funding in general. Because they will come back for their money, and the project will inevitably enshittify and shove out enthusiasts in the never-ending search for infinite money.

        The solution is getting rid of VC bullshit entirely. But we all know that will never happen.

  • LiveLM@lemmy.zip
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    3 hours ago

    I always knew it was too nice to stay non-shitty forever.
    Guess it’s time for me to pester my ISP to let me open some ports

  • HelloRoot@lemy.lol
    link
    fedilink
    English
    arrow-up
    78
    ·
    6 hours ago

    a long runway that allows us to become profitable when needed

    Switch to self-hosting headscale when they enshittify in an attempt to become profitable, duh

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 hours ago

      I mainly use Tailscale (and Zerotier) to access my CGNATED LAN, headscale will require me to pay a subscription for a VPS wouldn’t it?

      I really envy the guys who say only use them because they’re lazy to open ports or want a more secure approach, I use them because I NEED them lol.

      If (when?) Tailscale enshitify I’ll stick with ZT a bit until it goes the same way lol, I started using it 1st, I don’t know if ZT came before Tailscale though.

      • not_amm@lemmy.ml
        link
        fedilink
        English
        arrow-up
        4
        ·
        2 hours ago

        Same. I mean, I was already looking to rent a VPS, but at least there’s some time so I can save money until things get weird.

        • kratoz29@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 hour ago

          Yeah, don’t get me wrong, I can see value of getting a VPS, especially if you are gonna be using it for some other projects, I have had a DO instance in the past and I thinkered with WG back then BTW, but if it is only for remote accessing your home LAN, I don’t feel like paying for it tbh, especially when some users get it for free (public IPv4) and it feels even dumber for me since I have a fully working IPv6 setup!

          BTW my ISP is funny, no firewall at all with it, I almost fainted when I noticed everyone could access my self hosted services with the IPv6 address and I did nothing regarding ports or whatsoever… They were fully accessible once I fired up the projects! I think I read an article about this subject… But I can’t recall when or where… I had to manually set up a firewall, which tbh, you always should do and it is especially easy to do in a Synology NAS.

          Anyway, back to the mesh VPN part, if they enshitify so be it, but in the meantime we still can benefit from it.

    • Showroom7561@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 hours ago

      Bookmarking “headscale”!

      I only recently started using Tailscale because it makes connecting to my local network through a Windows VM running in Boxes on Linux a hell of a lot easier than figuring out how to set up a networked bridge.

      This sounds like a great alternative, and it looks like it can even work on a Synology NAS.

    • three@lemmy.zip
      link
      fedilink
      English
      arrow-up
      21
      ·
      6 hours ago

      Been meaning to do this. Tailscale was just there and easy to implement when I set my stuff up. Is it relatively simple to transition?

  • dieTasse@feddit.org
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 hours ago

    Question: if I setup Headscale on my network, I would have to open a port on my router to connect to it right? And also if I setup Headscale with some cloud provider, could they theoretically go and use the setup to get to my home network? I know its unlikely, I just mean if the technology is like e2e from clients to my home network, or if the cloud headscale ‘centre’ would be also an unguarded entry point (from the perspective of cloud admins). I hope I am clear 😀 Thanks (btw you probably guess why I currently use Tailscale 😀)

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      3 hours ago

      if I setup Headscale on my network, I would have to open a port on my router to connect to it right?

      The way I understand it is:

      I would have to open a port on my router to connect to it right?

      Yes

      if I setup Headscale with some cloud provider, could they theoretically go and use the setup to get to my home network?

      If they are able to authorize their own node to your Headscale server, then their node gets on your network. If they take over the Headscale node, they might also be able to access your network, either by changing Headscale’s config to auth another node or perhaps if the Headscale node is part of the network, which it might be, I don’t recall. But I think that’s immaterial. If someone takes over the Headscale machine, they can get on your network either way.

  • Wahots@pawb.social
    link
    fedilink
    English
    arrow-up
    23
    ·
    6 hours ago

    Are there better alternatives? I was planning on using tailscale until now. :P

    • milicent_bystandr@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 hours ago

      I use Nebula. It’s lightweight, well-engineered and fully under your control. But you do need a computer with a fixed IP and accessible port. (E.g. a cheap VPS)

      You can also use “managed nebula” if you want to enjoy the same risk of the control point of your network depending on a new business ;-)

    • exu@feditown.com
      link
      fedilink
      English
      arrow-up
      11
      ·
      4 hours ago

      A bunch really, Headscale with Tailscale client, Nebula VPN, Netmaker, Zerotier.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      33
      ·
      6 hours ago

      For me personally, the next step is using Headscale - a FOSS replacement of the Tailscale control server. The Tailscale clients are already open source and can be used with Headscale.

      Someone else could give other suggestions.

      • Jo Miran@lemmy.ml
        link
        fedilink
        English
        arrow-up
        9
        ·
        5 hours ago

        I’ve been meaning to switch from Tailscale to Headscale but I have been to busy. Do you have any instructions, write-ups/walk-thrus you could recommend to set this up? I have three sites with 1GB internet I can use. One has a whole house UPS but dynamic IP, another has a static IP but no UPS, and the third is Google fiber with no UPS, but I can use the app to get the current IP anytime. I also own a number of domain names I could use.

        • Avid Amoeba@lemmy.caOP
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          4 hours ago

          No writeups. I tried following the Headscale doc for a test last year. Set it up on the smallest DigitalOcean VM. Worked fine. Didn’t use a UI, had to add new clients via CLI on the server. When I set it up for real, I’d likely setup a UI as well and put it in a cloud outside of the US. It would work at home too but any other connection would die if my home internet dies or the power does. E.g. accessing one laptop from another, or accessing the off-site backup location.

    • MangoPenguin@piefed.social
      link
      fedilink
      English
      arrow-up
      16
      ·
      edit-2
      5 hours ago

      Wireguard if you’re just using it yourself. Many various ways to manage it, and it’s built in to most routers already.

      Otherwise Headscale with one of the webUIs would be the closest replacement.

    • 4k93n2@lemmy.zip
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 hours ago

      ive been eyeing up netbird but havnt got around to trying it yet. its fully open source at least, and theyre based in germany is anyone cares about that

      • Avid Amoeba@lemmy.caOP
        link
        fedilink
        English
        arrow-up
        5
        ·
        4 hours ago

        Just looked at NetBird, it looks suspiciously similar to Tailscale in what it does except they also got an open-source control server. They have self-hosting doc right in their web site. Looks interesting. Can’t find much about the company other than it’s based in Berlin and it’s currently private - Wiretrustee UG.

        • nfh@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 hours ago

          What’s the difference with their open-source control server, from headscale? That it’s officially published by the company?

    • candyman337@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      10
      ·
      5 hours ago

      I use the built in wireguard VPN in my router. If you just need local network access elsewhere it’s usually really easy to setup if your router provides it. I would look into it!

  • ChickenAndRice@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    15
    ·
    5 hours ago

    If I host headscale on a VPS, is that as seamless of an experience as Tailscale? And would I miss out on features, like the Tailscale dashboard? How does the experience change for me (an admin type) and my users (non-technical types)?

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      WG is worthless in a CGNAT environment… And as we are in 2025 and time doesn’t stop it will be irrelevant for everyone someday, unless they fully support IPv6 (which I don’t know if they do, if you can use WG in a CGNATED network with IPv6 I’d like to know though, I am very rusty setting it up, but it might worth checking it out).

    • Starfighter@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      27
      ·
      edit-2
      5 hours ago

      You dont need to manually handle the WG config files. This isn’t really an issue when it’s just you and your two devices, but once you start supporting more people, like non-technical family members, this gets really annoying really quickly.

      Tailscale (and headscale) just require you to log in, which even those family members can manage and then does the rest for you. They also support SSO in which case you wouldn’t even have to create new accounts.

    • RxBrad@infosec.pub
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      4 hours ago

      Personally, my ISP (T-Mobile 5G) has CGNAT and blocks all incoming traffic. I can’t simply Wireguard into my network. Tailscale has been my intermediary to get remote access.

      I guess it’s time to figure how how to host an alternative on a VPS (I see Headscale mentioned in these comments).

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      11
      ·
      5 hours ago

      Easier/zero configuration compared to manual WG setup. Takes care of ports and providing transparent relay when no direct connection works.

    • ShortN0te@lemmy.ml
      cake
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      3 hours ago

      Tailscale offers way more then just wireguard. ACLs, NAT traversal etc. etc.

      While some use cases can be replaced with traditional wireguard, others not.

      • Gravitwell@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        56 minutes ago

        I’m curious what kind of a use case you can think of that “traditional wireguard” can’t replace tailscale for.

        Tailscale has a maximum of 3 users on their free tier, so it seems like a super limited use case of people who DIY their own servers for Jellyfin or HomAssistant or whatever, but just a tad too lazy to setup their own Wireguard service in addition to whatever it is they’d be using it for… I think the vast majority of free tailscale users have simply never actually tried wg-easy , because if they did they wouldnt need to use a third party service.

          • Gravitwell@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            23 minutes ago

            I think ACL is a paid feature with TS, but maybe im wrong. Once you get to the paid tier, you are just paying someone else to manage your VPN, which is fair enough but its not something you could’t also pay someone to do with wireguard (or openVPN for that matter). I think its fair to say “I pay for this service because i don’t want to have to deal with configuring it myself”, it might be easier to setup for some use cases, but if someone is already self-hosting things and has a DIY attitude to it, I don’t think tailscale can do anything wireguard can’t also do (it is based on WG afterall)

            Maybe I’m not familiar enough with other kinds of setups to think of things though. My wireguard setup is basically a meshnet between several people’s home servers, each person has their own subnet only they can use, but the wider 10.X.X.X is shared by everyone, its certainly not the most secure because it doesnt need to be, but if i wanted to restrict one persons access to something i certainly could do that.

    • TheFrogThatFlies@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      3 hours ago

      Accessing your home network that is kept inside a NAT by your ISP, without you having to acquire an online server somewhere.

      • Gravitwell@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        51 minutes ago

        Except you do need to acquire an online server somewhere, its just one that tailscale owns and controls instead of you, and when tailscale decides to enshittify and kill of their free tier you’ll be left wondering why you didn’t just rent a cheap VPS sooner.

        Ask yourself, what is tailscale getting out of those “free” users that makes it worth providing services to them that they’d otherwsie need to rent a VPS for? What do you think their response would be if for example they got pressured about maybe too many users on their network are running a certain video streaming app?

      • Flatfire@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        3 hours ago

        You really don’t though. I use wireguard myself under the same scenario without issue. You just need to use some form of dynamic DNS to mitigate the potentially changing IP. Even if you’re using Tailscale you’ll still need to have something running a service all the time anyways, so may as well skip the proxy.

        • festus@lemmy.ca
          link
          fedilink
          English
          arrow-up
          3
          ·
          2 hours ago

          Your approach won’t work if you’re behind carrier grade NAT or you can’t open ports. My landlord provides my internet so I use tailscale (with headscale on my long distance vps) to connect everything and it works great. It uses LAN when I’m home, and NAT punches when I’m elsewhere.

  • Goretantath@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    4 hours ago

    Didnt even work for me, i use mullvad so if i wanted to use tailscale on my android to connect to my desktop, it wants me to disable mullvad unlike on my desktop…

    • scrooge101@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      Tailscale offers a paid Mullvad integration, where you can select most Mullvad servers as exit nodes. Works quite well.

    • milicent_bystandr@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 hours ago

      I think that’s because both work on Android by being a VPN, and the system can’t handle doing two vpns simultaneously

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      Hmmm. I run PIA and Tailscale simultaneously on my devices. I did have to tinker around with the settings in PIA such as the VPN & Advanced Kill Switch. So, now Tailscale is for administrating remote servers, and PIA for everything else. DNS leak checks, etc all check out.

  • deur@feddit.nl
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    5 hours ago

    I’ve realized how easy it is to just actually run a network rather than half ass it with tailscale. I recommend this, it’s fun.

  • chameleon@fedia.io
    link
    fedilink
    arrow-up
    8
    ·
    5 hours ago

    They also had a major ass security issue that a security company should not be able to get away with the other day: assuming everyone with access to an email domain trusts each other unless it’s a known-to-them freemail address. And it was by design “to reduce friction”.

    I don’t think a security company where an intentional decision like that can pass through design, development and review can make security products that are fit for purpose. This extends to their published client tooling as used by Headscale, and to some extent the Headscale maintainer hours contributed by Tailscale (which are significant and probably also the first thing to go if the company falls down the usual IPO enshittification).

  • anachrohack@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    5 hours ago

    What is even the point of tailscale? What can it do that other VPN solutions don’t? I feel like this is a problem that was solved like 20 years ago and still we’re coming up with novel solutions for some reason. At my company they want to start using tailscale and I don’t see why we don’t just set up wireguard on a node in our k8s cluster instead

    • lepinkainen@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      4 hours ago

      Because I can have 3 phones, 2 tablets, 3 computers and 4 server on the same Tailnet in 15 minutes when starting from scratch

      • anachrohack@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 hours ago

        I guess that’s neat but I don’t think I’ve ever needed more than one connection to a corpo VPN at a time

        • thejml@lemm.ee
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          Tailscale/headscale/wire guard is different from a normal vpn setup.

          VPN: you tunnel into a remote network and all your connections flow through as if you’re on that remote network.

          Tailscale: your devices each run the daemon and basically create a separate, encrypted, dedicated overlay network between them no matter where they are or what network they are on. You can make an exit node where network traffic can exit the overlay network to the local network for a specific cidr, but without that, you’re only devices on the network are the devices connected to the overlay. I can setup a set of severs to be on the Tailscale overlay and only on that network, and it will only serve data with the devices also on the overlay network, and they can be distributed anywhere without any crazy router configuration or port forwarding or NAT or whatever.

    • NuXCOM_90Percent@lemmy.zip
      link
      fedilink
      English
      arrow-up
      7
      ·
      5 hours ago

      If you are capable of setting up your own personal VPN, you don’t need Tailscale. You still may want to use it though, depending on how much of a novelty Network Fun is for you in your spare time.

      For me, the main advantage to Tailscale et al is that it is on a per device basis. So I can access my SMB shares or Frigate setup remotely while still keeping the rest of my internal network isolated( to the degree I trust the software and network setup). You CAN accomplish that with some fancy firewall rules and vlanning but… yeah.

    • witx@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 hours ago

      Because it offers much more than just VPN even though that’s what most users use it for. Read their documentation and you’ll see