Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

  • PumaStoleMyBluff@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    8 days ago

    become profitable when needed

    By what, laying off all QA and support staff and half your developers the moment a single quarterly earnings report isn’t spotlessly gilded?

  • HelloRoot@lemy.lol
    link
    fedilink
    English
    arrow-up
    4
    ·
    9 days ago

    a long runway that allows us to become profitable when needed

    Switch to self-hosting headscale when they enshittify in an attempt to become profitable, duh

    • three@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 days ago

      Been meaning to do this. Tailscale was just there and easy to implement when I set my stuff up. Is it relatively simple to transition?

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 days ago

      I mainly use Tailscale (and Zerotier) to access my CGNATED LAN, headscale will require me to pay a subscription for a VPS wouldn’t it?

      I really envy the guys who say only use them because they’re lazy to open ports or want a more secure approach, I use them because I NEED them lol.

      If (when?) Tailscale enshitify I’ll stick with ZT a bit until it goes the same way lol, I started using it 1st, I don’t know if ZT came before Tailscale though.

  • Lka1988@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    9 days ago

    Tailscale never sat right with me. The convenience was nice, but - like other VC-funded projects - it followed that ever-familiar pattern of an “easy” service popping up out of nowhere and gaining massive popularity seemingly overnight. 🚩🚩🚩

    I can’t say I’m surprised by any of this.

    • fuckwit_mcbumcrumble@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 days ago

      Would you rather a difficult and hard to use program?

      Easy to use means people will want to adopt it, and that’s what VC companies want. Nobody wants to pay millions of dollars to make a program that nobody wants to use.

      • Lka1988@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        9 days ago

        My problem isn’t directly with the programs - my problem lies with VC funding in general. Because they will come back for their money, and the project will inevitably enshittify and shove out enthusiasts in the never-ending search for infinite money.

        The solution is getting rid of VC bullshit entirely. But we all know that will never happen.

    • sonosonic@lemy.lol
      link
      fedilink
      English
      arrow-up
      2
      ·
      8 days ago

      Is there an issue with Netbird’s servers at the moment? In my testing devices are connected and reach eachother, but the web admin is missing a lot of functionality compared to what’s in the docs. The peer devices section is there, but everything else, user settings, rules etc, isn’t showing/says I don’t have admin permission (of my own account… Lol?)

  • pulsewidth@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    9 days ago

    I think I’ll just keep using tailscale until they start enshittifying, and then set up a Headscale instance on a VPS - no need to take this step ahead of time, right?

    I mean, all the people saying they can avoid any issues by doing the above - what’s to stop Tailscale dropping support for Headscale in future if they’re serious about enshitification? Their Linux & Android clients are open source, but not IOS or Windows so they could easily block access for them.

    My point being - I’ll worry when there is something substantial to worry about, til then they can know I’m using like 3 devices and a github account to authenticate. MagicDNS and the reliability of the clients is just too good for me to switch over mild funding concerns.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      9 days ago

      Yeah, as I said, it’s a friendly reminder. I’m personally probably doing it this year. It’s entirely possible that enshittification could come even years from now. It all depends on how their enterprise adoption goes I think. The more money they make there, the longer the individual users are gonna be left unsqueezed.

  • fmstrat@lemmy.nowsci.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    9 days ago

    Join our Discord server for a chat and community support.

    Sigh…

    And even worse:

    Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server.

  • bonsai@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    8 days ago

    I never really understood the point of using Tailscale over plain ol’ WireGuard. I mean I guess if youve got a dozen+ nodes but I feel like most laymens topologies won’t be complex beyond a regular old wireguard config

    • Jason2357@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      ·
      8 days ago

      NAT punching and proxying when a p2p connection between any 2 nodes cannot be achieved. It’s a world of difference with mobile devices when they always see each other, all the time. However, headscale does all that.

      • bonsai@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        8 days ago

        I mean sure, but I don’t think it’s simpler than setting up a wireguard config IMO. For tailscale you gotta make an account, register devices, connect them. Feel like wireguard is about the same except you don’t have to make an account.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      8 days ago

      Wireguard doesn’t do NAT/Firewall traversal nor does it have SSO

      Tailscale manages the underlying Wireguard for you. I would be great if Wireguard had native NAT traversal but that isn’t the case.

    • _TheLoneDeveloper_@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      2
      ·
      8 days ago

      Same thing here, either tailscale selfhosted or Netbird selfhosted I’d the way to go for all the nice features, having the free tier or tailscale for personal data never sounded right to me.

    • phx@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 days ago

      Used to run OpenVPN. Tried Wireguard and the performance was much better, although lacking some of the features some might need/want fit credential-based logins etc

      • _TheLoneDeveloper_@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 days ago

        I can highly recommend Netbird selfhosted, it has SSO support, logins, complex network topologies, it uses wireguard under the hood and it’s open source.

      • ipkpjersi@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 days ago

        Yeah, OpenVPN definitely doesn’t have light spec requirements 😅 thankfully hardware is unfathomably powerful these days.

  • Vanilla_PuddinFudge@infosec.pub
    link
    fedilink
    English
    arrow-up
    1
    ·
    9 days ago

    I just replaced my entire setup with base wireguard as a challenge, easier than I expected it to be, and not hard to mimic tailscale.

    • unit327@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 days ago

      If you just have to talk from many devices to the one server sure, but Tailscale sure makes it easy for many to many. Also if a direct connection is impossible (e.g. firewall of china, CGNAT etc) tailscale puts a relay server in the middle for you.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 days ago

      For me personally, the next step is using Headscale - a FOSS replacement of the Tailscale control server. The Tailscale clients are already open source and can be used with Headscale.

      Someone else could give other suggestions.

    • MangoPenguin@piefed.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      9 days ago

      Wireguard if you’re just using it yourself. Many various ways to manage it, and it’s built in to most routers already.

      Otherwise Headscale with one of the webUIs would be the closest replacement.

      • nfreak@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 days ago

        I decided to experiment a bit with Headscale when the wg-easy v15 update broke my chained VPN setup. Got it all set up with Headplane for a UI, worked amazingly, until I learned I was supposed to set it all up on a VPS instead and couldn’t actually access it if I wasn’t initially on my home network, oops.

        I might play around with it again down the road with a cheap VPS, didn’t take long to get it going, but realistically my setup’s access is 95% me and 5% my wife so Wireguard works fine (reverted back to wg-easy v14 until v15 allows disabling ipv6 though, since that seemed to be what was causing the issues I’ve been seeing).

          • nfreak@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 days ago

            Well a VPS or an exposed service, but I feel like the latter ends up somewhat defeating the purpose anyway.

            When running locally (not exposed), it worked great until I tried to make the initial connection from mobile data - can’t establish a connection to headscale if it can’t reach it in the first place. Unless I’m mistaken, the headscale service needs to be publicly accessible in some way.

              • nfreak@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                ·
                8 days ago

                Nah, but personally I have no need to expose anything and would rather avoid the security headaches and such that come with it

  • Vinstaal0@feddit.nl
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 days ago

    Crap, I really need to switch of Tailscale but currently it is an easy way for me to access my stuff outside of home as a temporary solution while I am on a 5G modem.

      • unit327@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 days ago

        I can’t. I tried it first and installed it on my phone from f-droid. After opening it up, it connected to an already existing network with other people’s old machines from years ago on it. I was horrified.

        So then I tried to delete my whole account and couldn’t due to an error. I sent them an email about it and they took like two weeks to respond.

    • natch@lemmy.today
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      Do you pay for a domain? They likely provide dynamic DNS (DNS). If you’re lucky, they have an API for it, instead of an app, and you can configure a cronjob on your home server to run every 1-5 minutes (or more often, if your IP is super unstable!).

      • Vinstaal0@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 days ago

        Yeah I can always do that, but putting stuff behind something like Tailscale is (or atleast feels) more secure than making my IP known to the public. I have a DMZ setup though so it should be fine.

        • chronicledmonocle@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 days ago

          Your “IP address” is already public. That’s why an IPv4 address is assigned to you as a “public IP address” and you NAT to a private space. When using IPv6, everything is public.

          The key is to secure everything with access restrictions.

          • Vinstaal0@feddit.nl
            link
            fedilink
            English
            arrow-up
            0
            ·
            8 days ago

            Well yes I know, but there is a difference between using a domain bound to me as a person and a random string of numbers that changes every 5 minutes

              • Vinstaal0@feddit.nl
                link
                fedilink
                English
                arrow-up
                1
                ·
                8 days ago

                That was the case when I lived with my parents, but now it changes every 5 minutes sadly.

                So I had to shut down my Minecraft server etc for now because I am on a 5G modem which makes it really annoying to open up ports and point a domain to your IP

              • Andres@social.ridetrans.it
                link
                fedilink
                arrow-up
                1
                ·
                edit-2
                8 days ago

                @chronicledmonocle @Vinstaal0 I used to work for a dial-up ISP. Every IP is registered to an account, if you’re going through your ISP (as opposed to, say, coffee shop or hotel wifi). Though the people who have the information are different (ICANN/registrar vs your internet provider), there’s no anonymity in your home IP address even with CGNAT.

                As far as your domain, you should have privacy protection enabled so people can’t find your personal info via whois.

    • TheFrogThatFlies@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      Accessing your home network that is kept inside a NAT by your ISP, without you having to acquire an online server somewhere.

      • Flatfire@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 days ago

        You really don’t though. I use wireguard myself under the same scenario without issue. You just need to use some form of dynamic DNS to mitigate the potentially changing IP. Even if you’re using Tailscale you’ll still need to have something running a service all the time anyways, so may as well skip the proxy.

        • TheFrogThatFlies@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          9 days ago

          If you only need to worry about the IP changing, then your ISP is not using NAT, or CGNAT as it is better known. I’m pretty sure that you can also use port forwarding, which is not commonly available under CGNAT.

          • Flatfire@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            9 days ago

            Ah, I see where I got confused. Yeah, CGNAT isn’t very common around here. I don’t think I’ve ever run into an ISP that uses it. I can see how that complicates things.

  • phx@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    8 days ago

    I didn’t really get the allure of it TBH. For most home-based nerds a simple Wireguard host (or OpnSense, OpenWRT etc running such) should be fine, and there are better options for commercial from better-known vendors in the network security space