738
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]

Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

top 50 comments
sorted by: hot top new old
[-] [email protected] 1 points 6 days ago

Good thing I deleted it from my homeserver a month ago.

[-] [email protected] -1 points 6 days ago

Just came here to say that the guy looks like a creep!

[-] [email protected] 157 points 1 week ago

a long runway that allows us to become profitable when needed

Switch to self-hosting headscale when they enshittify in an attempt to become profitable, duh

[-] [email protected] 48 points 1 week ago

Been meaning to do this. Tailscale was just there and easy to implement when I set my stuff up. Is it relatively simple to transition?

[-] [email protected] 22 points 1 week ago

I mainly use Tailscale (and Zerotier) to access my CGNATED LAN, headscale will require me to pay a subscription for a VPS wouldn't it?

I really envy the guys who say only use them because they're lazy to open ports or want a more secure approach, I use them because I NEED them lol.

If (when?) Tailscale enshitify I'll stick with ZT a bit until it goes the same way lol, I started using it 1st, I don't know if ZT came before Tailscale though.

load more comments (14 replies)
load more comments (2 replies)
[-] [email protected] 83 points 1 week ago* (last edited 1 week ago)

Tailscale never sat right with me. The convenience was nice, but - like other VC-funded projects - it followed that ever-familiar pattern of an "easy" service popping up out of nowhere and gaining massive popularity seemingly overnight. 🚩🚩🚩

I can't say I'm surprised by any of this.

[-] [email protected] 37 points 1 week ago

Would you rather a difficult and hard to use program?

Easy to use means people will want to adopt it, and that's what VC companies want. Nobody wants to pay millions of dollars to make a program that nobody wants to use.

[-] [email protected] 52 points 1 week ago* (last edited 1 week ago)

My problem isn't directly with the programs - my problem lies with VC funding in general. Because they will come back for their money, and the project will inevitably enshittify and shove out enthusiasts in the never-ending search for infinite money.

The solution is getting rid of VC bullshit entirely. But we all know that will never happen.

load more comments (1 replies)
load more comments (1 replies)
[-] [email protected] 16 points 1 week ago

Maybe this is a pet peeve but it's a vpn tool that forces you to log in with an "identity provider". Yeah, no thanks.

load more comments (2 replies)
load more comments (1 replies)
[-] [email protected] 76 points 1 week ago

I'm unsure if it has been mentioned, but a similar tool which is open source (you can run the backend unlike tailscale), netbird

https://netbird.io/

[-] [email protected] 13 points 1 week ago

Headscale is the tailscale backend server

load more comments (1 replies)
load more comments (5 replies)
[-] [email protected] 54 points 1 week ago* (last edited 1 week ago)

Join our Discord server for a chat and community support.

Sigh...

And even worse:

Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server.

[-] [email protected] 49 points 1 week ago

everything is open source except half of all things.

Lol

[-] [email protected] 14 points 1 week ago

To be fair, anything the GUI clients do can be done with the CLI which is still open source and on all desktop platforms and headscale is literally their open source control server.

load more comments (4 replies)
load more comments (2 replies)
[-] [email protected] 44 points 1 week ago

Are there better alternatives? I was planning on using tailscale until now. :P

[-] [email protected] 53 points 1 week ago

For me personally, the next step is using Headscale - a FOSS replacement of the Tailscale control server. The Tailscale clients are already open source and can be used with Headscale.

Someone else could give other suggestions.

[-] [email protected] 13 points 1 week ago

I've been meaning to switch from Tailscale to Headscale but I have been to busy. Do you have any instructions, write-ups/walk-thrus you could recommend to set this up? I have three sites with 1GB internet I can use. One has a whole house UPS but dynamic IP, another has a static IP but no UPS, and the third is Google fiber with no UPS, but I can use the app to get the current IP anytime. I also own a number of domain names I could use.

load more comments (1 replies)
[-] [email protected] 26 points 1 week ago* (last edited 1 week ago)

Wireguard if you're just using it yourself. Many various ways to manage it, and it's built in to most routers already.

Otherwise Headscale with one of the webUIs would be the closest replacement.

load more comments (6 replies)
[-] [email protected] 21 points 1 week ago

A bunch really, Headscale with Tailscale client, Nebula VPN, Netmaker, Zerotier.

load more comments (2 replies)
[-] [email protected] 13 points 1 week ago

I use the built in wireguard VPN in my router. If you just need local network access elsewhere it's usually really easy to setup if your router provides it. I would look into it!

load more comments (6 replies)
[-] [email protected] 36 points 1 week ago

I think I'll just keep using tailscale until they start enshittifying, and then set up a Headscale instance on a VPS - no need to take this step ahead of time, right?

I mean, all the people saying they can avoid any issues by doing the above - what's to stop Tailscale dropping support for Headscale in future if they're serious about enshitification? Their Linux & Android clients are open source, but not IOS or Windows so they could easily block access for them.

My point being - I'll worry when there is something substantial to worry about, til then they can know I'm using like 3 devices and a github account to authenticate. MagicDNS and the reliability of the clients is just too good for me to switch over mild funding concerns.

[-] [email protected] 13 points 1 week ago

Yeah, as I said, it's a friendly reminder. I'm personally probably doing it this year. It's entirely possible that enshittification could come even years from now. It all depends on how their enterprise adoption goes I think. The more money they make there, the longer the individual users are gonna be left unsqueezed.

[-] [email protected] 29 points 1 week ago

I just replaced my entire setup with base wireguard as a challenge, easier than I expected it to be, and not hard to mimic tailscale.

load more comments (6 replies)
[-] [email protected] 29 points 1 week ago

Tailscale is great. The principle concern to me is that your super easy mesh network depends on Tailscale so if they want it they have control, and if they change their pricing or options you depend on them, and though they can't see the data you send they can see the topology of your network and where all your computers/devices are.

I use Nebula, which is more work to set up and doesn't have some of the features, not But if you slap the 'lighthouse' (administrating node) on a cheap VPS it works great. And it has some advantages. But Nebula also troubles me: though it's fully open source and fully in your control, the documentation isn't great. Instead, you can now get "managed nebula", which puts you in the same problem as Tailscale: the company sees and controls your network topology. I fear the company (Defined Networking) is trying to push things that way. Even their android app you can't fully configure unless you use their 'managed' service.

For now, Nebula is great, and my preferred mesh network (I looked into all the main ones). And for Tailscale you can run the administration server yourself with Headscale and be fully in your control.


Actually I wish Tailscale the best as a profitable business. They've created a fantastic service and system. But for me, I'd rather my network be in my own hands and for my own eyes. And, as is OP's main point, once they have enough dependent users, the service might turn much worse.

load more comments (7 replies)
[-] [email protected] 25 points 1 week ago* (last edited 1 week ago)

Friendly reminder that Tailscale is VC-funded and driving towards IPO

You know what's to come.

The answer to the question is immediately. Or switch to OpenZiti or Pangolin even.

load more comments (3 replies)
[-] [email protected] 23 points 1 week ago

What's the benefit over just WG?

[-] [email protected] 39 points 1 week ago* (last edited 1 week ago)

You dont need to manually handle the WG config files. This isn't really an issue when it's just you and your two devices, but once you start supporting more people, like non-technical family members, this gets really annoying really quickly.

Tailscale (and headscale) just require you to log in, which even those family members can manage and then does the rest for you. They also support SSO in which case you wouldn't even have to create new accounts.

[-] [email protected] 20 points 1 week ago

No need to port forward, almost 0 config.

https://tailscale.com/blog/how-tailscale-works

[-] [email protected] 14 points 1 week ago

Easier/zero configuration compared to manual WG setup. Takes care of ports and providing transparent relay when no direct connection works.

load more comments (7 replies)
[-] [email protected] 23 points 1 week ago

Nerds stop recommending corporate crap: challenge: impossible

[-] [email protected] 19 points 1 week ago

If I host headscale on a VPS, is that as seamless of an experience as Tailscale? And would I miss out on features, like the Tailscale dashboard? How does the experience change for me (an admin type) and my users (non-technical types)?

load more comments (2 replies)
[-] [email protected] 18 points 1 week ago

Crap, I really need to switch of Tailscale but currently it is an easy way for me to access my stuff outside of home as a temporary solution while I am on a 5G modem.

load more comments (17 replies)
[-] [email protected] 16 points 1 week ago* (last edited 1 week ago)

Am I totally off-base in thinking that MagicDNS and pluggable DNS nameserver overrides are a huge feature of tailscale?

I love that I can refer to my tailnet devices just via their machine name. I use it everywhere. And also that I can just slot in my NextDNS ID so that any device running tailscale now automatically uses that, and I don’t have to mess with my shared router settings or per device settings. Is all that actually really easy to set up outside of tailscale? Cuz if it is and I just somehow missed that when doing all my research, I’ll happily give plain wireguard or other mesh orchestrators like NetBird a go.

And I already know that mDNS is not the answer. That protocol is simply not reliable enough.

load more comments (3 replies)
[-] [email protected] 14 points 1 week ago* (last edited 1 week ago)

I'm not that worried as there are alternatives like Netbird. The underlying tech really isn't hard to replicate since Wireguard is pretty standard.

I think it would be cool if Tailscale made it into the enterprise arena.

load more comments (1 replies)
load more comments
view more: next ›
this post was submitted on 09 Jun 2025
738 points (98.6% liked)

Selfhosted

46672 readers
937 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS