738
submitted 1 week ago* (last edited 1 week ago) by [email protected] to c/[email protected]

Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

(page 2) 50 comments
sorted by: hot top new old
[-] [email protected] 12 points 1 week ago

I think a lot of companies view their free plan as recruiting/advertising


if you use TailScale personally and have a great experience then you'll bring in business by advocating for it at work.

Of course it could go either way, and I don't rely on TailScale (it's my "backup" VPN to my home network)... we'll see, I guess.

load more comments (1 replies)
[-] [email protected] 11 points 1 week ago

become profitable when needed

By what, laying off all QA and support staff and half your developers the moment a single quarterly earnings report isn't spotlessly gilded?

[-] [email protected] 11 points 1 week ago* (last edited 1 week ago)

pre-emptive pikachu face strike

[-] [email protected] 10 points 1 week ago

And here I am, still using OpenVPN in 2025 lol

load more comments (6 replies)
[-] [email protected] 9 points 1 week ago

They also had a major ass security issue that a security company should not be able to get away with the other day: assuming everyone with access to an email domain trusts each other unless it's a known-to-them freemail address. And it was by design "to reduce friction".

I don't think a security company where an intentional decision like that can pass through design, development and review can make security products that are fit for purpose. This extends to their published client tooling as used by Headscale, and to some extent the Headscale maintainer hours contributed by Tailscale (which are significant and probably also the first thing to go if the company falls down the usual IPO enshittification).

[-] [email protected] 7 points 1 week ago

Isn’t that the entire design philosophy of tailscale?: reduce friction, at the cost of some security.

If security is your main priority, you should be using more secure options, even if they are less convenient or tougher to maintain.

load more comments (3 replies)
[-] [email protected] 9 points 1 week ago

I've realized how easy it is to just actually run a network rather than half ass it with tailscale. I recommend this, it's fun.

load more comments (1 replies)
[-] [email protected] 6 points 1 week ago* (last edited 1 week ago)

So glad my router supports WireGuard/OVPN server hosting, doing it this way also relieves resources off your homelab and for whatever reason your homelab shuts off or loses network access you can at least rely on your router to re-establish the VPN server without further intervention.

[-] [email protected] 5 points 1 week ago

Headscale is great if you like networking fun, but that aside I'm not understanding why VC funding is such a black mark to the poster. Tailscale doesn't generate meaningful revenue streams as its early-stage, so it has to secure funding to continue operations until they achieve high enough revenue to go public. That's pretty standard in a business life-cycle, though. It seems like the main complaint is that Tailscale is a business. And what about the Linux Foundation? They are funded through private equity. Should you consider switching away because of that?

[-] [email protected] 10 points 1 week ago

Not that it is a business but is a specific kind of business. VC funded startups eyeing an IPO more often than not start doing things users are not happy with. Maybe tailscale won't, but might as well be aware what kind of company they are acknowledge there is a decent chance of rugpulls

[-] [email protected] 9 points 1 week ago

It seems like the main complaint is that Tailscale is a business. And what about the Linux Foundation?

The Linux Foundation is not a business.

load more comments (4 replies)
[-] [email protected] 8 points 1 week ago

Yup, I don't know if that is OP's intention, but I would agree myself with the complaint that "Tailscale is a business"

The way I see it, if it's a business it must generate revenue (either now or down the road), and that is enough to have me worried. I do have a Tailscale registration, and the way they approach email communication is already a yellow flag to me (too many ad emails)

load more comments (21 replies)
[-] [email protected] 6 points 1 week ago* (last edited 1 week ago)

That's pretty standard in a business life-cycle, though

I don't know where people ever got the idea that normal = acceptable. I hear this used to justify all sorts of awful crap. It was only ever normalized because users were apathetic.

And what about the Linux Foundation? They are funded through private equity. Should you consider switching away because of that?

Does The Linux Foundation have complete control over Linux?

load more comments (7 replies)
load more comments (1 replies)
[-] [email protected] 5 points 1 week ago

Question: if I setup Headscale on my network, I would have to open a port on my router to connect to it right? And also if I setup Headscale with some cloud provider, could they theoretically go and use the setup to get to my home network? I know its unlikely, I just mean if the technology is like e2e from clients to my home network, or if the cloud headscale 'centre' would be also an unguarded entry point (from the perspective of cloud admins). I hope I am clear 😀 Thanks (btw you probably guess why I currently use Tailscale 😀)

[-] [email protected] 6 points 1 week ago* (last edited 1 week ago)

if I setup Headscale on my network, I would have to open a port on my router to connect to it right?

The way I understand it is:

I would have to open a port on my router to connect to it right?

Yes

if I setup Headscale with some cloud provider, could they theoretically go and use the setup to get to my home network?

If they are able to authorize their own node to your Headscale server, then their node gets on your network. If they take over the Headscale node, they might also be able to access your network, either by changing Headscale's config to auth another node or perhaps if the Headscale node is part of the network, which it might be, I don't recall. But I think that's immaterial. If someone takes over the Headscale machine, they can get on your network either way.

load more comments (1 replies)
[-] [email protected] 5 points 1 week ago

I never really understood the point of using Tailscale over plain ol' WireGuard. I mean I guess if youve got a dozen+ nodes but I feel like most laymens topologies won't be complex beyond a regular old wireguard config

[-] [email protected] 10 points 1 week ago* (last edited 1 week ago)

Wireguard doesn't do NAT/Firewall traversal nor does it have SSO

Tailscale manages the underlying Wireguard for you. I would be great if Wireguard had native NAT traversal but that isn't the case.

[-] [email protected] 6 points 1 week ago

NAT punching and proxying when a p2p connection between any 2 nodes cannot be achieved. It’s a world of difference with mobile devices when they always see each other, all the time. However, headscale does all that.

load more comments (1 replies)
load more comments
view more: ‹ prev next ›
this post was submitted on 09 Jun 2025
738 points (98.6% liked)

Selfhosted

46672 readers
937 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS