Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

  • pulsewidth@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    2 hours ago

    I think I’ll just keep using tailscale until they start enshittifying, and then set up a Headscale instance on a VPS - no need to take this step ahead of time, right?

    I mean, all the people saying they can avoid any issues by doing the above - what’s to stop Tailscale dropping support for Headscale in future if they’re serious about enshitification? Their Linux & Android clients are open source, but not IOS or Windows so they could easily block access for them.

    My point being - I’ll worry when there is something substantial to worry about, til then they can know I’m using like 3 devices and a github account to authenticate. MagicDNS and the reliability of the clients is just too good for me to switch over mild funding concerns.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 hours ago

      Yeah, as I said, it’s a friendly reminder. I’m personally probably doing it this year. It’s entirely possible that enshittification could come even years from now. It all depends on how their enterprise adoption goes I think. The more money they make there, the longer the individual users are gonna be left unsqueezed.

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    2 hours ago

    I’m not that worried as there are alternatives like Netbird. The underlying tech really isn’t hard to replicate since Wireguard is pretty standard.

    I think it would be cool if Tailscale made it into the enterprise arena.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      2 hours ago

      I think it would be cool if Tailscale made it into the enterprise arena.

      I think they already have started. Telus is on their list of clients.

  • fmstrat@lemmy.nowsci.com
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    4 hours ago

    Join our Discord server for a chat and community support.

    Sigh…

    And even worse:

    Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server.

    • Heals@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 minutes ago

      To be fair, anything the GUI clients do can be done with the CLI which is still open source and on all desktop platforms and headscale is literally their open source control server.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      Huh, I actually didn’t know this because I don’t use Windows/macOS/iOS. Somehow completely missed this.

  • Vanilla_PuddinFudge@infosec.pub
    link
    fedilink
    English
    arrow-up
    17
    ·
    4 hours ago

    I just replaced my entire setup with base wireguard as a challenge, easier than I expected it to be, and not hard to mimic tailscale.

  • qjkxbmwvz@startrek.website
    link
    fedilink
    English
    arrow-up
    11
    ·
    6 hours ago

    I think a lot of companies view their free plan as recruiting/advertising — if you use TailScale personally and have a great experience then you’ll bring in business by advocating for it at work.

    Of course it could go either way, and I don’t rely on TailScale (it’s my “backup” VPN to my home network)… we’ll see, I guess.

  • cooopsspace@infosec.pub
    link
    fedilink
    English
    arrow-up
    21
    ·
    edit-2
    7 hours ago

    Friendly reminder that Tailscale is VC-funded and driving towards IPO

    You know what’s to come.

    The answer to the question is immediately. Or switch to OpenZiti or Pangolin even.

  • dabe@lemmy.zip
    link
    fedilink
    English
    arrow-up
    14
    ·
    edit-2
    8 hours ago

    Am I totally off-base in thinking that MagicDNS and pluggable DNS nameserver overrides are a huge feature of tailscale?

    I love that I can refer to my tailnet devices just via their machine name. I use it everywhere. And also that I can just slot in my NextDNS ID so that any device running tailscale now automatically uses that, and I don’t have to mess with my shared router settings or per device settings. Is all that actually really easy to set up outside of tailscale? Cuz if it is and I just somehow missed that when doing all my research, I’ll happily give plain wireguard or other mesh orchestrators like NetBird a go.

    And I already know that mDNS is not the answer. That protocol is simply not reliable enough.

    • null_dot@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      7 hours ago

      I use wireguard and have public DNS refer to private IPs.

      For example if my server is accessible at 10.0.0.1 via wireguard then I point *.myserver.mydomain.com to that IP.

      Sorry if I’ve misunderstood your question.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      2
      ·
      edit-2
      7 hours ago

      Nah, DNS is separate and these features are indeed pretty great. I think Headscale can also do them. I think I tested MagicDNS if I recall correctly.

  • Lka1988@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    62
    arrow-down
    3
    ·
    edit-2
    12 hours ago

    Tailscale never sat right with me. The convenience was nice, but - like other VC-funded projects - it followed that ever-familiar pattern of an “easy” service popping up out of nowhere and gaining massive popularity seemingly overnight. 🚩🚩🚩

    I can’t say I’m surprised by any of this.

    • potustheplant@feddit.nl
      link
      fedilink
      English
      arrow-up
      10
      ·
      7 hours ago

      Maybe this is a pet peeve but it’s a vpn tool that forces you to log in with an “identity provider”. Yeah, no thanks.

      • iggy@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        5 hours ago

        That’s a basic requirement for almost any company. If you’re into hard coding credentials just use wireguard directly.

        • potustheplant@feddit.nl
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 hours ago

          There are tons and tons of websites where you can create an account with just your email. I wouldn’t expect a third party account to be mandatory. Specially from a product like this one.

    • fuckwit_mcbumcrumble@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      29
      arrow-down
      3
      ·
      11 hours ago

      Would you rather a difficult and hard to use program?

      Easy to use means people will want to adopt it, and that’s what VC companies want. Nobody wants to pay millions of dollars to make a program that nobody wants to use.

      • Lka1988@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        39
        arrow-down
        2
        ·
        edit-2
        11 hours ago

        My problem isn’t directly with the programs - my problem lies with VC funding in general. Because they will come back for their money, and the project will inevitably enshittify and shove out enthusiasts in the never-ending search for infinite money.

        The solution is getting rid of VC bullshit entirely. But we all know that will never happen.

  • HelloRoot@lemy.lol
    link
    fedilink
    English
    arrow-up
    122
    ·
    14 hours ago

    a long runway that allows us to become profitable when needed

    Switch to self-hosting headscale when they enshittify in an attempt to become profitable, duh

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      10 hours ago

      I mainly use Tailscale (and Zerotier) to access my CGNATED LAN, headscale will require me to pay a subscription for a VPS wouldn’t it?

      I really envy the guys who say only use them because they’re lazy to open ports or want a more secure approach, I use them because I NEED them lol.

      If (when?) Tailscale enshitify I’ll stick with ZT a bit until it goes the same way lol, I started using it 1st, I don’t know if ZT came before Tailscale though.

        • Vanilla_PuddinFudge@infosec.pub
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          3 hours ago

          Same, my Hetzner proxy running NPM, with pivpn and pihole is doing all it needs to do for $3 and some change.

          My only open ports on anything I own are 80, 443 and the wg port I changed on that system. Love it.

          • Croquette@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 hours ago

            How does WG work on the local side of the network? Do you need to connect each VM/CT to the wireguard instance?

            I am currently setting up my home network again, and my VPS will tunnel through my home network and NPM will be run locally on the local VLAN for services and redirect from there.

            I wonder if there is any advantage to run NPM on the VPS instead of locally?

      • not_amm@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        ·
        10 hours ago

        Same. I mean, I was already looking to rent a VPS, but at least there’s some time so I can save money until things get weird.

        • kratoz29@lemm.ee
          link
          fedilink
          English
          arrow-up
          3
          ·
          9 hours ago

          Yeah, don’t get me wrong, I can see value of getting a VPS, especially if you are gonna be using it for some other projects, I have had a DO instance in the past and I thinkered with WG back then BTW, but if it is only for remote accessing your home LAN, I don’t feel like paying for it tbh, especially when some users get it for free (public IPv4) and it feels even dumber for me since I have a fully working IPv6 setup!

          BTW my ISP is funny, no firewall at all with it, I almost fainted when I noticed everyone could access my self hosted services with the IPv6 address and I did nothing regarding ports or whatsoever… They were fully accessible once I fired up the projects! I think I read an article about this subject… But I can’t recall when or where… I had to manually set up a firewall, which tbh, you always should do and it is especially easy to do in a Synology NAS.

          Anyway, back to the mesh VPN part, if they enshitify so be it, but in the meantime we still can benefit from it.

          • tux7350@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 hours ago

            Thats just how IPv6 works. You get a delegate address from your ISP for your router and then any device within that gets it own unique address. Considering how large the pool is, all address are unique. No NAT means no port forwarding needed!

    • Showroom7561@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      ·
      10 hours ago

      Bookmarking “headscale”!

      I only recently started using Tailscale because it makes connecting to my local network through a Windows VM running in Boxes on Linux a hell of a lot easier than figuring out how to set up a networked bridge.

      This sounds like a great alternative, and it looks like it can even work on a Synology NAS.

    • three@lemmy.zip
      link
      fedilink
      English
      arrow-up
      36
      ·
      14 hours ago

      Been meaning to do this. Tailscale was just there and easy to implement when I set my stuff up. Is it relatively simple to transition?

  • ohshit604@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    7 hours ago

    So glad my router supports WireGuard/OVPN server hosting, doing it this way also relieves resources off your homelab and for whatever reason your homelab shuts off or loses network access you can at least rely on your router to re-establish the VPN server without further intervention.

  • milicent_bystandr@lemm.ee
    link
    fedilink
    English
    arrow-up
    21
    ·
    11 hours ago

    Tailscale is great. The principle concern to me is that your super easy mesh network depends on Tailscale so if they want it they have control, and if they change their pricing or options you depend on them, and though they can’t see the data you send they can see the topology of your network and where all your computers/devices are.

    I use Nebula, which is more work to set up and doesn’t have some of the features, not But if you slap the ‘lighthouse’ (administrating node) on a cheap VPS it works great. And it has some advantages. But Nebula also troubles me: though it’s fully open source and fully in your control, the documentation isn’t great. Instead, you can now get “managed nebula”, which puts you in the same problem as Tailscale: the company sees and controls your network topology. I fear the company (Defined Networking) is trying to push things that way. Even their android app you can’t fully configure unless you use their ‘managed’ service.

    For now, Nebula is great, and my preferred mesh network (I looked into all the main ones). And for Tailscale you can run the administration server yourself with Headscale and be fully in your control.


    Actually I wish Tailscale the best as a profitable business. They’ve created a fantastic service and system. But for me, I’d rather my network be in my own hands and for my own eyes. And, as is OP’s main point, once they have enough dependent users, the service might turn much worse.

  • Wahots@pawb.social
    link
    fedilink
    English
    arrow-up
    36
    ·
    14 hours ago

    Are there better alternatives? I was planning on using tailscale until now. :P

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      44
      ·
      14 hours ago

      For me personally, the next step is using Headscale - a FOSS replacement of the Tailscale control server. The Tailscale clients are already open source and can be used with Headscale.

      Someone else could give other suggestions.

      • Jo Miran@lemmy.ml
        link
        fedilink
        English
        arrow-up
        12
        ·
        13 hours ago

        I’ve been meaning to switch from Tailscale to Headscale but I have been to busy. Do you have any instructions, write-ups/walk-thrus you could recommend to set this up? I have three sites with 1GB internet I can use. One has a whole house UPS but dynamic IP, another has a static IP but no UPS, and the third is Google fiber with no UPS, but I can use the app to get the current IP anytime. I also own a number of domain names I could use.

        • Avid Amoeba@lemmy.caOP
          link
          fedilink
          English
          arrow-up
          7
          ·
          edit-2
          12 hours ago

          No writeups. I tried following the Headscale doc for a test last year. Set it up on the smallest DigitalOcean VM. Worked fine. Didn’t use a UI, had to add new clients via CLI on the server. When I set it up for real, I’d likely setup a UI as well and put it in a cloud outside of the US. It would work at home too but any other connection would die if my home internet dies or the power does. E.g. accessing one laptop from another, or accessing the off-site backup location.

    • exu@feditown.com
      link
      fedilink
      English
      arrow-up
      21
      ·
      12 hours ago

      A bunch really, Headscale with Tailscale client, Nebula VPN, Netmaker, Zerotier.

    • MangoPenguin@piefed.social
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      13 hours ago

      Wireguard if you’re just using it yourself. Many various ways to manage it, and it’s built in to most routers already.

      Otherwise Headscale with one of the webUIs would be the closest replacement.

      • Vanilla_PuddinFudge@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        Pivpn is really easy, and since pivpn is just scripts, it always installs current wireguard even if they lax on updating pivpn that often.

    • 4k93n2@lemmy.zip
      link
      fedilink
      English
      arrow-up
      8
      ·
      12 hours ago

      ive been eyeing up netbird but havnt got around to trying it yet. its fully open source at least, and theyre based in germany is anyone cares about that

      • hobbsc@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        i used netbird heavily at my last job and i use it for a few things at home. it works pretty well.

      • Avid Amoeba@lemmy.caOP
        link
        fedilink
        English
        arrow-up
        8
        ·
        12 hours ago

        Just looked at NetBird, it looks suspiciously similar to Tailscale in what it does except they also got an open-source control server. They have self-hosting doc right in their web site. Looks interesting. Can’t find much about the company other than it’s based in Berlin and it’s currently private - Wiretrustee UG.

        • nfh@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 hours ago

          What’s the difference with their open-source control server, from headscale? That it’s officially published by the company?

    • candyman337@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      12
      ·
      14 hours ago

      I use the built in wireguard VPN in my router. If you just need local network access elsewhere it’s usually really easy to setup if your router provides it. I would look into it!

    • milicent_bystandr@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      11 hours ago

      I use Nebula. It’s lightweight, well-engineered and fully under your control. But you do need a computer with a fixed IP and accessible port. (E.g. a cheap VPS)

      You can also use “managed nebula” if you want to enjoy the same risk of the control point of your network depending on a new business ;-)

    • Starfighter@discuss.tchncs.de
      cake
      link
      fedilink
      English
      arrow-up
      33
      ·
      edit-2
      14 hours ago

      You dont need to manually handle the WG config files. This isn’t really an issue when it’s just you and your two devices, but once you start supporting more people, like non-technical family members, this gets really annoying really quickly.

      Tailscale (and headscale) just require you to log in, which even those family members can manage and then does the rest for you. They also support SSO in which case you wouldn’t even have to create new accounts.

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      10 hours ago

      WG is worthless in a CGNAT environment… And as we are in 2025 and time doesn’t stop it will be irrelevant for everyone someday, unless they fully support IPv6 (which I don’t know if they do, if you can use WG in a CGNATED network with IPv6 I’d like to know though, I am very rusty setting it up, but it might worth checking it out).

      • Melmi@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 hours ago

        CGNAT is for IPv4, the IPv6 network is separate. But if you have IPv6 connectivity on both ends setting up WG is the same as with IPv4.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      14
      ·
      14 hours ago

      Easier/zero configuration compared to manual WG setup. Takes care of ports and providing transparent relay when no direct connection works.

    • RxBrad@infosec.pub
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      12 hours ago

      Personally, my IP (T-Mobile 5G) has CGNAT and blocks all incoming traffic. I can’t simply Wireguard into my network. Tailscale has been my intermediary to get remote access.

      I guess it’s time to figure how how to host an alternative on a VPS (I see Headscale mentioned in these comments).

  • ChickenAndRice@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    18
    ·
    14 hours ago

    If I host headscale on a VPS, is that as seamless of an experience as Tailscale? And would I miss out on features, like the Tailscale dashboard? How does the experience change for me (an admin type) and my users (non-technical types)?