Hacker News Viewer

I Traced My Traffic Through a Home Tailscale Exit Node

by stonecharioteer on 3/31/2026, 7:46:43 PM

https://tech.stonecharioteer.com/posts/2026/tailscale-exit-nodes/

Comments

by: devilbunny

Tailscale has another interesting feature that I figured out entirely by accident: while the SSO planes (at least using Apple as SSO, rather than your own) may be blocked, the data planes and actual control planes usually are not. If your device is connected to your tailnet before joining a given WiFi, it will stay connected afterward.<p>The guest WiFi at work blocks OpenVPN connections, but established Tailscale slips by. I haven&#x27;t tried straight Wireguard because I don&#x27;t consider Tailscale having timing and volume data on me to be all that valuable to them, and they do mitigate the double-NAT situation. I do run a private peer relay for my tailnet but not a full DERP server, nor do I run Headscale.<p>Obviously, your personal security concerns play a role here, but I&#x27;m not doing anything I wouldn&#x27;t do straight from my home network, so I see no reason to make my life harder. If you need that level of security, you need a different solution.

3/31/2026, 8:52:27 PM


by: comrade1234

Tailscale is interesting. It&#x27;s built on top of wiregaurd but is different in that it creates a mesh of vpn connections between your devices, rather than just a connection from client to server.<p>I haven&#x27;t used it because I use witeguard the traditional way and haven&#x27;t needed a mesh of devices. Also I haven&#x27;t taken time to investigate the private company offering it and what sorts of my information is vulnerable if I use it.

3/31/2026, 9:26:52 PM


by: gsmiznith

Interesting article; do you have any details on the performance differences?

3/31/2026, 7:48:35 PM