pivpn
tailscale
pivpn | tailscale | |
---|---|---|
311 | 1,037 | |
7,521 | 22,146 | |
1.3% | 4.7% | |
5.0 | 9.9 | |
about 1 month ago | 2 days ago | |
Shell | Go | |
MIT License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pivpn
- PiVPN v4.6.0: The End
-
Network setup for remote access
PiVPN for classic VPN software https://pivpn.io - Wireguard would be my choice
-
Can't get it to run after installation, although running vpn from this pi before
Linux retropie 5.10.103-v7l+ #1529 SMP Tue Mar 8 12:24:00 GMT 2022 armv7l GNU/Linux
-
Easy VPN install on Debian
Wondering what people are using these days to get a VPN (Wireguard?) up and running easily. Is Wireguard itself simple enough that one can just ... do this? I'm thinking of something like PiVPN which does appear to still exist but I'm unsure of how up-to-date it is. Specifically, I like terminal commands just fine, but would prefer not to have to manually configure a basic VPN (internet gateway) and its associated profiles/certificates.
- LAN-to-LAN VPN
-
setting up remote access for homelab
A real simple way is pivpn in a vm. Super easy to set up and manage users. https://github.com/pivpn/pivpn
- Festplatten / NAS die sich via Cloud synchronisieren?
- Wireguard without VPS?
-
Remote Access
They're easily set up via the guided PiVPN installation script. Should work on everything that's Debian-based, not just on Rasbian running on a Pi.
-
Build your own private WireGuard VPN with PiVPN
under Features in [1]:
* Doesn't need to be a Raspberry Pi™, It runs on any x86_64 system
[1] https://pivpn.io/
tailscale
-
Optimizing My Dev Workflow in 2025
I had 2 old laptops sitting around, both 10 years old. I turned both into a home server. Installed Ubuntu Server, set up Docker, and now I run all my containers remotely. With Tailscale, I can securely connect to it like it's on the same network. This way, my MacBook doesn't have to run MongoDB, Redis, or RabbitMQ anymore. That alone freed up a lot of memory. I can even run other services like HomeAssistant, MailHog, Immich, etc.
-
Again self-hosting! on k3s
Then I wanted to add Tailscle which besides being a "best in class VPN" for the homelabbers, allows you to add k8s services directly into your tailnet. What does it mean? The Tailscale operator allows you to access your k8s applications only when you are logged into your private network (tailnet), with the usage of your domain for ended with ts.net. You can configure it in two ways on the resource side, with ingress or with service annotation.
-
An open source, self-hosted implementation of the Tailscale control server
here's the GitHub issue tracking the problem:
https://github.com/tailscale/tailscale/issues/3363
-
Porting Tailscale to Plan 9
We actually have that nowadays... the config file support to tailscaled, as Irbe mentioned on the bug Jan 2024: https://github.com/tailscale/tailscale/issues/1412#issuecomm...
- Tailscale Enterprise Plan 9 Support
-
Ask HN: What is the most secure way of baby monitoring?
I dunno if the CIA would trust them but I like Amcrest cameras
https://amcrest.com/
because they have a wide range of different price points and capabilities. Use these with software like
https://zoneminder.com/
which you could run on a cheap Linux box. For secure access use
https://tailscale.com/
-
DiceDB
Vertical scaling this language also gets into painful territory quite often, I’ve had to workaround this problem before but never with a thing that felt like this: https://github.com/tailscale/tailscale/blob/main/syncs/shard...
-
ZeroTier – home VPN without a public IP address
Hmm, yes, I think you’re right. Tailscale does handle the connection here, not Wireguard.
I’ve digged into it a bit and I believe it first connects over a relay, then the devices try to find a more optimal route. So for LAN, they would exchange their local IPs and try to connect over those. If they are indeed on the same LAN, they connect directly: https://tailscale.com/kb/1257/connection-types
This is not without issues, however: https://github.com/tailscale/tailscale/issues/7206
-
3 Best Ngrok Alternatives
Tailscale is a tunneling platform built on open-source code. DevZero and other companies leverage a handful of Tailscale’s source components in their own development environments. Why? Because being open-source means that Tailscale’s software/code is much easier to understand and manipulate, more cost-efficient, and more transparent. Tailscale takes pride in this.
-
How I Use Home Assistant in 2025
Just put tailscale [1] on all of your devices and forget about the problem. It may be technically a vpn but it's much easier to use.
[1] https://tailscale.com/
What are some alternatives?
dnscrypt-proxy - dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
netbird - Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
headscale - An open source, self-hosted implementation of the Tailscale control server
dockovpn - 🔐 Out of the box stateless openvpn-server docker image which starts in less than 2 seconds
AdGuardHome - Network-wide ads & trackers blocking DNS server