tailscale
pivpn
tailscale | pivpn | |
---|---|---|
1,040 | 311 | |
22,612 | 7,563 | |
3.3% | 1.1% | |
9.9 | 5.1 | |
2 days ago | 26 days ago | |
Go | Shell | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tailscale
-
Ditching Obsidian and building my own
Tailscale has made all of their client source code available for anyone to view so if you want to confirm that you’re not sending unencrypted data or keys through their servers you’re more than free to do so.
https://github.com/tailscale/tailscale
I think there is some merit to setting up wireguard (e.g. you want more devices than what Tailscale offers for free, or their servers become unreliable for some reason)
But people who push the “scarey boogeyman will look at your data” with Tailscale are either technically illiterate or overly-paranoid.
-
The Umbrel OS for home-lab, self-hosted tech solutions
For example, the home networking, personal VPN, we may use Tailscale. https://tailscale.com/ which is also listed on the Umbrel App Store.
-
How I made my Home Server accessible outside my home
Here then comes VPN (Virtual Private Network) which is basically establishes a protected network connection when using public networks. I already have relevant experiences with this one as some of my previous projects involves private repositories that can only be accessed by connecting into the client's VPN. There are many solutions for this specific use case like WireGuard, but in this particular blog, I chose Tailscale.
-
Optimizing My Dev Workflow in 2025
I had 2 old laptops sitting around, both 10 years old. I turned both into a home server. Installed Ubuntu Server, set up Docker, and now I run all my containers remotely. With Tailscale, I can securely connect to it like it's on the same network. This way, my MacBook doesn't have to run MongoDB, Redis, or RabbitMQ anymore. That alone freed up a lot of memory. I can even run other services like HomeAssistant, MailHog, Immich, etc.
-
Again self-hosting! on k3s
Then I wanted to add Tailscle which besides being a "best in class VPN" for the homelabbers, allows you to add k8s services directly into your tailnet. What does it mean? The Tailscale operator allows you to access your k8s applications only when you are logged into your private network (tailnet), with the usage of your domain for ended with ts.net. You can configure it in two ways on the resource side, with ingress or with service annotation.
-
An open source, self-hosted implementation of the Tailscale control server
here's the GitHub issue tracking the problem:
https://github.com/tailscale/tailscale/issues/3363
-
Porting Tailscale to Plan 9
We actually have that nowadays... the config file support to tailscaled, as Irbe mentioned on the bug Jan 2024: https://github.com/tailscale/tailscale/issues/1412#issuecomm...
- Tailscale Enterprise Plan 9 Support
-
Ask HN: What is the most secure way of baby monitoring?
I dunno if the CIA would trust them but I like Amcrest cameras
https://amcrest.com/
because they have a wide range of different price points and capabilities. Use these with software like
https://zoneminder.com/
which you could run on a cheap Linux box. For secure access use
https://tailscale.com/
-
DiceDB
Vertical scaling this language also gets into painful territory quite often, I’ve had to workaround this problem before but never with a thing that felt like this: https://github.com/tailscale/tailscale/blob/main/syncs/shard...
pivpn
- PiVPN v4.6.0: The End
-
Network setup for remote access
PiVPN for classic VPN software https://pivpn.io - Wireguard would be my choice
-
Can't get it to run after installation, although running vpn from this pi before
Linux retropie 5.10.103-v7l+ #1529 SMP Tue Mar 8 12:24:00 GMT 2022 armv7l GNU/Linux
-
Easy VPN install on Debian
Wondering what people are using these days to get a VPN (Wireguard?) up and running easily. Is Wireguard itself simple enough that one can just ... do this? I'm thinking of something like PiVPN which does appear to still exist but I'm unsure of how up-to-date it is. Specifically, I like terminal commands just fine, but would prefer not to have to manually configure a basic VPN (internet gateway) and its associated profiles/certificates.
- LAN-to-LAN VPN
-
setting up remote access for homelab
A real simple way is pivpn in a vm. Super easy to set up and manage users. https://github.com/pivpn/pivpn
- Festplatten / NAS die sich via Cloud synchronisieren?
- Wireguard without VPS?
-
Remote Access
They're easily set up via the guided PiVPN installation script. Should work on everything that's Debian-based, not just on Rasbian running on a Pi.
-
Build your own private WireGuard VPN with PiVPN
under Features in [1]:
* Doesn't need to be a Raspberry Pi™, It runs on any x86_64 system
[1] https://pivpn.io/
What are some alternatives?
netbird - Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
dnscrypt-proxy - dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
headscale - An open source, self-hosted implementation of the Tailscale control server
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
AdGuardHome - Network-wide ads & trackers blocking DNS server
dockovpn - 🔐 Out of the box stateless openvpn-server docker image which starts in less than 2 seconds