As in, would they be able to access your server?

  • Quail4789@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 minutes ago

    Your question more relates to security rather than privacy. Tailscale cannot read any of your traffic. It’s all E2EE. Now, is it possible that they’re distributing binaries not built from the open source that contain a backdoor? Sure. But it would be an absolute shitshow, not because you and me but because of the many enterprise customers they have. So I don’t worry about that. Same goes for them going rogue and accessing your devices. For that, there’s Taillock which makes your devices not trust traffic from a device not signed by a trusted node in your Tailnet.

    I’d much rather make use of zero-config WG, exit nodes, relay servers, not having to worry about DDNS, solid NAT travelsal, etc. than to worry a company will lose their mind and attack free-plan users.

  • a1studmuffin@aussie.zone
    link
    fedilink
    English
    arrow-up
    10
    ·
    13 hours ago

    If you’re concerned about privacy I don’t know why you’d use Tailscale over Wireguard directly. The latter is slightly more fiddly to configure, but you only do it once and there’s no cloud middleman involved, just your devices talking directly to each other.

  • Thomas@discuss.tchncs.de
    link
    fedilink
    arrow-up
    37
    ·
    20 hours ago

    If you do not trust Tailscale as a company, here is an open source re-implementation of the server called headscale. Some/all clients are open source as well. So, you can review all components yourself or pay for a professional third-party review. Otherwise, if you take a binary blob from any origin, including Tailscale, and have it run with privileges on your server, there are few limits on what this blob can do. Yes, backdoors are technically possible, but probably bad for Tailscale’s business if that ever came to light.

    • jqubed@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      15 hours ago

      I’ve never heard of professional third-party review of open source code. That’s a service people offer?

      • SteveTech
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 hours ago

        I’ve heard of it, but I didn’t think it was financially viable for an individual to pay for though.

    • Tinkerer@lemmy.ca
      link
      fedilink
      arrow-up
      2
      ·
      17 hours ago

      I’ve always wanted to do this however do I understand it correctly that I need to host headscale on a vps server that is not in my tailnet/home network?

      • uzay@infosec.pub
        link
        fedilink
        arrow-up
        3
        ·
        14 hours ago

        It can be on your home network, but it needs to be reachable via HTTPS through the internet. So yeah, a vps is probably the best option.

  • Unmapped@lemmy.ml
    link
    fedilink
    arrow-up
    25
    arrow-down
    1
    ·
    20 hours ago

    From what I understand tailscale is basically wire guard but made convenient. And how they do that is by managing you wire guard keys for you. So I would have assumed they could use the keys to access your network. HOWever while trying to look into this just now I found out tailnet lock exist and it says “When tailnet lock is enabled, even if Tailscale infrastructure is malicious or hacked, attackers can’t send or receive traffic on your tailnet.”

    • Quail4789@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      33 minutes ago

      How is NAT travelsal handled if you want to connect two devices via WG? That’s what Tailscale primarily does.

  • devfuuu@lemmy.world
    link
    fedilink
    arrow-up
    7
    arrow-down
    3
    ·
    14 hours ago

    The official service is bound to need a SSO login from bad privacy related providers. They insist in not allowing a simple account creation with just email and password.

  • ReversalHatchery@beehaw.org
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    15 hours ago

    for authentication you need an account at one of their supported SSO providers (which is mostly a big tech brand) or at an OpenID service.

    the bigger problem is that (I think) the choosen SSO provider will be able to impersonate you, and so they could reconfigure your network or connect to it

  • GravitySpoiled@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    6 hours ago

    I use zerotier and afaik they can’t access it, hence, I assume it’s the same for tailscale