tailscale + wireguard guide — on 4grab.com
private networking without exposing ports. connect all your machines, access home lab remotely, no static IP needed.
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#prompt #tailscale #networking #selfhosted
tailscale + wireguard guide — on 4grab.com
private networking without exposing ports. connect all your machines, access home lab remotely, no static IP needed.
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#prompt #tailscale #networking #selfhosted
@marcoarment @siracusa @caseyliss I'd chime in with the others who recommended #Ansible for Marco's fascinating project (which has inspired one I've started on now!). I love it since it can help do automated updates and deployment on both Mac and Linux systems _with the same deployment script_ […]
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
new on 4grab.com: tailscale + wireguard — private networking without exposing ports
https://4grab.com/pay.php?id=ptag_69c44732a48d7
#tailscale #wireguard #networking #selfhosted
As Network Security is something we should all be thoughtful of and remote access
Check out my latest article on the use @tailscale.com for home labbers & beyond
reprodev.com/tailscale-si...
#Tailscale #Homelab #Linux #Networking #CyberSecurity #RaspberryPi #SelfHosted
#Tailscale might be one of the most usefull pieces of sofware I added to my daily use in the last few years.
IT IS SO EASY to get a bunch of different devices with different OSs into one securely without fidgeting with VPN setup.
If I needed to give my grandma acces to a NFS rn, we could […]
I got frustrated that I can't run Mullvad and Tailscale together on my mobile and Mullvad purchase through Tailscale is not available in India. Made this to run both at the same time.
Details here: sarat.dev/blog/mullvad...
#tailscale #mullvad #networking
#tailscale auf #synology MIPS devices (z.B. DS214+) vorsicht mit letztem Update: github.com/tailscale/ta... workaround ist beschrieben und funktioniert soweit
#tailscale and #termux.
This is very cool. I feel like I've just unlocked a new level of hacker nerd.
A screenshot of two windows on a grey desktop background. To the left, scrcpy mirroring an android phone, running opencamera, the camera showing a microscopic view of a fungus gnat. To the right, a control panel with various settings.
Progress on the #frankenscope. Since all the software is networked, I just moved the scanning stack onto a NUC. The NUC is connected via one of our edge routers to 5G, and sits in a #tailscale/#headscale network.
That turns it into a fully remote operated […]
[Original post on flipping.rocks]
Acquisitions: #3M & #BainCapital > #MadisonFire&Rescue; #Finago > #UKKO.fi; #Microsoft > #Cove; #OakNorth > #Monite
Agreed Acquisitions: #Apple > #MotionVFX; #OpenAI > #Astral; #Netflix > #InterPositive; #Ramp > #Billhop & #Juno;
#Revolv > #ZenobeEnergy; #Tailscale > #Border0
One pretty cool thing about this is that because I have my whole network on Tailscale (including my phone) and am running a Pihole DNS server for that Tailnet I can internally use my local IP address for my Mastodon server, so when I use Mastodon myself everything stays inside the home […]
Tailscale is so cool. Sitting at the members' lounge at the Art Institute, SSHing into my home server and running builds like I'm on the LAN. Zero open ports, zero configuration on the server itself. If you run a home lab and haven't tried it, you're missing out.
#homelab #tailscale #selfhosted
Just read more about #NetBird and excited there is a totally #opensource alternative to #Tailscale. I think I need to wait for Tailscale to do something stupid before switching though. Need that outrage energy to rebuild everything with a new system […]
Tailscale Simplifies Secure Access With Border0 Acquisition Secure connectivity firm Tailscale has acquired privileged access management (PAM) firm Border0, Tailscale said in a Tuesday (March 17) b...
#Acquisitions #acquisitions #Border0 #News #PYMNTS #News […]
[Original post on pymnts.com]
@homelab
Does anyone know how to use #tailscale ssh with a shared machine when the shared-to user is also a member of the tailnet?
A friend shared a machine with me, and ssh worked with just that. But after inviting me to his tailnet (so I can help him with settings there), I can no longer […]
📝 New blog post: Setting up a triple boot Linux machine
How I turned one ThinkPad into a shared-home triple-boot setup with CachyOS, BunsenLabs, and Bazzite without letting them...
blog.arda.tr/blog/2026-03-14-setting-...
#dev #linux #multiboot #btrfs #tailscale
tailscale's extremely good at finding pathways through my disasters, btw
every home network should include tailscale.com as infrastructure
'cos it just works
#tailscale
Should I use TailScale to vibe-code Linear issues on my phone with Codex? Is this a sentence that makes sense in 2026?
#dev #vibes #code #ai #linear #codex #TailScale
An important part of my security model is to get rid of garbage user mode tls stacks everywhere and do zero-knowledge trust networking with #tailscale / #wireguard for local resources, and do public connections thru a proxy. Security should be simple and automatic as infrastructure by default..
To do a new security model I need to know if a given connection address is programmatically local to my subnet, is reachable thru a secured vpn connection like #tailscale and #wireguard, or public and perhaps should be auto proxied thru tor or a gateway sock server automatically.
Remotely Unlocking an Encrypted Hard Disk...
#Tailscale #Arch
Read more on Hackaday: postreads.co/feed-item/59513/click
Remotely Unlocking an Encrypted Hard Disk Can you remotely unlock an encrypted hard disk? [Jyn] needed to unlock their home server after it rebooted even if they weren’t home. Normally, they used...
#Linux #Hacks #diskencryption #encryption #initramfs #linux […]
[Original post on hackaday.com]