Tailscale has raised $160M
Initial Reaction to the $160M Raise
- Many commenters express immediate anxiety that a large Series C implies future “enshittification”: feature removals, tighter paywalls, enterprise‑only functionality, or eventual acquisition.
- Others see it as validation that the product is durable and less likely to disappear, and that founders and early staff deserve liquidity.
VC, Burn, and Control Concerns
- Thread debates whether they’ve already burned much of the previous $100M and what yearly burn might look like (tens of millions, mostly salaries and go‑to‑market).
- Some argue big rounds inevitably come with stronger investor pressure to maximize revenue, even if there’s no “debt” to repay.
- A minority push back, noting strong growth can justify large “war chests” and that some capital may simply de‑risk downturns or fund long bets.
Enterprise Strategy and Pricing
- Strong criticism of pricing jumps: core features like robust ACLs, SAML/SCIM, and advanced logging push per‑user costs into ~$18–20+/month, which smaller orgs find hard to justify.
- Others defend this as deliberate segmentation: free tier for hobbyists, mid‑tier for small teams, and premium pricing where enterprises can pay.
Open Source vs Proprietary & Alternatives
- Recurring discomfort that the coordination server is closed source; Headscale provides a self‑hosted implementation but is seen as limited vs the hosted service.
- Multiple alternatives are discussed: NetBird (often praised, fully open source, self‑hostable), ZeroTier, Nebula, Netmaker, innernet, Teleport.
- Some expect forks or OSS UX layers over WireGuard if Tailscale’s product worsens.
Product Quality, Use Cases, and Technical Pain Points
- Widespread praise: “just works” VPN, excellent UX, great for home labs, small business networks, robotics/IoT, family file sharing (Taildrop), replacing OpenVPN/AnyConnect.
- Notable issues: flaky MagicDNS/DNS on Linux and Apple devices, routing quirks, reliance on DERP relays when NAT traversal fails, user‑space WireGuard performance concerns, recent subnet‑router regressions on some distros.
Security Model and Identity-First Networking
- Interest in the “identity‑first networking” / “new internet” vision: moving away from IP‑centric security toward user/service identity, and overlaying on IPv4/IPv6 rather than replacing them.
- Some worry about trusting a centralized control plane; Tailnet lock is cited as mitigation but still depends on the control server’s behavior.
Hosted vs Self‑Hosted, SSO Requirements
- Questions about failure modes: if the hosted control plane dies, existing tunnels should keep working but new connections/changes can’t be orchestrated.
- Several users dislike that sign‑in effectively requires big‑tech identity providers; custom OIDC is possible but seen as overkill for individuals.