Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Greek revival you haven't seen (probably should)

May 11, 2025

A flock of Whitney Wolf burns out – and bounces back

May 10, 2025

Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

May 10, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    A flock of Whitney Wolf burns out – and bounces back

    May 10, 2025

    Google I/O 2025: What to expect including Gemini and Android 16 updates?

    May 9, 2025

    Epic Games and Spotify Test Apple's new app store rules

    May 9, 2025

    X Timeline is not updated for many users

    May 9, 2025

    AppFigures: Apple earned more than $10 billion from its US App Store commission last year

    May 8, 2025
  • Crypto

    Stripe unveils AI Foundation model for payments, revealing a “deeper partnership” with Nvidia

    May 7, 2025

    Movie Pass explores the daily fantasy platform of film buffs

    May 1, 2025

    Speaking on TechCrunch 2025: Application is open

    April 24, 2025

    Revolut, a $45 billion Neobank, recorded a profit of $1 billion in 2024

    April 24, 2025

    The new kids show will come with a crypto wallet when it debuts this fall

    April 18, 2025
  • Security

    Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

    May 10, 2025

    FBI and Dutch police seize and shut down hacked router botnets

    May 9, 2025

    Florida bill calling for encryption backdoors for social media accounts failed

    May 9, 2025

    Korean telephone giant SKT data breaches timeline

    May 8, 2025

    Powerschool paid the hacker ransom, but now the school says it's being forced

    May 8, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Greek revival you haven't seen (probably should)

    May 11, 2025

    A comprehensive list of 2025 tech layoffs

    May 9, 2025

    One of Elon Musk's longtime VCS is suing his former employer after allegedly fired

    May 8, 2025

    Sequoia leads a $1.5 billion tender offer for sales automation startup clay

    May 8, 2025

    Bosch Ventures is turning attention to North America with a new $270 million fund

    May 8, 2025
TechBrunchTechBrunch

How to create your own encrypted VPN server in 15 minutes

TechBrunchBy TechBrunchSeptember 30, 20247 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


You may have seen a lot of online advertisements for paid VPN services. However, as we discussed in a previous article, tunneling all your internet traffic through a VPN service is not a good idea.

Contrary to what their websites say, VPN companies usually don't care about protecting your privacy. These companies can see all of your web browsing history as they handle your internet traffic and DNS requests. We may also store logs of your IP address and connection history. This means this data can be passed on to authorities or stolen by cybercriminals.

In most cases, you don't need to enable a VPN connection before you can browse the web, as nearly all websites are delivered to your browser over a secure, encrypted connection (known as HTTPS).

However, depending on your risk profile, also known as your threat model, a VPN may be useful. You may not be able to access your website from a public network because the public network is blocked. Or maybe you're traveling to a country where the content you want to access, such as news, music, or video streaming services, isn't available. In these cases, it's important to minimize the risks when using a VPN.

That's why we'll show you a few different ways to set up your own encrypted VPN server at home or in a nearby data center.

Easy: Run Tailscale on a spare computer at home

Tailscale allows you to easily create a virtual network and connect all your devices to that network. Tailscale is built on WireGuard, a robust open source VPN protocol that works on almost any device.

Tailscale has many use cases. Developers use this to access remote servers. Businesses use it to give employees access to all kinds of corporate services even when they're not in the office. In this example, we will use it as an alternative to a VPN service that can encrypt and redirect all your internet traffic.

If you have a computer that's always running at home, or an old laptop that you no longer use, download and install Tailscale on that device. The Tailscale app is available for both Windows and macOS. (Also available on Linux using Terminal.)

Create a Tailscale account and create your first tailnet. In Tailscale terminology, Tailnet is a unique private peer-to-peer mesh network that allows devices to communicate with each other.

Click the Tailscale icon in your macOS menu bar or Windows taskbar. Turn on Tailscale and go to the Exit Node menu. Click “Run End Node…”

You can now install Tailscale on personal devices you travel with, such as your laptop or cell phone. Install Tailscale and log in to your account. The computer running at home appears in the list of devices in your private network.

Proceed again to the Terminate Nodes section. This time, select your home computer as the end node. that's it! If your device uses your home computer as an exit node, all Internet traffic will pass through that exit node.

Tailscale's role is to manage the coordination servers that make this VPN connection possible. This coordination server is responsible for distributing public keys to all devices in the Tailscale network so that they can securely communicate with each other. Tailscale does not route traffic through the coordination server.

As for your private key, it always remains on your device. Without these private keys, there is no way for Tailscale or anyone else to decrypt the data flowing through the VPN tunnel. This configuration allows you to get all the benefits of an encrypted VPN connection without having to manually generate, distribute, and handle public keys.

As a result, you can browse the web as if you were at home, even if you are thousands of miles away on a very limited Wi-Fi network.

At this point, you might be thinking, “This is great, but I don't want my computer running 24/7.” The good news is that with Tailscale you can turn your Apple TV into an exit node. Apple TV is designed to be always on, ready to turn on and use, so your exit node is always available. If you're not an Apple TV user, you might have an Android-based set-top box or an old Android smartphone sitting in your drawer. Tailscale allows you to run end nodes on Android devices as well.

Two side-by-side screenshots of the exit node submenu of the Tailscale client on macOS (left) and Windows (right) The exit node submenu for the Tailscale client on macOS (left) and Windows (right). Image credit: TechCrunch (screenshot)

Medium: Install Tailscale on Raspberry Pi

If your modem or router is in a special location, you may want to build your own Tailscale device and connect it to your router with an Ethernet cable.

If so, you can also purchase a Raspberry Pi, a small and inexpensive single-board microcomputer. We recommend the Raspberry Pi 4 or Raspberry Pi 5 as they have Gigabit Ethernet ports. If you have a fiber connection at home, you can turn on your VPN connection and get faster speeds on that Gigabit Ethernet port.

You can flash your microSD card using Raspberry Pi Desktop, an operating system designed specifically for these computers. To set up your Raspberry Pi, you'll also need a USB keyboard and mouse, and a micro-HDMI-to-HDMI cable.

You can then connect your Raspberry Pi to your computer display or TV and power it on. To install and run Tailscale, you need to open a terminal and run a few commands detailed on the Tailscale website.

You also need to enable IP forwarding in the Raspberry OS using the following three commands:

echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.conf echo 'net.ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.conf echo 'net. ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.conf sudo sysctl -p /etc/sysctl.conf

After the last command, run the following command:

sudo tail scale up –advertise-exit-node

This completes the conversion of this Raspberry Pi to a Tailscale exit node.

You can now install Tailscale on your personal device that you travel with and use your Raspberry Pi as an exit node.

Raspberry Pi 5 circuit board photo Raspberry Pi 5. Image credit: Romain Dilet / TechCrunch

If you like this setup and are comfortable using a terminal, you can follow the same steps in Raspberry Pi OS Lite, an operating system for the Raspberry Pi that doesn't have a traditional desktop interface.

You can also follow the same steps to create your own VPN server in a nearby data center. Many companies, including DigitalOcean, Vultr, Linode, Scaleway, Hetzner Cloud, and OVHcloud, offer inexpensive virtual servers for around $5 per month.

After you create a server with one of these cloud hosting companies, start your server and install Tailscale using the web console. You can also log in from your own terminal using SSH, which is often used for remote access.

Screenshot of an iPhone running Tailscale's iPhone app with the ability to select end nodes at the top.Tailscale iPhone app. There is a feature at the top that allows you to select an exit node. Image credit: Romain Dilet / TechCrunch

Advanced: Tailscale for Fly.io or WireGuard for VPS

At this point, you may find that it's not that difficult to set up your own encrypted VPN server and route all your internet traffic through it. So you can get creative with your setup.

For example, developer Patrick Recher built a global network of Tailscale exit nodes on Fly.io, a cloud hosting company that can create virtual machines on the fly based on configuration files.

Recher can add servers to new regions with a single command line. And when you're done, stop and destroy the virtual machine. For more information, please visit Recher's GitHub repository.

If you do not want to rely on Tailscale to coordinate your peer-to-peer network, you can install and configure WireGuard directly. There are several tutorials on the web that guide you through the WireGuard setup process. Setting up WireGuard isn't too complicated, and you'll learn a few things along the way.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

May 10, 2025

FBI and Dutch police seize and shut down hacked router botnets

May 9, 2025

Florida bill calling for encryption backdoors for social media accounts failed

May 9, 2025

Korean telephone giant SKT data breaches timeline

May 8, 2025

Powerschool paid the hacker ransom, but now the school says it's being forced

May 8, 2025

VC Company Insight Partners Review Personal Data Stolen During a January Hack

May 8, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Greek revival you haven't seen (probably should)

May 11, 2025

A flock of Whitney Wolf burns out – and bounces back

May 10, 2025

Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

May 10, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.