Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Following YouTube, Meta announces crackdowns on “non-original” Facebook content

July 14, 2025

Episolus informs millions of people that their health data has been stolen

July 14, 2025

Trump administration spends $1 billion on “aggressive” hacking operations

July 14, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Following YouTube, Meta announces crackdowns on “non-original” Facebook content

    July 14, 2025

    When browser wars get hot, there are the hottest alternatives for Chrome and Safari in 2025

    July 14, 2025

    Elon Musk's Groke makes AI companions, including goth anime girls

    July 14, 2025

    Notebooklm adds featured notebooks like the Economist, Atlantic and more

    July 14, 2025

    Weekly subscriptions dominate iOS app revenue, report discovers

    July 14, 2025
  • Crypto

    Bitcoin surpasses $118K at the second highest high in 24 hours

    July 11, 2025

    Vitalik Buterin reserves for Sam Altman's global project

    June 28, 2025

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025
  • Security

    Episolus informs millions of people that their health data has been stolen

    July 14, 2025

    Trump administration spends $1 billion on “aggressive” hacking operations

    July 14, 2025

    It has been revealed that it has confused the winner of the 2025 audience selection

    July 14, 2025

    Elmo's X account has been hacked and publishes racist and anti-paralytic posts

    July 14, 2025

    Can “ethical” spyware makers justify offering their technology to ice?

    July 11, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    All TC stages will be on sale in Boston tomorrow, with ticket prices rising

    July 14, 2025

    Elon Musk's SpaceX may invest $2 billion in Musk's Xai

    July 13, 2025

    TC All stages will be in Boston tomorrow, prices will rise by then

    July 13, 2025

    July 12, 2025

    All stages 2025 light up Boston for 3 days remaining to save before TC

    July 12, 2025
TechBrunchTechBrunch

How to create your own encrypted VPN server in 15 minutes

TechBrunchBy TechBrunchSeptember 30, 20247 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


You may have seen a lot of online advertisements for paid VPN services. However, as we discussed in a previous article, tunneling all your internet traffic through a VPN service is not a good idea.

Contrary to what their websites say, VPN companies usually don't care about protecting your privacy. These companies can see all of your web browsing history as they handle your internet traffic and DNS requests. We may also store logs of your IP address and connection history. This means this data can be passed on to authorities or stolen by cybercriminals.

In most cases, you don't need to enable a VPN connection before you can browse the web, as nearly all websites are delivered to your browser over a secure, encrypted connection (known as HTTPS).

However, depending on your risk profile, also known as your threat model, a VPN may be useful. You may not be able to access your website from a public network because the public network is blocked. Or maybe you're traveling to a country where the content you want to access, such as news, music, or video streaming services, isn't available. In these cases, it's important to minimize the risks when using a VPN.

That's why we'll show you a few different ways to set up your own encrypted VPN server at home or in a nearby data center.

Easy: Run Tailscale on a spare computer at home

Tailscale allows you to easily create a virtual network and connect all your devices to that network. Tailscale is built on WireGuard, a robust open source VPN protocol that works on almost any device.

Tailscale has many use cases. Developers use this to access remote servers. Businesses use it to give employees access to all kinds of corporate services even when they're not in the office. In this example, we will use it as an alternative to a VPN service that can encrypt and redirect all your internet traffic.

If you have a computer that's always running at home, or an old laptop that you no longer use, download and install Tailscale on that device. The Tailscale app is available for both Windows and macOS. (Also available on Linux using Terminal.)

Create a Tailscale account and create your first tailnet. In Tailscale terminology, Tailnet is a unique private peer-to-peer mesh network that allows devices to communicate with each other.

Click the Tailscale icon in your macOS menu bar or Windows taskbar. Turn on Tailscale and go to the Exit Node menu. Click “Run End Node…”

You can now install Tailscale on personal devices you travel with, such as your laptop or cell phone. Install Tailscale and log in to your account. The computer running at home appears in the list of devices in your private network.

Proceed again to the Terminate Nodes section. This time, select your home computer as the end node. that's it! If your device uses your home computer as an exit node, all Internet traffic will pass through that exit node.

Tailscale's role is to manage the coordination servers that make this VPN connection possible. This coordination server is responsible for distributing public keys to all devices in the Tailscale network so that they can securely communicate with each other. Tailscale does not route traffic through the coordination server.

As for your private key, it always remains on your device. Without these private keys, there is no way for Tailscale or anyone else to decrypt the data flowing through the VPN tunnel. This configuration allows you to get all the benefits of an encrypted VPN connection without having to manually generate, distribute, and handle public keys.

As a result, you can browse the web as if you were at home, even if you are thousands of miles away on a very limited Wi-Fi network.

At this point, you might be thinking, “This is great, but I don't want my computer running 24/7.” The good news is that with Tailscale you can turn your Apple TV into an exit node. Apple TV is designed to be always on, ready to turn on and use, so your exit node is always available. If you're not an Apple TV user, you might have an Android-based set-top box or an old Android smartphone sitting in your drawer. Tailscale allows you to run end nodes on Android devices as well.

Two side-by-side screenshots of the exit node submenu of the Tailscale client on macOS (left) and Windows (right) The exit node submenu for the Tailscale client on macOS (left) and Windows (right). Image credit: TechCrunch (screenshot)

Medium: Install Tailscale on Raspberry Pi

If your modem or router is in a special location, you may want to build your own Tailscale device and connect it to your router with an Ethernet cable.

If so, you can also purchase a Raspberry Pi, a small and inexpensive single-board microcomputer. We recommend the Raspberry Pi 4 or Raspberry Pi 5 as they have Gigabit Ethernet ports. If you have a fiber connection at home, you can turn on your VPN connection and get faster speeds on that Gigabit Ethernet port.

You can flash your microSD card using Raspberry Pi Desktop, an operating system designed specifically for these computers. To set up your Raspberry Pi, you'll also need a USB keyboard and mouse, and a micro-HDMI-to-HDMI cable.

You can then connect your Raspberry Pi to your computer display or TV and power it on. To install and run Tailscale, you need to open a terminal and run a few commands detailed on the Tailscale website.

You also need to enable IP forwarding in the Raspberry OS using the following three commands:

echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.conf echo 'net.ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.conf echo 'net. ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.conf sudo sysctl -p /etc/sysctl.conf

After the last command, run the following command:

sudo tail scale up –advertise-exit-node

This completes the conversion of this Raspberry Pi to a Tailscale exit node.

You can now install Tailscale on your personal device that you travel with and use your Raspberry Pi as an exit node.

Raspberry Pi 5 circuit board photo Raspberry Pi 5. Image credit: Romain Dilet / TechCrunch

If you like this setup and are comfortable using a terminal, you can follow the same steps in Raspberry Pi OS Lite, an operating system for the Raspberry Pi that doesn't have a traditional desktop interface.

You can also follow the same steps to create your own VPN server in a nearby data center. Many companies, including DigitalOcean, Vultr, Linode, Scaleway, Hetzner Cloud, and OVHcloud, offer inexpensive virtual servers for around $5 per month.

After you create a server with one of these cloud hosting companies, start your server and install Tailscale using the web console. You can also log in from your own terminal using SSH, which is often used for remote access.

Screenshot of an iPhone running Tailscale's iPhone app with the ability to select end nodes at the top.Tailscale iPhone app. There is a feature at the top that allows you to select an exit node. Image credit: Romain Dilet / TechCrunch

Advanced: Tailscale for Fly.io or WireGuard for VPS

At this point, you may find that it's not that difficult to set up your own encrypted VPN server and route all your internet traffic through it. So you can get creative with your setup.

For example, developer Patrick Recher built a global network of Tailscale exit nodes on Fly.io, a cloud hosting company that can create virtual machines on the fly based on configuration files.

Recher can add servers to new regions with a single command line. And when you're done, stop and destroy the virtual machine. For more information, please visit Recher's GitHub repository.

If you do not want to rely on Tailscale to coordinate your peer-to-peer network, you can install and configure WireGuard directly. There are several tutorials on the web that guide you through the WireGuard setup process. Setting up WireGuard isn't too complicated, and you'll learn a few things along the way.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Episolus informs millions of people that their health data has been stolen

July 14, 2025

Trump administration spends $1 billion on “aggressive” hacking operations

July 14, 2025

It has been revealed that it has confused the winner of the 2025 audience selection

July 14, 2025

Elmo's X account has been hacked and publishes racist and anti-paralytic posts

July 14, 2025

Can “ethical” spyware makers justify offering their technology to ice?

July 11, 2025

CISA confirms that hackers are actively taking advantage of the critical “Citrix Bleed 2” bug

July 11, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Following YouTube, Meta announces crackdowns on “non-original” Facebook content

July 14, 2025

Episolus informs millions of people that their health data has been stolen

July 14, 2025

Trump administration spends $1 billion on “aggressive” hacking operations

July 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.