- What's the main differentiator between Tailscale and Netrinos?
Edit: Just found this post https://netrinos.com/blog/tailscale-alternatives-2025, so it looks like main differentiator is pricing right now.
by windexh8er
5 subcomments
- Well, I wish you the best with this - but I really don't understand the target market.
The obvious competitor here is Tailscale. But let's say, reasons, and Tailscale isn't an option. Then you go down the path... TwinGate, Teleport, Netbird, Pomerium, Netmaker, ZeroTier, etc...
Even the initial pricing and free tier are you're up against are going to mostly be a deal breaker compared to what's out there.
Trusting a VPN provider is a lot. If you're running the control plane - why should I trust Netrinos?
- The "No IT Department" part of your marketing immediately turns me off because that's actively encouraging "shadow IT".
We all get that sometimes companies have IT policies which are outdated and get in the way, but that's a problem for someone up the chain to solve. A team or department deciding to just start doing their own thing with something like this which isn't managed by or even known about by the official company IT is at best a path to future problems if not an immediate compliance problem.
- I really like your fair differentiation and feature comparison vs Tailscale, netbird etc.
Love to see the ecosystem of wireguard based services growing into different business segments, i.e. you targeting SMBs/small teams.
Not for me, but legitimate use case and product :)
- The GitHub link on your website is 404 (https://github.com/netrinosnetwork)
by anonzzzies
1 subcomments
- Is there something like tailgate (or this) with only cli (I much dislike tailgate gui stuff on mac/win, on mobile its kind of needed) and you own small connection gateway on your own vps? I know tailgate has an open source implementation but I could not get that working while bored at the airport so that's not simple enough (the thing is enormous as well while it should just 'handshake' and that's it right?).
by ImPleadThe5th
2 subcomments
- Can anyone explain to me (someone not so network security savvy) if there are any privacy or security concerns using a wire guard provider like this?
As I understand it, with traditional VPNs, you basically have to trust third-party audits to verify the VPN isn't logging all traffic and selling it. Does the WireGuard protocol address theses issues? Or is there still the same risk as a more traditional VPN provider?
by ImPleadThe5th
2 subcomments
- Naive question here: with WireGuard VPN, does all traffic route through the VPN or only those packets bound for the other devices in the mesh?
by nickorlow
1 subcomments
- Seems similar in purpose to https://vpncloud.ddswd.de/
- Thanks to everybody who participated. This has been an excellent discussion and has resulted in some interesting ideas to pursue.
by mrbluecoat
1 subcomments
- Any plans for Exit Node capability (traditional egress VPN)?
by nodesocket
1 subcomments
- I use Twingate both for personal use (my home) and to access AWS EC2 servers (no public ips) and really love it. Very polished, easy setup. How does Netrinos compare?
by focusgroup0
1 subcomments
- >We use STUN-style discovery and relay fallback
How does your relay compare to Tailscale's (DERP)?
- Full disclaimer: huge Linux fanboy here.
Not really related to the product itself, but your landing page design looks close to the official Microsoft style which I dont have the best memories of..
It might be intentional to show the "seamless integration" to Windows users but my penguin loving soul got scared!
- I only use Tailscale for two features - one is having every machine on the network use a logical name of the pattern {projectname}-{environment} ie: `ssh me@hn-prd` and the other is exit nodes. I couldn't work out from your site if either of these two things is doable here.
- [dead]
- [dead]
- [dead]
- [dead]