Hacker Newsnew | past | comments | ask | show | jobs | submit | guiambros's commentslogin

Yep, I have the same set up. Use GL router to connect to the hotel wifi, and all devices are automatically connected, without captive portal on each one.

Added bonus that I can use tailscale on the GL router to route remote traffic through my tailnet -- including devices where I can't install tailscale client (e.g. corp laptop).


Same! And the best thing is that you can install Tailscale, so you can connect to your tailnet, and exit all traffic through one of your nodes (e.g., your home/office network).

It's incredibly useful, with the added bonus that you don't need to install tailscale client in any of your travel devices (phone, tablet, work computer, etc).


I’m seeing a lot of this same comment here, so I went to check out this tailscale thing, which clearly I must need.

Can anybody explain what Tailscale is, does, or why everybody seems to have it?

Looking at their website, it’s just a huge wall of business jargon. Really! Read it. It’s nothing but a list of enterprise terminology. There’s a “how it works “ page full of more (different) jargon, acronyms and buzzwords, but no simple explanation of why everybody on this thread seems to be paying money for this thing?

Any help? Should I just pay them my $6/month and hope I figure it out at some point?


It's a wrapper around Wireguard that lets you use common SSO providers (Apple ID, Google, etc) to manage access.

It also handles looking up the IP address of your "nodes" through their servers, so you don't need to host a domain/dns to find the WAN IP of your home network when you're external to it (this is assuming you don't pay for a fixed IP).

Most people put an instance of it on a home server or NAS, and then they can use the very well designed and easy to use iOS/mac/etc client to access their home network when away.

You can route all traffic through it, so basically your device operates as if you're on your home network.

You can accomplish all of this stuff (setting up a VPN to your home network, DNS lookup to your home network) without Tailscale, but it makes it so much easier.


TS makes it super easy to use a VPC I have in the US as my VPN exit while I live in other parts of the world. Apps that work on phones, computers, and my AppleTV are big pluses over Wireguard which I have also used.

I was still completely mystified until your last sentence. And now I'm just mostly mystified. I, too, keep hearing Tailscale Tailscale Tailscale from HN commenters but have no idea why I'd need it. For anything I need to access on (or from) my home network I just use a VPN I've hosted in my home for the last decade or so.

If you've already got a VPN solution your happy with, Tailscale probably adds very little value for you. It's just basically the easiest / most user friendly way to setup a VPN to your home network.

It can do way more than just being a VPN-to-home, but that's how most users use the free part.


It's still valuable. You can access your server with your own VPN set up, but what if you want to share a server to a friend or a family member (examples includes VaultWarden/Bitwarden, Plex, Jellyfin)?

If this is on Tailscale, you can just ask people to install tailscale client and login using one of the IdP, then ask them to accept the node you shared to them, and they can immediately access the server.

The alternative would be 1) sending VPN configs over and maybe also configure their VPN client for them, or 2) expose the service on the Internet protected by some OAuth proxy which really only works for web apps. Neither is easy/trivial.


I'd guess a plurality of people are only sharing Plex with family members, and nothing else. If you only care about sharing Plex, you don't need Tailscale to give a family member access, assuming you have Plex Pass, since Plex does a proxy as you describe.

Basic version is it's a sort of developer focused zero trust network service.

Encrypted overlay network based on wireguard tunnels, with network ACLs based around identity, and with lots of nice quality-of-life features, like DNS that just works and a bunch of other stuff.

(Other stuff = internet egress from your tailscale network ('tailnet') through any chosen node, or feeding inbound traffic from a public IP to a chosen node, SSH tied into the network authentication.

There is also https://github.com/juanfont/headscale - which is a open source implementation of some of tailscale's server side stuff, compatible with the normal tailscale clients.

(And there are clients for a very wide range of stuff).


I can’t tell if you’re trying to help, or just getting into the spirit of the website’s “how it works (using ten pages of terminology and acronyms we just made up)” page.

None of the terminology or acronyms that user used were made up or unique to this. I think you are blaming other people for your unfamiliarity with this kind of tech.

It is simply a managed service that lets you hook devices up to an overlay network, in which they can communicate easily with each other just as though they were on a LAN even if they are far apart.

For example, if you have a server you'd like to be able to SSH into on your home network, but you don't want to expose it to the internet, you can add both it and your laptop to a Tailscale network and then your laptop can connect directly to it over the Tailscale network no different than if you were at home.


Sorry if I appeared rude. That was very much tongue in cheek.

But notice how you just did a much better job of explaining what this thing does without using any jargon at all. The jargon helps if everyone already knows what you’re talking about. It hurts if anyone doesn’t.

That’s what I’m poking fun at. There’s a trait in lots of engineers I’ve worked with over the years to be almost afraid to talk about tech stuff in layman terms. Like they’re worried that someone will think less of them because they used words instead of an acronym. Like they won’t get credit for knowing what a zero trust network is if they describe the concept in a way that regular people might understand.

One of those guys was certainly in charge of this company’s website copy.


> But notice how you just did a much better job of explaining what this thing does without using any jargon at all.

There was plenty of jargon and acronyms like LAN and SSH. You're just used to those ones.


Perhaps if we were on Reddit, and also on a general subreddit, then people would speak in less technical terms.

Since this is HN, it’s almost expected the participants here would either know the terms, or at the very least be able to find out what they mean on their own and realize it’s not made up jargon but rather common industry terms.

Tailscale is not trying to sell to the average buyer, it’s trying to sell to a specific audience.


> Like they won’t get credit for knowing what a zero trust network is if they describe the concept in a way that regular people might understand.

I've been trying to get a definition of zero trust at $client from the security people who are pushing tools onto our platform, so we can have an honest conversation around threats and risks, and finding the best balance of tools, techniques and processes to achieve their desired outcomes.

Unfortunately, it seems like everybody just want "zero trust" because a vendor sold them on that idea and they gave money to the vendor, so now there's the need to justify that expense and "extract value" from the tool - even if it may in fact be worse than the controls that are already in place.


Your ignorance of the topic is no excuse to be rude to someone who's trying to help you.

That's just networking jargon

Basically it is managed Wireguard. Tailscale does say it, but it is buried under marketing speak.

It's also P2P mesh rather than hub and spoke which is quite important

It’s worth pointing out that it can be both. The hub and spoke model, relays, is often used for cloud setups where the overhead of installing clients on nodes is not worth the tradeoff

This. People are doing the same thing that OP mentioned in this thread.

I don't think you need to pay $6 a month to try it out.

Install it on all the machines you want. When you are running it on the machine, it is networked to the other machines that are running it. Now make an 'exit node' on one of those machines by selecting it in the UI, and all your gear can access the internet via that exit node. Your phone can run it. Your apple tv can run it. You can have multiple exit nodes. So you can have a worldwide network and not once did you have to open ports in firewalls etc.


How does it compare to Zerotier? The way I understand it it's kind of overlapping functionality but not necessarily everything. What I want from Zerotier is basically what you described about Tailscale.

The two problems I have with zerotier are:

1) It's supposed to let a mobile device like an Android tablet route its traffic through zerotier (functioning as a VPN to my home site, in this case). However, I've never got that to work. It's running, but doesn't affect anything network-wise for the other applications (unlike running e.g. openvpn on it)

2) On a couple of computers with specific routing set up to various destinations, when Zerotier runs it simply blocks all of that and there's no way for me to continue accessing anything else than the Zerotier network. No fiddling with routing tables etc. changes any of that. On other computers, also some running OpenVPN, Zerotier does not interfere. I've never figured out what causes this.

So, in short, I'm pondering if I should ditch Zerotier and try Tailscale instead. If it does the same - I simply want a way to connect my devices, but I also don't want to lose total control over routing. For mobile devices I would want full VPN, for computers I don't. Edit: So, I'm both after connecting my multiple networks, as well as VPN'ing certain things or devices through another location.

Thanks for any input on this.


Having tried both Zerotier and Tailscale, I found Tailscale to be a significant improvement. Tailscale uses Wireguard as the base encrypted protocol instead of a semi-homebrew protocol Zerotier came up with that notably lacks things like ephemeral keys/perfect forward secrecy. Tailscale also has a faster pace of improvement and is responsive to customer asks, regularly rolling out new features, improving performance, or fixing bugs. Zerotier by contrast seems to move slower, regularly promising improvements for years that never materialize (e.g. fixing the lack of PFS).

My last gripe is more niche, but I found Zerotier's single threaded performance to be abysmal, making it basically unusable for small single core VMs. My searching at the time suggested this was a known bug, but not one that was fixed before I switched to Tailscale. Not impossible to work around, but also the kind of issue that didn't endear the product to me or inspire confidence.


It's been a minute since I ran ZeroTier, so my memory is fuzzy.

Tailscale and ZT are not the same. ZT can do certain things that TS can't. One example is acting as a layer 2 bridge. Or a layer 3 bridge. TS can do neither. It can achieve mostly similar results though.

ZT can be a pain to setup. TS is a breeze. ZT's raw performance is quite poor. TS's is usually very good.

If I understood you correctly, you want both a way to access your home LAN when you're out - this is easy. Set up a node with NICs on the LAN subnets you want access to (I run it on my router), and configure the TS node to announce routes to those subnets. Install the TS client on your laptop and mobile and accept those routes. Job done.

If you also want to mask your egress - i.e. reach the Internet via your home network as if you were there - then you need a node (can be the same as above) configured to act as an Exit Node. When you want one of your devices to use this, just select the appropriate exit node. Job done.


So, somewhere on that website, there’s a free version that can be downloaded onto a desktop and run without signing up for their service?

I think I understand what it does now. So, basically you leave a computer running at home, and this thing lets you pretend to be running your internet stuff through it while you’re on the road?


> So, somewhere on that website, there’s a free version that can be downloaded onto a desktop and run without signing up for their service?

If you go to https://tailscale.com/pricing?plan=personal

The first plan on the left called 'Personal' is free.

It uses a central orchestrator which is what requires you to sign up. If you prefer to self host your orchestrator you can look into Headscale, an alternative that seeks to be compatible with the clients.

> So, basically you leave a computer running at home, and this thing lets you pretend to be running your internet stuff through it while you’re on the road?

That's one thing you can do with it, yes. You can also run custom DNS entries across it, ACLs, it is very flexible.


Ugh. On mobile, the first plan on the pricing page is “ starter” for $6. The plan to the right is partly visible, indicating that you can scroll that way. There’s nothing to indicate that you can scroll left.

A less hostile website design would have (again) saved me a question.


It seems like it defaults to Business, which is paid. If you tap "Personal" you'll see the free plan.

Sorry, but try a little harder. Tailscale isn't hostile, but it seems you are -- you claim to think you need it, but don't know what it does and can't put in the effort to determine and foist those inabilities on Tailscale?

I've been using Tailscale for many years now and they have a terrific product.


Tailscale is one of the simplest, most useful things I use. I only use the personal plan, but I keep toying with signing up for paid because it’s a damn good product.

The service is free up to certain amount of connected people and devices. You most likely don't need to pay for it. I am pretty heavy user and don't. It is virtual private network orchestrator. It allows you to connect to other devices that you add to your network as long as they are connected to the internet. So your office computer, home server or NAS. If you have some home automation like home assistant you can connect to it from anywhere. That kind of stuff.

You can run it on a capable router or on a RPi, or on your NAS. It's especially useful if you want to self-host (e.g. Immich). You can use it to authenticate for ssh if you like, or simply give you an IP you can ssh to.

It's especially handy if you want a secondary way in, in case you have problems connecting using wireguard, since it supports using a relay if you're stuck in a hotel with a heavily restricted connection.

If you run DNS at home, you can even configure it to use your home DNS and route to your home subnet(s).


Sign up for free using Google Sign In.

Install the tailscale client on each of your devices.

Each device will get an IP address from Tailscale. Think about that like a new LAN address.

When you're away from home, you can access your home devices using the Tailscale IP addresses.


So basically wireguard, but you have to pay for it, and you have create an account through Google/Apple/Microsoft/whatever.

Wireguard is not that hard to set up manually. If you've added SSH keys to your Github account, it's pretty much the same thing. Find a youtube video or something, and you're good. You might not even need to install a wireguard server yourself, as some routers have that built in (like my Ubiquity EdgeRouter)


It's not really "basically wireguard" and you don't have to pay for it for personal use. Wireguard is indeed pretty easy to set up, but basic Wireguard doesn't get you the two most significant features of Tailscale, mesh connections and access controls.

Tailscale does use Wireguard, but it establishes connections between each of your devices, in many cases these will be direct connections even if the devices in question are behind NAT or firewalls. Not every use-case benefits from this over a more traditional hub and spoke VPN model, but for those that do, it would be much more complicated to roll your own version of this. The built-in access controls are also something you could roll your own version of on top of Wireguard, but certainly not as easily as Tailscale makes it.

There's also a third major "feature" that is really just an amalgamation of everything Tailscale builds in and how it's intended to be used, which is that your network works and looks the same even as devices move around if you fully set up your environment to be Tailscale based. Again not everyone needs this, but it can be useful for those that do, and it's not something you get from vanilla Wireguard without additional effort.


I guess I'm still not following. Is there an example thing that you can do with Tailscale that you can't do with Wireguard? "Establishes connections between each of your devices" is pretty vague. The Internet can already do that.

I install tailscale on my laptop. I then install tailscale on a desktop PC I have stashed in a closet at my parents. If they are both logged in to the same tailnet, I can access that desktop PC from my home without any addition network config (no port forwarding on my parents router, UPNP, etc. etc).

I like to think of it as a software defined LAN.

Wireguard is just the transport protocol but all the device management and clever firewall/NAT traversal stuff is the real special sauce.


> software defined LAN

That’s such an elegant way of putting it that they should use it in their marketing.


You can run two nodes both behind restrictive full cone NATs and have them establish an encrypted connection between each other. You can configure your devices to act as exit nodes, allowing other devices on your "tailnet" to use them to reach the internet. You can set up ACLs and share access to specific devices and ports with other users. If you pay a bit more, you can also use any Mullvad VPN node as an exit point.

Tailscale is "just" managed Wireguard, with some very smart network people doing everything they can to make it go point-to-point even with bad NATs, and offering a free fallback trustless relay layer (called DERP) that will act as a transit provider of last resort.


I can guide any tech-illiterate relative to install Tailscale and connect it over the phone.

1) download Tailscale 2) install 3) log in with Google account

done. It doesn't matter if they're on Windows or MacOS.


Tailscale is free for pretty much everything you'd want to do as a home user.

It also doesn't constantly try and ram any paid offerings down your throat.

I was originally put off by how much Tailscale is evangelised here, but after trying it, I can see why it's so popular.

I have my Ubuntu server acting as a Tailscale exit node.

I can route any of my devices through it when I'm away from home (e.g. phone, tablet, laptop).

It works like a VPN in that regard.

Last year, I was on a plane and happened to sit next to an employee of Tailscale.

I told him that I thought his product was cool (and had used it throughout the flight to route my in-flight Wi-fi traffic back to the UK) but that I had no need to pay for it!


They still tie you to Google?

Microsoft, Github, and Apple login are the other options if you don't want to use Google.

One of the things keeping me from adopting Tailscale is that I need to sign up with one service, but I can't add multiple services as login options in case one of those SSO providers lock me out, like what happened to Dr Paris Buttfield-Addison with Apple.

Add a second user to your network?

What am I missing?


> Add a second user to your network?

I checked, and Tailscale only allows a single Owner [1], so it would still be pretty disastrous if the Owner account was suspended by the single sign-on organisation.

[1] https://tailscale.com/kb/1138/user-roles#owner


Got it.

So almost like SSO being the paywall for some enterprise apps.


Great, yet another opportunity for Big Tech to track people. I’ll stick to my Wireguard setup, I have a fixed IP and would rather have full control of what is happening by setting up the keys myself than trust a third party.

So zero options that will not tie their service to some other service still.

So much for resilience.


You can self host with Headscale.

You can also use passkeys so you aren't tied to a centralized SSO provider.

... after i sign up for the service with a google/microsoft/whatever account, i suppose.

Not sure if anybody gives you the answer to "what is tailscale?". So, this is my answer (hopefully it's correct and simple enough to understand).

Tailscale allows devices that can access the Internet (no matter how they access the Internet) to see each other.

To do that, you create a tailscale network for yourself, then connect your devices to that network, then your devices can see each other. Other devices that are connecting to the Internet but not to our tailscale network won't see your devices.

AI might explain it better :-) Don't know why I wanted to explain it.


So a VPN?

A multipoint VPN that punches through NAT and can be configured to do a lot of neat things besides.

Nothing that a network guru or even a sufficiently motivated hacker couldn’t do on their own, except that the maintenance is practically zero for the personal user and it’s actually easy enough for a very nontechnical person to use (not necessarily to set up, but to use), perhaps with a bit of coaching over the phone. Want to use a different exit point for your traffic? It’s a dropdown list. Share a file? Requires one config step on the client for macOS, once, and then it’s just in the share menu. Windows, Android, iOS are ready to go without that. Share whole directories? Going to require some command-line setup once per shared directory, but not after that.

There are features that are much more enterprise-focused and not as useful for personal stuff, but everything above is in the free version.

I’m not in tech at all, professionally, and never have been. I’m savvy for an end user - I can install Linux or a BSD, I can set up a network, I can install a VPN myself to get back to my home network - but I would never, ever call myself anything more than an interested layman. I probably could figure most of this out on my own, if I had to. Thing is, I don’t have to. It’s more than just Wireguard in a pretty wrapper.

Try it. It won’t take long to figure out why so many people here like it, even if you may not want to use it.


Extending the question:

In my mind Tailscale was primarily to expose local services but answers here sound a bit as if people used it as a VpN replacement.

If I do not want to expose local services but only protect me and hide from untrusted WiFi, would I better use a traditional VPN or Tailscale?

My thinking is that Tailscale could be the better VPN because they have a clean business model while pure VPN companies are all shady.


Tailscale can tunnel all your traffic through a chosen exit node so you browse the web and whatnot as if you were at home (or wherever the exit node is), so in this way it's a bit like a VPN from a VPN company, but it doesn't give you a list of countries to select from.

VPN companies aren't really in the business of selling VPNs. They sell proxies, especially proxies that let you appear to come from some country, and you typically connect to the proxy using the VPN functionality (particularly if you're using a consumer device instead of a laptop), but often you can use SOCKS5 instead.

Tailscale isn't in the business of selling proxies.


> In my mind Tailscale was primarily to expose local services

You might be thinking of tailscale funnel:

https://tailscale.com/kb/1223/funnel

Which is nice, but still a beta feature. Tailscale itself is indeed a mesh VPN that lets you connect all your devices together.

> If I do not want to expose local services but only protect me and hide from untrusted WiFi, would I better use a traditional VPN or Tailscale?

It does NOT by default route all your internet traffic through one of its servers in order to hide it from your ISP, like the type of VPN you might be thinking of (Mullvad, ProtonVPN etc.).

Though you CAN make it route all the traffic from one of your devices through another, which they call an 'Exit Node'. They also have an integration with Mullvad, which allows you to use Mullvad servers as an exit node. Doing that would be identical to just using Mullvad though.


Tailscale is an enterprise vpn, connecting multiple of your networks, where as consumer vpns just make your network traffic exit from their network.

I run a tailscale exit node on an anonymous vps provider to give me a similar experience to a consumer vpn.


A system by wich you can expose things on your private network (e.g. your home lan) so you can selectively and securely make them accesible from other places (e.g. over the Internet). You can do all this without tailscale by just configuring secure encrypted tunnels (wireshark, traefic, ...) yourself, but services like tailscale provide you with easy gui configuration for that.

I personally use Pangolin, which is similar https://github.com/fosrl/pangolin


For me: it's a way to access services I host on my homelab LAN from 3000 miles away. Having a router that automatically logs into that and routes TS addresses properly allows you to use all your devices connected to that router to access TS services with no further configuration. I host Kiwix, Copyparty, Llama.cpp, FreshRSS, and a bunch of other services on my homelab, and being able to access all of those remotely is convenient.

It's a virtual network switch/router with DHCP, DNS, and lots more enterprisey features on top. You 'plug' devices into it using a VPN connection.

It's a cryptographic key exchange system that allows nodes to open Wireguard tunnels between each other. They have a nice product, but I don't like how it spies on your “private” network by default: https://tailscale.com/kb/1011/log-mesh-traffic

If you want to self-host, use NetBird instead.


Where spies == logging and they tell you, and provide clear opt out instructions

Imagine thinking most people read Knowledge Base articles and don't just take the defaults.

They even manage to squeeze some FUD into the opt-out toggle's name.


they have an excellent set of short intro videos [0] on youtube, that's what I used to get an overview and get set up.

[0] https://youtu.be/sPdvyR7bLqI?si=2kIpHtNuJ52jEdmm


Also the free tier is sufficient for basically anything non power-user or enterprice.

You don't need to get too far down the page to see "VPN", which is what it is. But on top of that primitive, it's also a bunch of software and networking niceties.

It’s a point to point vpn that works between devices even without a direct network connection.

Their personal free plan is more than enough.


It’s Wireguard for lazy people

It just virtual private network.

Open their GitHub page?

We’re from the US but were recently in Germany. Sometimes we were completely exhausted after a long day and just wanted to rest in our room a little before going to sleep. Our motel had like 2 English speaking channels and both sucked. We watched a lot of German TV because it was interesting, even if we could barely understand what was going on. After some time doing that, it was a pleasure watching some Hulu, courtesy of connecting to WireGuard back at our house in California so that we had an American IP.

I did the same thing recently while visiting family in SE Asia. I wanted to watch my team's bowl game but American college football is unknown in that part of the world. A Wireguard connection back to my home router gave me the ESPN access I pay for in the US.

A few services didn't work because they required my mobile device's location services (which still showed my in Asia). I'm sure I could have found a workaround for that but wasn't properly motivated to put in the effort for a short visit.

In a similar vein, I was able to troubleshoot a problem with our NAS from a cellular connection on a boat near Bali a couple years ago. My son needed access to some files for his college homework but couldn't access it remotely. I was able to access it and reconfigure a setting that had changed during an update and restore his access.

The internet feels like magic sometimes.


> with the added bonus that you don't need to install tailscale client in any of your travel devices (phone, tablet, work computer, etc).

I am sorry, this confuses me. If I don't have a lclient, for example in my laptop, how does my laptop uses Tailscale then?

Also, TailScale Personal says 3 users. Is that a problem for as we are 4? (me, wife, son, doughter).


For what it's worth, you get 100 devices total, regardless of number of user accounts. If you don't need the permissions granularity that individual accounts have, consider only having an "admin" and "untrusted" account... or a single account, and pinky promise your family not to play with it.

If Tailscale is installed on your router, then any client will also be able to connect to Tailscale networks.

Fo example, if you have a default route back to your home network on the router, any client will also connect through that tunnel back through your home. This assumes you are using your travel router to connect your laptop as opposed to say the hotel wifi. (In this scenario, your travel router is connected to both the hotel wifi as an uplink and Tailscale.)


Oh, got it.

What about the users? Do I need 4 for my family of 4? Or are the 3 users included in the free plan just admin users?


You only need separate users if you want to restrict certain features (devices, apps, etc.) to only certain users (i.e., it's more of a business thing). My wife's machines all use my username because... she lives with me; if she wanted suddenly to learn networking and computers and hack all our stuff, she could do it anyway since she has physical access.

So pretty much anyone you would trust on your LAN can be trusted with your Tailscale user. You can just log yourself into Tailscale on the kids' devices and then use the admin console to make those devices' logins never expire. They can use all the features, but they don't know your authentication method and thus can't get admin access themselves. About the only situation in which the typical home user would need multiple accounts would be if someone was physically away from you and had a new device they needed to connect to your tailnet (their term for your collection of devices, services, etc.) but you didn't want to share your password with them. If they're physically near you, you just authenticate their device and hand it back to them.


These are neat in that you can jump on and extend existing wifi infra, but it'd be nice if they also included 5G. I want a product that does both.

It's cool to have your own network in a hotel. But it'd be nice to be able to do that on the road, away from public wifi, internationally, whenever - which hotspots do. But at the same time, it'd be nice to be able to do the WiFi thing too to cut back on data usage. I frequently blow through my hotspot data.

I'd rather this be in one device instead of two. Beggars can't be choosers, though, I suppose?


I’m using a GLinet GL-XE3000 for that and it’s great. Initial setup of the 5G eSIM on a physical SIM took a little searching but it’s been rock solid and having consistent access on the road and hotels has been great for family travel. It has a built-in battery, but I’ve never really tested the duration (I suspect it’s 3-6 hours) as I put it on its AC adapter in the hotel and the n a cigarette lighter adapter in the car, so the battery gets used 15-45 minutes at a time to bridge between those two places.

I like it enough that I might buy a second, more compact unit for when space is more a premium, but I’ve been really happy with this one.


What is your usage scenario for this device? It's $400 and 3/4 kg.

I bought that specific model to provide connectivity for our robotics team’s pit computers. For this need, good antenna performance is key, since different venues differ wildly in WiFi and cell coverage and when we setup the evening before comps, I want the best chance of getting a solid connection and offering it to the pit LAN.

But now that I have it, the device is handy for family travel as well. Put an unlimited data eSIM in the device and everyone has “unlimited” data n the road and when we arrive at a hotel or AirBnB, one person signs it on to wifi and everyone is connected, including tailscale connections to home.

If I was doing personal and work travel only, I’d look for a smaller unit, but still with a decent battery.


According to their website, it weighs 761g.

Right, 3/4 kg is 750 g.

Oh wow, I got completely confused by this usage, and thought it meant 3 to 4 kilograms :)

I will use ¾ next time)

I do want to point out that dumping all of your traffic through a home/office network is not always a good idea. YMMV, but if you are in, say, LA, and pushed your 0.0.0.0 traffic through your home in NY, you just added quite a bit of latency.

This is great for keeping things in a LAN, but make sure you use your network rules correctly and don’t dump everything to your home network unless you need to.

(I too have a gli slate, but I use UI at home so will consider this when it comes out)


I disagree. DNS is generally unencrypted and leaking that over whatever open wifi you're on is generally worse from a privacy perspective than the latency you add bouncing through your home where you probably have encrypted DNS setup.

Even if you don't visit any http sites, you never know what might phone home over http, so an OS level VPN provides foolproof privacy at the cost of a tiny bit of latency.


Using encrypted DNS doesn't necessitate routing all your traffic through your home network. You can still encrypt all your traffic by using an encrypted DNS service or, if you really want to, a VPN service. But moving everything through your home network is not necessary, especially if you have any kind of usage caps.

And to further reinforce this point, one of the basic config variables for wireguard is your dns servers. You could literally send no traffic but your dns queries to the wg tunnel.

DNS is just one example. Like I said on my post you never know what data might be sent home in plaintext

Same; avid reader of printed books here. I have more pdfs I can count (most coming from Humble Bundle impulse buying), but nothing beats physical books for me.

I got a remarkable pro, and it's just slightly better than screen. Being able to annotate books is actually a welcomed addition, and the screen is pretty decent. But flipping screen is slow (compared to a printed book), and going back and forth between pages is a hassle. Until we have the speed of a tablet (read: instant), with the screen quality of an e-ink, I don't think I'll voluntarily retire printed books.

Now, I have an O'Reilly subscription (two actually, through school and ACM), but the app is sadly horrendous, as OP mentioned. Hard to believe this is actually their core business.


I don't know if HN gives you notifications when you get replies so I'm going to reply to this post regarding

https://news.ycombinator.com/reply?id=46179347&goto=item%3Fi...

How are you able to download the videos to begin with?


oh hi!

If you're an OMSCS student, most courses offer the download through Ed or Canvas. Usually it's a big zip file under the first lesson, but I've seen some available in the shared Dropbox. I've seen this for GIOS, ML4T, ML, and a few others. Or you can just reach out to the TAs.

If you're not a student, then it gets a bit tricky. Some courses are available as YouTube playlists or on Coursera, but then it becomes a hassle to download and piece together hundreds of individual files.

Feel free to drop me a note (email in my profile), or open an issue on github.


Thanks for your reply. Unfortunately I'm not a student there. I just saw that they were making some of their lessons publicly available and wanted to organize the material for myself. I'm experiencing their courseware through the 2 minute long micro lessons on the Ed platform and I don't see any way to download the videos.

Seems like I'm stuck using Ed.


Some courses are widely available on YT [1], and already in the more palatable (IMO) long-form format instead of hundreds of 1-2 min snippets. Some other courses you can find download links somewhere [2].

So yeah, it's a bit of a hassle, and but you can probably still piece it together for some/most courses that are publicly available.

[1] https://www.youtube.com/@manx6092/playlists [2] https://www.reddit.com/r/OMSCS/comments/zjbh8i/cs_6200_lectu...


Current OMSCS grad student; three down, seven to go. Loving the program so far.

The content is great, and most of it is available on Open Courseware, YT, etc, but here's what else you get by officially going through the program:

- the amazing community of TAs

- the assignments

- the feedback on reports & projects (either automated, or through TAs)

- the collaboration with other students on Ed, Discord, Slack, etc

- the forcing function of deadlines, having to study for exams, etc

- free access to academic libraries, IEEE, ACM, O'Reilly, etc

- access to software and services, educational packages from GitHub, Wolfram, Google Colab Pro, student discount in a bunch of places, etc

Another underrated aspect is GT's ability to preserve rigor of the program overall, despite the scale and number of students in some courses (the most popular ones have 1,000-1,500 students per semester).

If you're on the fence on applying, I strongly recommend you do. The program is affordable enough that there's no harm in trying for a few semesters to see if matches what you're looking for.

Glad to answer any questions.


Graduated 5 years ago. One of the best decisions in life. Coursework is challenging and more than 2 classes would definitely feel like a very full time degree (1 per semester is the best pace imo for work life study balance). Although you would need special permission to take a third class (from what I remember).

My resume is also looked at differently after mentioning Georgia Tech. It really helped gain a lot of confidence. Fundamentally changed things as my undergraduate in India was not a good experience for me.


In reference to the open courseware, is there a way to either just download all of the videos in bulk, or view them as part of a single video? It looks like they're broken down into ~2 minute long video clips through the Ed platform, which is very annoying.


Annoying indeed. I created a script using ffmpeg to merge all the 2-min clips into a longer video per chapter[1], so I could watch the lectures on my commute.

You may need to tweak for different courses, but I've used for ML4T, GIOS, and ML, and it has been incredibly helpful.

[1] https://github.com/guiambros/vidcat


You can download the lectures from many of the courses, but not all, from the site.


You'll get there! Some of them you can take two at a time. I myself only need 3 more!


> ... you can take two at a time

I wish! I travel quite a bit for work, so it breaks my legs every time it happens. Plus family, kids activities, etc. ML was brutal this semester, but hoping the curve will help a bit.

But it's ok, slow and steady is the way to go. Besides, I'm doing this for the fun of it; I don't need the diploma for career or anything.

See you around!


I eyed this program last year but resigned my desires because I didn't think I'd be able to juggle it.

Would you say that a 1 class/semester pace is too much for someone with a full time job, two littles < 3 years, and a spouse that expects a nonzero amount of interaction?


The program is quite intensive, so you'd have to be thoughtful selecting courses, and potentially making some trade-offs -- negotiate some weekends off with your spouse, use vacation days for studying, etc.

I have a demanding full time job, frequent travel for work, and two kids (although they're older, so not as time consuming as in your case). At times it has been tough to juggle (inc many late nights), but doable so far.

The workload goes anywhere from 8-10h/week per class for the easiest courses, to north of 25-30h+ for the hardest ones (GA, ML). Of course YMMV, depending on your background on each topic. Also, some classes are front loaded and release all projects early, so you can pace yourself. Others (I'd guess the majority) are released as you go, and you need to keep up with the schedule.

Another approach I use is to take advantage of the break between semesters to study the content in advance. This way I have some buffer when I need to travel for work, etc.

Feel free to drop me a note if you want to chat more. Email in my profile.


Thank you. This was insightful. I probably don't have the time now, but maybe I can revisit the decision in a few years once the kids are a bit older.


What does "three down, seven to go" mean?

Unfamiliar with us academic terms.


The program requires 10 courses to graduate. The parent comment has completed 3 courses and has 7 courses remaining.


Got it, thanks.


Same for CoinTracker; more detailed than the original -- https://news.ycombinator.com/item?id=46065208


Happy Thanksgiving @dang, @tomhow, and the HN community! Almost 17 years here, and it's hard to overstate how much I learned from y'all.

Through tech cycles, heated debates, and some inevitable fads, the limitless curiosity of this community remains inspiring. Thank you mods and YC for staying true to the original hacker ethos.


Ha, I just did the same with my hometown (Guaiba, RS), a city that is 1/6th of Londrina, and its wikipedia page in English hasn't been updated in years, and still has the wrong mayor (!).

Gemini 3 nailed on the first try, included political affiliation, and added some context on who they competed with and won over in each of the last 3 elections. And I just did a fun application with AI Studio, and it worked on first shot. Pretty impressive.

(disclaimer: Googler, but no affiliation with Gemini team)


Emails are also instructions to a computer-based service (SMTP) that you presumably signed your rights away to when you accepted the T&Cs.

Yet no one would think it's acceptable for the NYT and a dozen other news organizations to request an "anonymized" archive of all your emails from provider X, just because said provider is in a lawsuit with them, and you have nothing to do with any of it.

This is shameful, and would create a dangerous precedent. Really hope the order gets struck down.


Well yes, that sort of evidence is routinely used to gather evidence and build criminal cases. Emails, like letters, are correspondence between individuals.

ChatGPT isn't (despite it's name) equivalent - the nearest analogy is Google. We know the modus operandi of the world based on these services (incl social media) and privacy is the aspect that's been given up.


Yes, you're very right. They could simply have killed a codec that no one uses anymore. Or put it behind a compile flag, so if you really want, you can still enable it

But no. Intentionally or not, there was a whole drama created around it [1], with folks being criticized [2] for saying exactly what you said above, because their past (!) employers.

Instead of using the situation to highlight the need for more corporate funding for opensource projects in general, it became a public s**storm, with developers questioning their future contributions to projects. Shameful.

[1] https://news.ycombinator.com/item?id=45806269

[2] https://x.com/FFmpeg/status/1985334445357051931


Yellow pages, really? Like, let's ban ads and brig back yellow pages", and everything will be solved?

And, if you were not aware, how do you think Yellow Pages made money? [1]

[1] https://en.wikipedia.org/wiki/Yellow_pages


Not that I think it's a good idea, but ...

You go to Google, type "refrigerator" and you get two buttons

* Please show me only adds, sorted by how much they paid to Larry and Sergey

* Please show me only somewhat organic results, sorted by relevance or whatever, and discount me $1 to pay for the servers and crawers.


Yeah, but serving that doesn't cost that much and dropping the advertisement platform would drop it further (and let engineers fix search instead of shaving milliseconds from ad bidding)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: