This is an automated archive made by the Lemmit Bot.

The original was posted on /r/selfhosted by /u/BooleanTriplets on 2024-11-16 15:58:19+00:00.


So I just recently had my internet shut down by my ISP for copyrighted torrents (darn grandma requesting Season 5 of Yellowstone, I just couldn’t resist her. I knew that recent of a release was gonna have someone spying on the torrents. I typically only torrent older material most of the time and I don’t have any trouble with that.) so I figured that it was beyond time that I buckle down, be a man, and do the right thing … figure out how to route all my torrent traffic through a VPN provider that could shield my ISP and I from any spies trying to report my IP address for torrenting.

With that in mind, I just recently set up my Tailscale account set up with a Mullvad exit node and I almost can not believe how easy it was compared to the guides I had read through for setting up gluetun as an exit node. I feel like I am missing something here - is it really this easy to set up and does it actually work as intended if I set it up this way? It was honestly so easy that feels like I either cheated or skipped a step. Does anyone know of any reason why the Mullvad exit nodes on Tailscale are not secure way connect to a VPN provider and protect yourself?

My homelab setup is hosted on a proxmox cluster in my basement (2 PVE hosts and 1 PBS):

PVE1:

  • CasaOS VM w/ many services including most of the ‘arr’ services. running tailscale on the VM, set up with mullvad exit node

PVE2:

  • PiHole LXC, running tailscale with mullvad exit node. DNS and DHCP server for all devices on the tailnet or the home network.

  • Tdarr LXC

  • Paperlessngx LXC