I finally understand Cloudflare Zero Trust tunnels
Mood
supportive
Sentiment
positive
Category
tech
Key topics
Cloudflare
Zero Trust
Networking
Security
The author shares their newfound understanding of Cloudflare Zero Trust tunnels, providing a resource for others to learn about the technology. The post has garnered a positive response from the community.
Snapshot generated from the HN discussion
Discussion Activity
Active discussionFirst comment
10h
Peak period
11
Day 1
Avg / period
5
Based on 15 loaded comments
Key moments
- 01Story posted
11/16/2025, 5:39:43 PM
2d ago
Step 01 - 02First comment
11/17/2025, 3:35:23 AM
10h after posting
Step 02 - 03Peak activity
11 comments in Day 1
Hottest window of the conversation
Step 03 - 04Latest activity
11/19/2025, 12:50:21 AM
9h ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
- Most of the clients are open source probably. - Tailscale allows you to run custom control server of your own. - One open source control server "headscale" is sponsored by Tailscale themselves.
https://github.com/alecbcs/hyprspace has penetrated every NAT I've ever encountered. No megacorporation required.
This way I can upload big videos when I get home.
I don't see why I want to loop in a 3rd party to connect back to my house.
Given i work in Tmux, its super convenient to take a laptop with me and just use it as a thin client to my Desktop wherever I am.
We use our Windows workstations as WSL SSH tunnels, protected with email verification (only for our domain), and it’s been working perfectly.
I’m curious, though, about how we can expose Docker services. It would be fantastic to have a remote build server set up with Cloudflare Tunnel.
Then probably the hosting place is an easier target than a data center.
1 more comments available on Hacker News
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.