Compare

Ewii vs. Tailscale

Tailscale is one of the best-engineered networking products of the last decade. The control plane is excellent, the WireGuard data plane is fast, and the operational story for small-to-medium teams is hard to beat. If your problem is “I have engineers in three offices and a homelab and I want them on the same logical network,” use Tailscale.

The Ewii use case is not that. Ewii is one-way connectivity from a single operator (you, the AI or SaaS vendor) to many customers. The customers do not join your network and you do not join theirs. Identity flows in one direction. Audit flows in one direction. The deployment shape is different from a mesh, and the security review is different.

Hand-drafted comparative topology diagram. LEFT — EWII: A single Hub node at center with five Client nodes radiating outward in a spoke pattern, unidirectional arrows pointing Client→Hub, forest-green annotation block reading ONE OPERATOR / MANY CUSTOMERS / UNIDIRECTIONAL. RIGHT — TAILSCALE: Five equal nodes fully interconnected with bidirectional arrows forming a complete mesh, one labeled VENDOR NODE and one CUSTOMER NODE with dashed leader lines, clay-red annotation block reading CONSENTING PEERS / SHARED TAILNET REACHABILITY. Vault-navy vertical divider. FIG. 1 — COMPARATIVE TOPOLOGY / EWII VS. TAILSCALE centered below. Bottom captions: left hub-and-spoke · operator → customers; right mesh · peers share network reachability.
FIG. 1 Comparative topology — Ewii vs. Tailscale

Topology

DimensionEwiiTailscale
Network shapeOne operator → many customers (hub-and-spoke)Mesh between consenting peers
Identity modelSPIFFE workload identity per ClientTailscale identity per node (user or service)
Customer admin involvementCustomer security team approves Client imageCustomer admin enrolls each node into your tailnet
Network reachabilityApplication-layer query path onlySubnet-level routing (configurable)
Audit boundaryOperator-side; per-query identity-boundTailnet-wide; per-connection
Multi-tenant separationSPIFFE trust bundle per customerPer-tailnet (one tailnet per customer is common)

Mesh ≠ operator → customer

Tailscale’s threat model assumes consent on both ends. To put a customer’s database server on your tailnet, the customer’s admin enrolls a node into your tailnet — or, more commonly, you join theirs. Either way, both parties are materially participating in a single network with shared reachability semantics.

That is structurally inappropriate for the operator-to-customer use case. The customer should not have to grant you network-level access to a service in order to let your AI product call it. They should be able to grant you application-level access to one specific query path, with one specific identity, and revoke it without negotiating with you.

Ewii’s model is: the customer runs a Client container next to the database. The Client opens an outbound connection to your Hub. Your Hub authenticates the Client’s SPIFFE SVID. Application-layer queries flow over that one connection. There is no shared network. There is no enrollment of customer infrastructure into your tailnet. There is no admin-level relationship.

The procurement conversation

A hospital security reviewer evaluating “we’d like to put your AI tool on our tailnet” has to think about subnet routing, lateral-movement surface area, the tailnet’s ACL model, and what happens when the AI vendor is acquired or breached. None of these are unanswerable questions, but they are not the questions the procurement team wanted to spend time on.

The same reviewer evaluating “we’ll run a signed Client container next to the database, it makes one outbound connection on 443, and it speaks one identity-verified query interface” has a much shorter list. They have to verify the Client image (signed with Cosign — they can run cosign verify themselves), confirm the egress port (443), and review the query interface contract. The question becomes a code review, not a network architecture debate.

When Tailscale is the right answer

If you and your customer have engineers who already think in tailnet terms, and the relationship is operationally peer-like — for example, a managed infrastructure provider who needs deep network access into a customer environment — Tailscale is a fine choice and Ewii does not displace it.

If the relationship is “we are an AI vendor; the customer wants to run our product against their data without giving us network-level access” — that is the Ewii use case, and a mesh VPN is the wrong shape for it.