Secret sharing typically requires a trusted third party to communicate a secret from point A to B. Encrypting those secrets at point A and only allowing point B to decrypt them removes any risk in …| Eric Mann's Blog
Securely route internet traffic to local services using Tailscale Funnel.| Tailscale