1. TPM Unreliability Causes Frequent Breakages
TPMs often reset or fail due to BIOS updates, hardware changes, VMs, and poor implementations, leading to Tailscale startup failures.
"Everytime I have to upgrade my MB firmware it breaks bitlocker" (Thaxll).
"Updating the firmware or the OS does not actually erase the TPM... But voluntarily upgrading the BIOS or the OS looks exactly like tampering" (db48x).
cronos (Tailscale engineer): "TPMs are not reliable for non-malicious reasons... BIOS updates (when a TPM is implemented in firmware)."
2. Tailscale's Reversal Justified by Support Burden
Disabling default encryption avoids widespread breakage in heterogeneous environments like VMs and consumer hardware.
"this feature is too support intensive" (cronos).
"PR explaining why they disabled this function... tons of problems due to the variability of TPM quality" (rstat1).
"TPMs are a great tool for organizations... But the very heterogeneous fleet of devices that Tailscale users have is very difficult to support out of the box" (cronos).
3. Security Benefits Limited; Opt-In Makes Sense
Protects against node cloning but ineffective against root access; ideal for enterprises, risky as default.
"An attacker with local root can just extract the wireguard keys from process memory" (cronos).
"this never should have been on by default. The end user needs to know they want to use the TPM. This is a huge foot gun" (xyzzy_plugh).
db48x: "In an enterprise environment... using TPMs for additional security is a great idea."