Yes, it’s pretty easy using Tailscale Sharing.
I realize I should expand on my comment here, because the implications are pretty profound:
Starting around 1999, the introduction of cable modems, DSL, and wi-fi routers drastically changed how the internet was laid out. This is due to the widespread adoption of NAT, network address translation. Your cable modem or DSL would give you a single IPv4 address, and your home router would give out private IPv4 addresses. When your home computers wanted to talk to the internet at large, your router would convert/translate your private IP address to your ISP-provided address and make sure everything gets routed to where it needs to go. Your home router still works like this today.
This had positive and negative security impacts. Having this virtual condom between your PC and the internet became critical if you wanted to use a bargain-basement low-quality operating system like Windows XP. (Folks as old as me might remember trying to install Windows and discovering it had been compromised with a remote SYSTEM-level exploit before the installation had finished.). Windows XP wasn’t remotely safe to run or install on a bare IPv4 address until SP4 or so. On the negative side, folks who wanted to establish direct connections to other computers around the world often relied on sketchy protocols like UPnP, which were and are a security nightmare.
But the biggest impact is that making direct connections to other computers that weren’t HTTP/S connections became perceived as abnormal. The entire “cloud” industry and online service industry can be seen as a profitable response to this new internet. Instead of letting all of your computers talk and sync seamlessly across the internet, companies provided services on bare IPv4 addresses that everyone could talk to despite NAT. Everything you did on the internet became mediated through these large service companies because the operating system companies wouldn’t spend the money to secure their operating systems.
In the past few years, this has all changed, for the folks paying attention. This is due to zero-trust networking. Tailscale and its competitors let you use the internet like the greybeards of yore, and without the massive security holes.
When you create a Tailscale account, you create a “tailnet”. This is the collection of all of your computers and devices that have installed the (open-source) Tailscale client and are logged in. Tailscale’s (closed-source) servers assist your client in establishing point-to-point encrypted WireGuard tunnels between all the computers and devices on your tailnet by default. The Tailscale client includes tech (mostly based on STUN/ICE) that punches secure holes through your NAT and keeps the tunnels up reliably.
Because the Tailscale client punches through NAT, this means all of your computers and devices suddenly are able to communicate wherever they are in the world. Go on a trip, and you can easily phone home to your homelab, etc. with zero configuration. If you remember trying to do this with DynDNS back in the day, you’ll remember it sucked and wasn’t reliable. This stuff is very reliable. And with Tailscale’s ACL system, you can define exactly which devices get to talk to each other.
Suddenly iCloud, Google Workspace, GitHub, etc. become pointless. You want all your contacts synced? Install a CMS app or NextCloud on your home server. You want seamless Git sharing? Install forgejo on your home server. (Forgejo is the same software codeberg uses.). Your home server is just another machine on your tailnet, and every device you own can talk to it.
With the advent of Tailscale Sharing, you can communicate between devices in different tailnets. Your friend has a bitchin’ collection of movies and warez, but you don’t want to fly to visit or FedEx him a hard drive? Have him share his file server with your tailnet.
So when I see folks making suggestions like reverting to patches over email, I scream inside. Use this cool technology, own your own worldwide network, and stick it to the big companies.
(If you object to Tailscale’s servers being closed-source, there is a less-featured open-source version called Headscale you can run yourself, but you’ll need a bare IP address to run it from, such as from AWS EC2.)