Why Mesh VPN Beats Traditional VPN for Remote Teams
The VPN you are probably using was designed for a world where everyone commutes to an office and "remote access" means the occasional employee traveling for business. That world does not exist anymore. Mesh VPN was built for the world we actually live in.
The Problem with Hub-and-Spoke
Traditional VPNs (OpenVPN, IPsec, WireGuard-in-gateway-mode) use a hub-and-spoke topology. Every packet travels from your device to a central gateway server, then to the destination — even when the destination is your coworker sitting in the same coffee shop.
You ──────────────► Gateway (NYC) ──────────────► Coworker
+40ms +40ms
Total: +80ms latency addedThis creates three problems:
- 1.Latency: Every packet bounces through a central server. If your gateway is in Virginia and you are in Sydney, every internal API call adds 300ms round-trip.
- 2.Single point of failure: The gateway goes down, everyone loses access. A flaky gateway means intermittent failures that are hard to diagnose.
- 3.Bandwidth bottleneck: A 5-person team doing video calls over VPN saturates a $10/mo VPS immediately. Scaling the gateway is expensive.
How Mesh VPN Works
In a mesh VPN, each device is a peer. Devices form direct WireGuard tunnels to each other — no central gateway in the data path. A coordination server handles key distribution and ACLs, but it never touches your traffic.
You ────────────────────────────────────────► Coworker
(direct WireGuard tunnel)
+2ms latency
Coordination server: handles keys only, not trafficWhen a direct connection is impossible (both devices behind symmetric NAT), mesh VPN falls back to a relay server. Even then, the relay is geographically close to both endpoints — not a single central gateway on the other side of the world.
Real-World Performance
~900 Mbps
WireGuard in-kernel encryption achieves near line-rate on modern hardware.
+2–5ms
Overhead of WireGuard encapsulation over a direct connection.
+15–40ms
Relay fallback with geographically distributed servers.
<1ms
ChaCha20-Poly1305 on modern CPUs with hardware AES.
Security: Stronger Than a Gateway
Traditional VPN gateways are a high-value target. Compromise the gateway, get access to everything. Mesh VPN eliminates the gateway from the data path entirely.
With Blackhole, every device-to-device connection uses a unique WireGuard key pair. Compromising one device does not give an attacker any other device's keys. The blast radius of a compromise is bounded to that single peer.
ACL rules are evaluated on-device, not at a gateway. Even if the coordination server is unreachable (or compromised), the last-known ACL policy keeps enforcing. Attackers cannot bypass ACLs by going around the gateway, because there is no gateway to bypass.
When to Use Each
Traditional VPN still makes sense for one specific case: when you need all traffic to exit from a single known IP (compliance, geo-restriction). That is the exit-node use case — and mesh VPN supports it too, you just pick one device as the exit node rather than paying for a dedicated gateway server.
For every other remote-access use case — developer access to staging, remote office connectivity, zero-trust device access to internal services — mesh VPN is strictly better.
Move to mesh in 5 minutes
One command installs Blackhole on macOS, Linux, and Windows.
Read the Quick Start