NoMachine Network will use whatever is the route set in your network, to reach the remote end-point, to reach the IP. It will use hole-punching and the other methods only if the IP is unreachable, by the standard means, So, in other words, no need “to prioritize the routing” “to go over the tailscale mesh”. But I’d like to understand what you mean with “surrender your keys”. NoMachine Network does not “hand over” any cryptographic information needed to establish the connection. NoMachine Network works only at the “IP level”, all the usual cryptographic security remains in place as it was designed.