Ah sorry, I should’ve been a bit clearer! ‘Exposed to the internet’ kinda means that the device is directly accessible in some way. So if you have anything connected to the internet, whether a laptop, NAS or TV box, usually by default the firewall on your router keeps them from being directly connected to by anyone outside. The device still needs to be connected full stop to do anything, of course, as otherwise you may as well be in a field with no power or anything else as without some sort of network connection there’s no way to connect at all.
To expand a bit on my ‘directly connected’ point, for instance, you have an external IP address for your internet connection (whatever that might be). If you go here, you can see what it is: https://wtfismyip.com
However, say your laptop or Synology is plugged in and online, you also get given a local IP address per device by your router, usually something beginning with 192.168.1.x, 10.0.1.x, something like that.
If I’m anyone outside and I want to connect to your laptop or NAS, first of all, those local addresses of course don’t do me any good, because unless I’m on your home network, those addresses don’t work. The only way to usually try and connect to anything inside your network is if you deliberately open a ‘port’. So, the default port for accessing Synology via a browser is usually 5001. If you wanted to enable external access in a basic bitch way (so to speak), you would go into the settings for your router, and tell it to ‘open’ port 5001 by directing it to an internal IP (so, your Synology). That allows you to type your external IP address into a browser anywhere in the world, so for example, 142.251.40.174:5001, and you can log into your Synology and adminster it from wherever. Sounds great!
Except, also, any clown with a computer can try that too, whether they’re a random script kiddie or a Chinese or North Korean botnet scanning for vulnerabilities. Some hacker figures out you can bypass the root login somehow on fully patched Synology systems? It might take a few days, weeks or etc for Synology to fix in an update, but if you’re unlucky, someone waltzes in the front door of your NAS, encrypts all your files and demands a load of bitcoin to get your files back.
This is a very long winded way of saying that the VPN means the only route in is being ‘in’ is either being in your house or within the encrypted tunnel Tailscale provides. For an example of what happens when you port forward directly, these Reddit posts give some indication, and these are from just the past week or so:
https://www.reddit.com/r/synology/comments/12dtyc9/recent_hack_attempt_detailed_info/
https://www.reddit.com/r/synology/comments/12dl0f2/lot_of_sign_in_requests_from_unknown_ip_adresses/
https://www.reddit.com/r/synology/comments/125q3k4/need_help_for_data_backup_must_reformat_due_to/
Hopefully this TL;DR gibberish is helpful!