Wireguard is purely point-to-point. You have to manually specify any configuration involving routing more than just the local IP addresses you add.
Not sure if it's the best solution, but there's no reason to take over your entire network.
Even with my old OpenVPN setup I had a config where only my local 10.2.0.0/16 got routed over the VPN, everything else went straight to the outside world. Set up IPv6 ULA and you don't need to worry about IP addressing conflicts.
Not really? I mean, it's easy to set and forget which subnets get tunnelled with wireguard (and others, it's just that wg forces you to be explicit about it)
Tailscale doesn't support mDNS / multicast at all, making working with KDE Connect more nebulous. I attempted to add a static peer via the Tailscale hostname, but both ends report not reachable, and the Tailscale daemon is constantly dropping multicast packets. So I'm not sure how this helps, but I also don't have a use case - if I'm on my laptop, my phone is on the same Wifi network 99% of the time.
Maybe they need self-hostable coordination server so that devices can connect to each other through it.
For now it's still 'send to telegram saved messages' for me.