An often overlooked feature of synergy is the ability to share clipboards between machines. You can copy a URL from your email and paste it into a browser on another box. Particularly useful if the reason you're doing synergy is to do cross-platform testing and validation.
The thing that made me stop using it was that they punted security to be someone else's problem, so you had to set up some ssh tunnel and be sure to run it only over that. It's not so bad on Linux or OS X, but that's quite a bit of extra work on Windows.
Does barrier take care of authentication or session encryption?
If I had to guess, no, barrier is much like VNC in that it's expected you have a ssh wrapper set up with public/private key authentication.
I've only used it between macos and linux machines, so that's easy. An example of the very tiny shell script that I use for VNC-over-SSH to a remote machine.
In which the VNC daemon on the remote machine only listens on its own localhost, and I use ssh to form the tunnel then use the vnc client on my workstation to connect to localhost:5902 to access it.
echo "localhost port 5902 for the VNC client to remotehostname.net"
I actually think this is better because for a very small open source project like barrier, that might literally be developed by one person, the workload and time/effort to be ABSOLUTELY CERTAIN you've implemented the crypto libraries correctly is a lot of work and worry.
Whereas if you use ssh you can be fairly certain that it's been battle tested by a huge number of people who have a lot more time and resources than yourself.
> It's not so bad on Linux or OS X, but that's quite a bit of extra work on Windows.
Nowadays, we have wireguard, so you can create a secure little network to run this sort of thing over much more easily.
Running tailscale (https://tailscale.com/) on each machine you're using, and then using their tailscale private ips with synergy, should be both secure and work painlessly across those three platforms
If you're on the same layer 2 broadcast network segment (typically some machines in a home office plugged into the same dumb switch, or all on the same VLAN), the time/effort to do this with ssh is a lot less than using wireguard to talk between two machines that are literally plugged into the same switch.
Since the typical use case for barrier is to have something like two desktop PCs, each outputting to two displays but with no mice or keyboards, and one laptop in the center, where you want to use your laptop's keyboard and trackpad to run everything.
The comment above was about how running ssh forwarding correctly on windows is involved and has awful UX, which is true in my experience too.
Tailscale has much better UX, so it solves that problem.
In addition, wireguard is just as simple to setup as ssh (again in my experience), can operate over local LAN too, and some people have found it to have better performance than ssh forwarding (such as https://news.ycombinator.com/item?id=21162273).
An often overlooked feature of synergy is the ability to share clipboards between machines. You can copy a URL from your email and paste it into a browser on another box. Particularly useful if the reason you're doing synergy is to do cross-platform testing and validation.
The thing that made me stop using it was that they punted security to be someone else's problem, so you had to set up some ssh tunnel and be sure to run it only over that. It's not so bad on Linux or OS X, but that's quite a bit of extra work on Windows.
Does barrier take care of authentication or session encryption?