Works really well, personally only tested on Linux, but I love it!

7 points

I’ve been using barrier, but will give this a try. Thanks!

permalink
report
reply
4 points

I am using barrier for years too, I’ll check this one

permalink
report
parent
reply
9 points

Looks like it’s also a variant of Synergy, so I guess it’s just the same. There’s a lot of different forks of it, I’m not sure which one is the ‘best’ these days.

permalink
report
parent
reply
4 points

Not a variant. Read their README. It IS Synergy, they’re renaming the open-source / community version to that, while Synergy will remain the commercial product built out of that.

permalink
report
parent
reply
25 points

Does it work with Wayland? That was my only complaint with Barrier last time I tried to use it.

permalink
report
reply
5 points

Thanks for this, I was wondering why I couldn’t get barrier to work properly

permalink
report
parent
reply
2 points

I use input leap and it works flowlessly with Wayland. One PC has KDE and another GNOME 47. Even through tailscale tunnel

permalink
report
parent
reply
24 points

Wayland support: Experimental support in Deskflow v1.16 (required >= GNOME 46 or KDE Plasma 6.1).

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
reply
11 points

the only remaining question is, how is security?

permalink
report
reply
3 points

It’s the clipboard, you shouldn’t put secure items on the clipboard generally speaking. (We all do it anyway)

permalink
report
parent
reply
3 points

No, password managers are best practice.

permalink
report
parent
reply
1 point

Password managers are the bees knees if you have to use a password, I do like the authenticator only logins especially if you have an obnoxious number of sites you have to login to. I will say though, that clipboards are tricky especially in an environment where VNC/Screen Connect etc are actively used. Screen Connect especially will happily grab the clipboard contents and share it with the other user.

permalink
report
parent
reply
1 point

that too, but not just that. how does access control work, how is memory safety around the receiving and authenticating code, is the traffic encrypted and how…because keystrokes, and I think mouse actions are also sensitive

permalink
report
parent
reply

Open Source

!opensource@lemmy.ml

Create post

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

  • Posts must be relevant to the open source ideology
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

Community stats

  • 4.5K

    Monthly active users

  • 1K

    Posts

  • 8.8K

    Comments