OpenRiot v7.3 — Going Underground
“You don’t get privacy by asking for it. You get it by taking it.” — The OpenRiot Crew, channeling The Jam
Release Overview
v7.3 takes WireGuard seriously. The polybar module now stays visible
whenever you have a config — a broken shield when you’re exposed,
a solid lock when the tunnel is up. No more wondering if the VPN
is configured at all.
Boot persistence lands via /etc/rc.local. Enable WireGuard with
Super+I or a polybar click and it comes back automatically on next
boot. Disable it and the rc.local hook is scrubbed cleanly.
We also fixed the WiFi-kill that wg-quick up causes on some setups.
After the tunnel comes up, OpenRiot restores your wireless interface
automatically — no manual netstart dance required.
The module moves to violet in the bar, sitting right before the settings gear. It’s part of the core workflow now, not an afterthought.
For Mullvad users specifically: drop your config at
/etc/wireguard/wg0.conf, hit Super+I, and you’re routed through
Sweden (or wherever you picked). curl https://am.i.mullvad.net/json
will confirm. The whole flow is two commands and a keypress.
🧾 Files Changed
| File | Nature of Change |
|---|---|
source/wireguard/wireguard.go |
Boot persistence via /etc/rc.local; |
| Status() always-on icon; WiFi restore | |
| after Start() | |
config/polybar/config.ini |
WireGuard moved before settings; color |
| changed to violet | |
config/i3/keybindings.conf |
Added Super+Shift+N for screen recording; |
| swapped reload/restart bindings | |
source/commands/helpers.go |
Transmission gated behind WireGuard check |
| in toggle and notify | |
source/rofi/rofi.go |
Transmission gated behind WireGuard check |
| in app launcher | |
config/fish/config.fish |
Removed legacy signal alias |
backgrounds/19.png |
New wallpaper |
backgrounds/20.png |
New wallpaper |
backgrounds/21.png |
New wallpaper |
backgrounds/22.png |
New wallpaper |
🎵 What We’re Listening To
This release was tested against the same library that powered v7.2 — Grunge-Rock, Alkaline Trio, CAKE, Counting Crows, and that folder labeled “Cyberpunk” that may or may not contain synthwave. The difference now is that MPD streams it all over a Unix socket while WireGuard makes sure your ISP doesn’t know you’re still listening to Jagged Little Pill in 2026.
🗣️ Final Words
“I just wanted to torrent a Linux ISO without my ISP sending me a strongly worded letter. Now I have a violet shield in my status bar and a boot script that remembers I like privacy.” — Same user, still honest
v7.3 is the release for people who treat their network like their music collection: curated, controlled, and nobody’s business but their own. WireGuard boots when you do. WiFi comes back after the tunnel. The icon tells you the truth at a glance. And Mullvad configs work out of the box because standard WireGuard is standard WireGuard, regardless of what OS the provider claims to support.
Transmission is now gated behind the shield. Try to launch the BitTorrent client while WireGuard is down and you get a hard no — a 5-second critical notification that says exactly why. This is not a bug. It is a protective measure.
ISPs watch BitTorrent traffic. DMCA notices are real. The old “always
use a VPN” warning in the README was easy to ignore when you were in
a hurry. v7.3 removes the temptation. If the tunnel is not up,
Transmission does not start. Period. Click the first, then
torrent your Linux ISOs.
Hit Super+I. Check the shield. Go underground.
— The OpenRiot Crew
“Your traffic just went backstage.”