OpenRiot v7.3 — Going Underground

“You don’t get privacy by asking for it. You get it by taking it.” — The OpenRiot Crew, channeling The Jam


Release Overview

v7.3 takes WireGuard seriously. The polybar module now stays visible whenever you have a config — a broken shield 󰅛 when you’re exposed, a solid lock 󰱓 when the tunnel is up. No more wondering if the VPN is configured at all.

Boot persistence lands via /etc/rc.local. Enable WireGuard with Super+I or a polybar click and it comes back automatically on next boot. Disable it and the rc.local hook is scrubbed cleanly.

We also fixed the WiFi-kill that wg-quick up causes on some setups. After the tunnel comes up, OpenRiot restores your wireless interface automatically — no manual netstart dance required.

The module moves to violet in the bar, sitting right before the settings gear. It’s part of the core workflow now, not an afterthought.

For Mullvad users specifically: drop your config at /etc/wireguard/wg0.conf, hit Super+I, and you’re routed through Sweden (or wherever you picked). curl https://am.i.mullvad.net/json will confirm. The whole flow is two commands and a keypress.


🧾 Files Changed

File Nature of Change
source/wireguard/wireguard.go Boot persistence via /etc/rc.local;
  Status() always-on icon; WiFi restore
  after Start()
config/polybar/config.ini WireGuard moved before settings; color
  changed to violet
config/i3/keybindings.conf Added Super+Shift+N for screen recording;
  swapped reload/restart bindings
source/commands/helpers.go Transmission gated behind WireGuard check
  in toggle and notify
source/rofi/rofi.go Transmission gated behind WireGuard check
  in app launcher
config/fish/config.fish Removed legacy signal alias
backgrounds/19.png New wallpaper
backgrounds/20.png New wallpaper
backgrounds/21.png New wallpaper
backgrounds/22.png New wallpaper

🎵 What We’re Listening To

This release was tested against the same library that powered v7.2 — Grunge-Rock, Alkaline Trio, CAKE, Counting Crows, and that folder labeled “Cyberpunk” that may or may not contain synthwave. The difference now is that MPD streams it all over a Unix socket while WireGuard makes sure your ISP doesn’t know you’re still listening to Jagged Little Pill in 2026.


🗣️ Final Words

“I just wanted to torrent a Linux ISO without my ISP sending me a strongly worded letter. Now I have a violet shield in my status bar and a boot script that remembers I like privacy.” — Same user, still honest

v7.3 is the release for people who treat their network like their music collection: curated, controlled, and nobody’s business but their own. WireGuard boots when you do. WiFi comes back after the tunnel. The icon tells you the truth at a glance. And Mullvad configs work out of the box because standard WireGuard is standard WireGuard, regardless of what OS the provider claims to support.

Transmission is now gated behind the shield. Try to launch the BitTorrent client while WireGuard is down and you get a hard no — a 5-second critical notification that says exactly why. This is not a bug. It is a protective measure.

ISPs watch BitTorrent traffic. DMCA notices are real. The old “always use a VPN” warning in the README was easy to ignore when you were in a hurry. v7.3 removes the temptation. If the tunnel is not up, Transmission does not start. Period. Click the 󰱓 first, then torrent your Linux ISOs.

Hit Super+I. Check the shield. Go underground.

— The OpenRiot Crew

“Your traffic just went backstage.”

← Back to README