Droidspaces – Telegram
Pure v2 in 4.14 😄
Droidspaces v5.4.2-hotfix

https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v5.4.2-hotfix

this release fixes:

- "Operation not permitted" ping failure in NAT mode
- Running login from terminating the shell when using the droidspaces enter mode
As the project is now stable,

I'm stepping back from Droidspaces development until September 2026.

I need to focus the next five months on my studies.

If you encounter any bugs, please report them before 10 PM GMT+5:30.

The final-net-isolation branch will be merged into the main branch as it is stable, and the project will remain on my GitHub for some time.
5👍2
Droidspaces
Thanks to the latest changes around cgroups in Droidspaces, legacy kernel users can now run relatively modern Systemd on older kernels like 4.14 as well..! As you can see in this screenshot, I'm running Ubuntu 25.04 without any issues - 0 failed units, no…
Ubuntu 25.10 is barely working with 0 failed units on an older Linux 4.14.113 💀

Even this setup is currently stable "for now" - if Ubuntu releases a systemd update that upgrades systemd to v258+, the container will be cooked.

All of this is currently possible because, as of 2026-03-09, Ubuntu 25.10 uses systemd v257.9.

Only 0.1 more is needed to turn the container into a paperweight.
😱1
Droidspaces v5.5.0 has been released!

What is Droidspaces in the first place? 👀

Droidspaces is a lightweight, portable Linux containerization tool that lets you run full Linux environments on top of Android or Linux, with complete init system support including systemd, OpenRC, and other init systems like runit and s6.

What makes Droidspaces unique is its zero-dependency, native execution on both Android and Linux. It is statically compiled against musl libc. If your device runs a Linux kernel, Droidspaces runs on it. No Termux, no middlemen, no setup overhead.

[screenshots]

This will be the final release of Droidspaces. Since the project is stable, I have decided to go back to zen mode 🌀

The primary goal of designing Droidspaces was to run Ubuntu 22.04 on my broken Galaxy S10. Since it has 256GB of storage, I can store my music collection on it and stream from anywhere in the world.

I already did this when I was away from development in January, but I was not satisfied because the original Droidspaces was so messed up it could not even boot systemd containers on my S10, which has Kernel 4.14.113 and It was limited to run Alpine Linux only.

Throughout February, I rewrote it from scratch; After a whole month of testing, debugging, and hardening security and isolation, it is finally ready.

🫆 By installing this latest release, you will be able to:

- Install containers up to Ubuntu 25.10 / Systemd v257.9 on legacy kernels like 4.14, without any issues, and with zero failed jobs in systemctl thanks to the latest cgroups-related changes.

- Enjoy full networking isolation with three network modes, including port forwarding support in NAT mode with a tiny DHCP server and real-time monitoring for network changes to switch between Wi-Fi and Data instantly, with almost 100% uptime.

- Use native GPU acceleration on Intel and AMD graphics in Desktop Linux, as well as out-of-the-box Termux X11 and virgl support on Android.

- Fixed terminal handling when using the login command in the container shell and CTRL+ALT+Q shutdown in foreground mode.

Additional security and misc. improvements have been made across both the C backend and the app.


The app can do everything the C backend does right now, perfectly balanced ❤️

https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v5.5.0

Everything you need to know is already documented in the project's readmes.

I will take a little break from this project now :)

@Droidspaces x @ravindu
1
Run real Linux on Android natively with Droidspaces

As you can see, I converted my Galaxy S10 5G into a portable home server with its own isolated network stack.

Using an Ubuntu 24.04 LTS container in Droidspaces, I set up Jellyfin, Samba, Tailscale, OpenSSH Server, and Fail2Ban in one go - no trial and error.

This is essentially a 1:1 replacement for the whacky Docker/LXC setups on Android. It just works and runs natively with zero overhead.

Droidspaces containers are fully isolated from Android. They can’t detect that they are running on an Android device and cannot see Android processes, mounts, network interfaces, or other devices on your local network - making it a secure environment for running services. This is not chroot or proot.

I access the container through Tailscale. Only ports 445 and 8096 are forwarded, allowing access to the Samba share and Jellyfin server from other devices on my home network via <phone-ip>:<port>.

Project: https://github.com/ravindu644/Droidspaces-OSS
🗿9👏31🔥1🤩1