Skip to main content

Want to play GTA V on your Raspberry Pi 2? Well, you can’t – but it now supports OpenGL!

Raspberry Pi 2 OpenGL support glxgears example
Hardware accelerated OpenGL is up and running on the Raspberry Pi 2. An experimental driver in the latest version of Raspbian gives enthusiasts of the tiny $35 computer the ability to drastically improve graphic performance, to the point where some basic 3D gaming is possible.

A fan-made video shows glxgears, a simple OpenGL graphics demonstration, running with and without OpenGL support on a Raspberry Pi. The difference is immediately obvious: the animation goes from a stuttering slide show to a smooth 60 frames per second.

Recommended Videos

The driver that makes this possible is included in the latest version of Raspbian, the Linux-based operating system maintained by the Raspberry Pi team. According to the release notes, users will have to take active steps to enable the new feature.

“This is turned off by default,” the announcement says. “If you want to enable it, you can find it in the command-line version of raspi-config, under Advanced Options->GL Drive.”

The post also explains how to install a couple of OpenGL-rendered games, like Neverball and Oolite, which barely load on the Pi 2 without the new OpenGL support. The team claims these run smoothly with the driver enabled.

As for other games, your mileage may vary. At least one user received the full version of Minecraft up and running, but it did eventually crash.

The Raspberry Pi 2 will never run the latest AAA releases at the highest settings — there’s only so much a $35 computer can do. But a working OpenGL driver with hardware acceleration will no doubt lead to some amusing ports of older 3D titles. It will also help developers design more elaborate interface elements, and process certain calculations that would’ve taken far too long before.

Aside from OpenGL support, the new Raspbian release offers several included programs, from Mathmatica to Sonic Pi. Libraries from Java to WiringPi are also up-to-date with this release. More USB audio devices will work, and it’s now easier to edit the main menu.

Justin Pot
Former Digital Trends Contributor
Justin's always had a passion for trying out new software, asking questions, and explaining things – tech journalism is the…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more