Drawpile, the free open-source collaborative drawing program, finally released version 2.2.0.
It has 11 Beta testing versions in 2023 until the new final release. And, Drawpile 2.2.0 can work along with users on the old 2.1 version.
This new version is compatible with sessions hosted by 2.1, so you can still draw with everyone that’s on the old version.
Drawpile 2.2.0 is a big release but with only few server features. It now allow setting web admin auth through DRAWPILESRV_WEB_ADMIN_AUTH environment variable. While, the --web-admin-auth parameter takes precedence.
Most others are bug-fixes. They include:
Drawpile provides binary package for Windows, MacOS, Linux, and Android, available to download at its website.
For Linux users, they are the non-install AppImage and universal Flatpak package run in sandbox.
The AppImage package is available to download at the link below:
Just grab the package, add executable permission in file ‘Properties’ dialog (under Permissions tab), then user can click ‘Run’ AppImage to launch the program.
Linux Mint 21.x users can simply launch Software Manager, then search & install Drawpile as Flatpak package.
While, Ubuntu users can press Ctrl+Alt+T on keyboard to open terminal, and run commands below one by one to get the flatpak package:
NOTE: Flatpak runs in sandbox. If you want to access files in user folders, install Flatseal and enable either home or certain folder access.
To uninstall the Flatpak package, open terminal and run command:
flatpak uninstall --delete-data net.drawpile.drawpile
Also run flatpak uninstall --unused to remove useless run-time libraries.
The post Drawpile 2.2.0 Finally Released After 11 Beta Testing appeared first on Osgrove.
This article demonstrates how to harden security of VPS server and is intended for server…
In this blog post, we will guide you on how to install wget on Ubuntu…
Jan 27,2026 Xfwl4 - The roadmap for a Xfce Wayland Compositor We, the Xfce team…
This article provides a step-by-step how-to guide to deploy n8n on Ubuntu VPS. What is…
In July 2025, git received CVE-2025-48384, a high vulnerability allowing arbitrary code execution when cloning…
Last year, we collaborated with two design student teams from Loughborough University in the UK.…