<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>DragonOS Focal Decode FT8 Remotely w/ Suscli, SigDigger, and WSJT-X (hackRF, Pi4, YouLoop)</title>
        <link>https://stream.echo6.co/videos/watch/4e83e052-9551-4da2-a4c2-3cf2c45c275b</link>
        <description>While testing the latest DragonOS Focal and DragonOS Pi64, I figured what better way to test multiple things at once then to use SigDigger and WSJT-X in a new and different way. In this video I show how it's possible to run SigDigger's Suscli remotely on a Raspberry Pi4 loaded with DragonOS Pi64. On the local end DragonOS Focal was used to load the latest SigDigger and WSJT-X to both receive and decode the audio being sent by Suscli. The end result was successful FT8 decoding being performed by WSJT-X. This setup is unique because unlike RSP_TCP or SoapyRemote, all DSP happens on the remote end. This allows for lower bandwidth, to the best of my knowledge anyways, on the link between Suscli and SigDigger. In the next day or so the latest DragonOS Pi64 R12 and DragonOS Focal R19 will be uploaded. Both builds will have all the software installed that you need to follow along with this video. Enjoy! Twitter @cemaxecuter</description>
        <lastBuildDate>Sun, 26 Apr 2026 17:24:11 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>DragonOS Focal Decode FT8 Remotely w/ Suscli, SigDigger, and WSJT-X (hackRF, Pi4, YouLoop)</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/4e83e052-9551-4da2-a4c2-3cf2c45c275b</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=4e83e052-9551-4da2-a4c2-3cf2c45c275b" rel="self" type="application/rss+xml"/>
    </channel>
</rss>