diff --git a/docs/linux-desktop.en.md b/docs/linux-desktop.en.md index 7beebc80..353ebfd9 100644 --- a/docs/linux-desktop.en.md +++ b/docs/linux-desktop.en.md @@ -54,7 +54,7 @@ Tumbleweed follows a rolling release model where each update is released as a sn Arch Linux has a rolling release cycle. There is no fixed release schedule and packages are updated very frequently. -Being a DIY distribution, you are [expected to set up and maintain](#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. +Being a DIY distribution, you are [expected to set up and maintain](linux-desktop/overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). diff --git a/docs/linux-desktop/overview.en.md b/docs/linux-desktop/overview.en.md index 55e7192f..c9588e86 100644 --- a/docs/linux-desktop/overview.en.md +++ b/docs/linux-desktop/overview.en.md @@ -56,7 +56,7 @@ There is often some confusion about “security-focused” distributions and “ ### Arch-based distributions -Arch based distributions are not recommended for those new to Linux, regardless of the distribution. Arch does not have an distribution update mechanism for the underlying software choices. As a result you have to stay aware with current trends and adopt technologies as they supersede older practices on your own. +Arch based distributions are not recommended for those new to Linux, (regardless of distribution) as they require regular [system maintenance](https://wiki.archlinux.org/title/System_maintenance). Arch does not have an distribution update mechanism for the underlying software choices. As a result you have to stay aware with current trends and adopt technologies as they supersede older practices on your own. For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit).