mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-24 21:53:20 -05:00
fixed linter warnings
This commit is contained in:
parent
e93ddb3796
commit
1be6e5f9b9
36 changed files with 107 additions and 229 deletions
|
|
@ -55,10 +55,10 @@ The current Qubes-certified models are listed below in reverse chronological ord
|
|||
- `NitroPad T430 <https://shop.nitrokey.com/shop/nitropad-t430-119>`__
|
||||
- :doc:`Certification details </user/hardware/certified-hardware/nitropad-t430/>`
|
||||
* - `Nitrokey <https://www.nitrokey.com/>`__
|
||||
- `NitroPad X230 <https://shop.nitrokey.com/shop/product/nitropad-x230-67>`__
|
||||
- `NitroPad X230 <https://shop.nitrokey.com/shop/product/nitropad-x230-67>`__
|
||||
- :doc:`Certification details </user/hardware/certified-hardware/nitropad-x230/>`
|
||||
* - `Insurgo <https://insurgo.ca/>`__
|
||||
- `PrivacyBeast X230 <https://insurgo.ca/produit/qubesos-certified-privacybeast_x230-reasonably-secured-laptop/>`__
|
||||
- `PrivacyBeast X230 <https://insurgo.ca/produit/qubesos-certified-privacybeast_x230-reasonably-secured-laptop/>`__
|
||||
- :doc:`Certification details </user/hardware/certified-hardware/insurgo-privacybeast-x230/>`
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@ Insurgo PrivacyBeast X230
|
|||
|
||||
|
||||
.. DANGER::
|
||||
|
||||
|
||||
**Warning:** The CPU in this computer no longer receives microcode updates from Intel. Without microcode updates, Qubes OS cannot ensure that this computer is secure against CPU vulnerabilities. While this computer remains certified for Qubes OS Release 4, we recommend that prospective buyers consider a newer Qubes-certified computer instead.
|
||||
|
||||
The `Insurgo PrivacyBeast X230 <https://insurgo.ca/produit/qubesos-certified-privacybeast_x230-reasonably-secured-laptop/>`__ is :doc:`officially certified </user/hardware/certified-hardware/certified-hardware>` for Qubes OS Release 4.
|
||||
|
|
|
|||
|
|
@ -6,11 +6,11 @@ NitroPad T430
|
|||
|
||||
|
||||
.. DANGER::
|
||||
|
||||
|
||||
**Warning:** The CPU in this computer no longer receives microcode updates from Intel. Without microcode updates, Qubes OS cannot ensure that this computer is secure against CPU vulnerabilities. While this computer remains certified for Qubes OS Release 4, we recommend that prospective buyers consider a newer Qubes-certified computer instead.
|
||||
|
||||
.. warning::
|
||||
|
||||
|
||||
**Note:** Please be advised that the i7-3632QM option is not compatible with Qubes OS, as it does not support VT-d. The option specifically tested by the Qubes team is the i5-3320M.
|
||||
|
||||
The `NitroPad T430 <https://shop.nitrokey.com/shop/product/nitropad-t430-119>`__ is :doc:`officially certified </user/hardware/certified-hardware/certified-hardware>` for Qubes OS Release 4.
|
||||
|
|
|
|||
|
|
@ -6,11 +6,11 @@ NitroPC Pro 2
|
|||
|
||||
|
||||
.. warning::
|
||||
|
||||
|
||||
**Note:** When configuring your NitroPC Pro 2 on the Nitrokey website, there is an option for a discrete graphics card (e.g., Nvidia GeForce RTX 4070 or 4090) in addition to integrated graphics (e.g., Intel UHD 770, which is always included because it is physically built into the CPU). NitroPC Pro 2 configurations that include discrete graphics cards are *not* Qubes-certified. The only NitroPC Pro 2 configurations that are Qubes-certified are those that contain *only* integrated graphics.
|
||||
|
||||
.. warning::
|
||||
|
||||
|
||||
**Note:** Only the “Dasharo TianoCore UEFI without Measured Boot, without Nitrokey” firmware option is certified. The “HEADS with Measured Boot, requires Nitrokey!” firmware option is *not* certified.
|
||||
|
||||
The `NitroPC Pro 2 <https://shop.nitrokey.com/shop/nitropc-pro-2-523>`__ is :doc:`officially certified </user/hardware/certified-hardware/certified-hardware>` for Qubes OS Release 4.
|
||||
|
|
@ -19,8 +19,8 @@ The `NitroPC Pro 2 <https://shop.nitrokey.com/shop/nitropc-pro-2-523>`__ is :doc
|
|||
|
||||
Here’s a summary of the main component options available for this mid-tower desktop PC:
|
||||
|
||||
.. list-table::
|
||||
:widths: 29 29
|
||||
.. list-table::
|
||||
:widths: 29 29
|
||||
:align: center
|
||||
:header-rows: 1
|
||||
|
||||
|
|
@ -40,7 +40,6 @@ Here’s a summary of the main component options available for this mid-tower de
|
|||
- Wi-Fi 6E, 2400 Mbps, 802.11/a/b/g/n/ac/ax, Bluetooth 5.2
|
||||
* - Operating system (optional)
|
||||
- Qubes OS 4.2 or Ubuntu 22.04 LTS
|
||||
|
||||
|
||||
|
||||
Of special note for Qubes users, the NitroPC Pro 2 features a combined PS/2 port that supports both a PS/2 keyboard and a PS/2 mouse simultaneously with a Y-cable (not included). This allows for full control of dom0 without the need for USB keyboard or mouse passthrough. Nitrokey also offers a special tamper-evident shipping method for an additional fee. With this option, the case screws will be individually sealed and photographed, and the NitroPC Pro 2 will be packed inside a sealed bag. Photographs of the seals will be sent to you by email, which you can use to determine whether the case was opened during transit.
|
||||
|
|
|
|||
|
|
@ -13,8 +13,8 @@ The `Star Labs StarBook <https://starlabs.systems/pages/starbook>`__ is a 14-inc
|
|||
|
||||
The Qubes developers have tested and certified the following StarBook configuration options for Qubes OS Release 4:
|
||||
|
||||
.. list-table::
|
||||
:widths: 16 16
|
||||
.. list-table::
|
||||
:widths: 16 16
|
||||
:align: center
|
||||
:header-rows: 1
|
||||
|
||||
|
|
@ -34,7 +34,6 @@ The Qubes developers have tested and certified the following StarBook configurat
|
|||
- coreboot 8.97 (2023-10-03)
|
||||
* - Operating system
|
||||
- Qubes OS (pre-installation optional)
|
||||
|
||||
|
||||
|
||||
|image1|
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@ System requirements
|
|||
|
||||
|
||||
.. warning::
|
||||
|
||||
|
||||
Notice: The system requirements on this page are *necessary, but not sufficient*, for Qubes compatibility at a minimal or recommended level. In other words, just because a computer satisfies these requirements doesn’t mean that Qubes will successfully install and run on it. We strongly recommend consulting the `resources below <#choosing-hardware>`__ when selecting hardware for Qubes.
|
||||
|
||||
Minimum
|
||||
|
|
@ -126,9 +126,9 @@ Important Notes
|
|||
- You can check whether an Intel processor has VT-x and VT-d on `ark.intel.com <https://ark.intel.com/content/www/us/en/ark.html#@Processors>`__.
|
||||
|
||||
|
||||
.. [1]
|
||||
.. [1]
|
||||
There is an ``amd-ucode-firmware`` package, but it only contains microcode for servers and outdated microcode for Chromebooks. Also, the `AMD security website <https://www.amd.com/en/resources/product-security.html>`__ only lists microcode as a mitigation for data center CPUs.
|
||||
.. [2]
|
||||
.. [2]
|
||||
As shown on `the AMD page for Speculative Return Stack Overflow <https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html>`__, updated AGESA™ firmware for AMD Ryzen™ Threadripper™ 5000WX Processors was not available until 2024-01-11, even though the vulnerability became public on 2023-08-08. AMD did not provide updated firmware for other client processors until a date between 2023-08-22 to 2023-08-25.
|
||||
|
||||
For Zenbleed, firmware was not available until 2024 for most client parts, even though server parts got microcode on 2023-06-06.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue