` in Qubes code.)
+
+
+
+
diff --git a/developer/general/developing-gui-applications.md b/developer/general/developing-gui-applications.md
deleted file mode 100644
index 19e60a1c..00000000
--- a/developer/general/developing-gui-applications.md
+++ /dev/null
@@ -1,102 +0,0 @@
----
-lang: en
-layout: doc
-permalink: /doc/developing-gui-applications/
-ref: 333
-title: Developing Qubes OS GUI tools
----
-
-In order to avoid installing Qubes OS frontend tools you are working on in your own `dom0` or just to test them with less problems, you can use the mock Qubes object from the `qubesadmin` package.
-
-## Running programs using mock Qubes object
-
-Where you would normally provide the Qubes object, use the `qubesadmin.tests.mock_app` package and one of the mock Qubes objects from it.
-
-For example, the following code can be used to run the `qui-domains` tool using the mock Qubes object (this code would replace the initial part of the main function):
-
-```python
-def main():
- ''' main function '''
- # qapp = qubesadmin.Qubes()
- # dispatcher = qubesadmin.events.EventsDispatcher(qapp)
- # stats_dispatcher = qubesadmin.events.EventsDispatcher(qapp, api_method='admin.vm.Stats')
-
- import qubesadmin.tests.mock_app as mock_app
- qapp = mock_app.MockQubesComplete()
- dispatcher = mock_app.MockDispatcher(qapp)
- stats_dispatcher = mock_app.MockDispatcher(
- qapp, api_method='admin.vm.Stats')
-
- # continue as normal
-```
-
-To run a mocked program without installing it in a qube, remember to extend PYTHONPATH appropriately, for example:
-
-```bash
-~/qubes-sources/manager $ PYTHONPATH=../core-admin-client:. python3 qui/tray/domains.py
-```
-
-The mock object does not provide events (yet).
-
-Note: in order to see all qubes-relevant icons (like VM icons), install the `qubes-artwork` package.
-
-## How does it actually work
-
-The mock Qubes object has a collection of expected Qubes RPC calls and the responses that a real system would provide. Writing these calls manually is a bit tedious, given that most frontend tools query a lot of qube properties. For example, on a medium-sized system, initializing Qube Manager involves about 300 separate RPC calls.
-
-If you need more calls, you can add them to the mock object using the following syntax (the following example adds listing available vm kernels):
-
-```python
- mock_app.expected_calls[('dom0', 'admin.pool.volume.List', 'linux-kernel', None)] = \
- b'0\x006.1.57-1.fc37\n6.1.43-1.fc37\ncustom_kernel\n'
-
-```
-
-If error should be thrown, you need to provide the error code and name, for example:
-
-```python
- mock_app.expected_calls[("vmname", "admin.vm.property.Get", "property_name", None)] = \
- b'2\x00QubesNoSuchPropertyError\x00\x00No such property\x00'
-```
-
-For details of particular calls, you can use [Extending the mock Qubes object](#extending-the-mock-qubes-object).
-
-
-## Available mocks
-
-Three mocks are available in the `mock_app` file:
-
-* MockQubes, an extremely bare-bones Qubes testing instance, with just dom0, sys-net, and one template (fedora-36).
-* MockQubesComplete, a more complex setup [](/attachment/doc/doc-mock-app-ex1.png)
-* MockQubesWhonix, the setup above extended with several Whonix-related qubes
-
-
-## Extending the mock Qubes object
-
-To collect information to modify this script, you can use the wrapper function to wrap and output all qubesd calls used by a program running on a live qubes instance.
-
-```python
- qapp = qubesadmin.Qubes()
- import qubesadmin.tests.mock_app as mock_app
- qapp.qubesd_call = mock_app.wrapper(qapp.qubesd_call)
- qapp._parse_qubesd_response = mock_app.wrapper(qapp._parse_qubesd_response)
-```
-
-## Writing tests
-
-The same mock Qubes can also be used to write tests. You can use the wrappers above to check which calls are made when certain actions are performed, and add them to the mock objects in the following way:
-
-```python
-# this is an excerpt from tests for Qubes Global Config tool
- clockvm_combo.set_active_id('test-blue')
-
- mock_qapp.expected_calls[('dom0', 'admin.property.Set',
- 'clockvm', b'test-blue')] = b'0\x00'
- basics_handler.save()
-
-```
-
-If the call is made correctly, the test will continue successfully; if an unexpected call is made, the test will fail.
-
-Caution: the mock Qubes object does not react to changes like a normal Qubes object does. Further queries to the test object will continue to return initial values.
-
diff --git a/developer/general/developing-gui-applications.rst b/developer/general/developing-gui-applications.rst
new file mode 100644
index 00000000..81a7e256
--- /dev/null
+++ b/developer/general/developing-gui-applications.rst
@@ -0,0 +1,117 @@
+=============================
+Developing Qubes OS GUI tools
+=============================
+
+
+In order to avoid installing Qubes OS frontend tools you are working on in your own ``dom0`` or just to test them with less problems, you can use the mock Qubes object from the ``qubesadmin`` package.
+
+Running programs using mock Qubes object
+----------------------------------------
+
+
+Where you would normally provide the Qubes object, use the ``qubesadmin.tests.mock_app`` package and one of the mock Qubes objects from it.
+
+For example, the following code can be used to run the ``qui-domains`` tool using the mock Qubes object (this code would replace the initial part of the main function):
+
+.. code:: python
+
+ def main():
+ ''' main function '''
+ # qapp = qubesadmin.Qubes()
+ # dispatcher = qubesadmin.events.EventsDispatcher(qapp)
+ # stats_dispatcher = qubesadmin.events.EventsDispatcher(qapp, api_method='admin.vm.Stats')
+
+ import qubesadmin.tests.mock_app as mock_app
+ qapp = mock_app.MockQubesComplete()
+ dispatcher = mock_app.MockDispatcher(qapp)
+ stats_dispatcher = mock_app.MockDispatcher(
+ qapp, api_method='admin.vm.Stats')
+
+ # continue as normal
+
+
+To run a mocked program without installing it in a qube, remember to extend PYTHONPATH appropriately, for example:
+
+.. code:: bash
+
+ ~/qubes-sources/manager $ PYTHONPATH=../core-admin-client:. python3 qui/tray/domains.py
+
+
+The mock object does not provide events (yet).
+
+**Note:** in order to see all qubes-relevant icons (like VM icons), install the ``qubes-artwork`` package.
+
+How does it actually work
+-------------------------
+
+
+The mock Qubes object has a collection of expected Qubes RPC calls and the responses that a real system would provide. Writing these calls manually is a bit tedious, given that most frontend tools query a lot of qube properties. For example, on a medium-sized system, initializing Qube Manager involves about 300 separate RPC calls.
+
+If you need more calls, you can add them to the mock object using the following syntax (the following example adds listing available vm kernels):
+
+.. code:: python
+
+ mock_app.expected_calls[('dom0', 'admin.pool.volume.List', 'linux-kernel', None)] = \
+ b'0\x006.1.57-1.fc37\n6.1.43-1.fc37\ncustom_kernel\n'
+
+
+If error should be thrown, you need to provide the error code and name, for example:
+
+.. code:: python
+
+ mock_app.expected_calls[("vmname", "admin.vm.property.Get", "property_name", None)] = \
+ b'2\x00QubesNoSuchPropertyError\x00\x00No such property\x00'
+
+
+For details of particular calls, you can use `Extending the mock Qubes object <#extending-the-mock-qubes-object>`__.
+
+Available mocks
+---------------
+
+
+Three mocks are available in the ``mock_app`` file:
+
+- MockQubes, an extremely bare-bones Qubes testing instance, with just dom0, sys-net, and one template (fedora-36).
+
+- MockQubesComplete, a more complex setup |Qubes Manager running MockQubesComplete|
+
+- MockQubesWhonix, the setup above extended with several Whonix-related qubes
+
+
+
+Extending the mock Qubes object
+-------------------------------
+
+
+To collect information to modify this script, you can use the wrapper function to wrap and output all qubesd calls used by a program running on a live qubes instance.
+
+.. code:: python
+
+ qapp = qubesadmin.Qubes()
+ import qubesadmin.tests.mock_app as mock_app
+ qapp.qubesd_call = mock_app.wrapper(qapp.qubesd_call)
+ qapp._parse_qubesd_response = mock_app.wrapper(qapp._parse_qubesd_response)
+
+
+Writing tests
+-------------
+
+
+The same mock Qubes can also be used to write tests. You can use the wrappers above to check which calls are made when certain actions are performed, and add them to the mock objects in the following way:
+
+.. code:: python
+
+ # this is an excerpt from tests for Qubes Global Config tool
+ clockvm_combo.set_active_id('test-blue')
+
+ mock_qapp.expected_calls[('dom0', 'admin.property.Set',
+ 'clockvm', b'test-blue')] = b'0\x00'
+ basics_handler.save()
+
+
+If the call is made correctly, the test will continue successfully; if an unexpected call is made, the test will fail.
+
+Caution: the mock Qubes object does not react to changes like a normal Qubes object does. Further queries to the test object will continue to return initial values.
+
+.. |Qubes Manager running MockQubesComplete| image:: /attachment/doc/doc-mock-app-ex1.png
+
diff --git a/developer/general/documentation-style-guide.md b/developer/general/documentation-style-guide.md
deleted file mode 100644
index 79146d96..00000000
--- a/developer/general/documentation-style-guide.md
+++ /dev/null
@@ -1,355 +0,0 @@
----
-lang: en
-layout: doc
-permalink: /doc/documentation-style-guide/
-redirect_from:
-- /doc/doc-guidelines/
-- /en/doc/doc-guidelines/
-- /wiki/DocStyle/
-- /doc/DocStyle/
-ref: 30
-title: Documentation style guide
----
-
-_Also see [how to edit the documentation](/doc/how-to-edit-the-documentation/)._
-
-Qubes OS documentation pages are stored as plain text Markdown files in the [qubes-doc](https://github.com/QubesOS/qubes-doc) repository. By cloning and regularly pulling from this repo, users can maintain their own up-to-date offline copy of all Qubes documentation rather than relying solely on the web.
-
-The documentation is a volunteer community effort. People like you are constantly working to make it better. If you notice something that can be fixed or improved, please [edit the documentation](/doc/how-to-edit-the-documentation/)!
-
-This page explains the standards we follow for writing, formatting, and organizing the documentation. Please follow these guidelines and conventions when editing the documentation. For the standards governing the website as a whole, please see the [website style guide](/doc/website-style-guide).
-
-## Markdown conventions
-
-All the documentation is written in Markdown for maximum accessibility. When making contributions, please observe the following style conventions. If you're not familiar with Markdown syntax, [this](https://daringfireball.net/projects/markdown/) is a great resource.
-
-### Hyperlink syntax
-
-Use non-reference-style links like `[website](https://example.com/)`. Do *not* use reference-style links like `[website][example]`, `[website][]` or `[website]`. This facilitates the localization process.
-
-### Relative vs. absolute links
-
-Always use relative rather than absolute paths for internal website links. For example, use `/doc/documentation-style-guide/` instead of `https://www.qubes-os.org/doc/documentation-style-guide/`.
-
-You may use absolute URLs in the following cases:
-
-- External links
-- URLs that appear inside code blocks (e.g., in comments and document templates, and the plain text reproductions of [QSBs](/security/qsb/) and [Canaries](/security/canary/)), since they're not hyperlinks
-- Git repo files like `README.md` and `CONTRIBUTING.md`, since they're not part of the website itself but rather of the auxiliary infrastructure supporting the website
-
-This rule is important because using absolute URLs for internal website links breaks:
-
-- Serving the website offline
-- Website localization
-- Generating offline documentation
-- Automatically redirecting Tor Browser visitors to the correct page on the onion service mirror
-
-### Image linking
-
-See [how to add images](/doc/how-to-edit-the-documentation/#how-to-add-images) for the required syntax. This will make the image a hyperlink to the image file, allowing the reader to click on the image in order to view the full image by itself. This is important. Following best practices, our website has a responsive design, which allows the website to render appropriately across all screen sizes. When viewing this page on a smaller screen, such as on a mobile device, the image will automatically shrink down to fit the screen. If visitors cannot click on the image to view it in full size, then, depending on their device, they may have no way see the details in the image clearly.
-
-In addition, make sure to link only to images in the [qubes-attachment](https://github.com/QubesOS/qubes-attachment) repository. Do not attempt to link to images hosted on other websites.
-
-### HTML and CSS
-
-Do not write HTML inside Markdown documents (except in rare, unavoidable cases, such as [alerts](#alerts)). In particular, never include HTML or CSS for styling, formatting, or white space control. That belongs in the (S)CSS files instead.
-
-### Headings
-
-Do not use `h1` headings (single `#` or `======` underline). These are automatically generated from the `title:` line in the YAML front matter.
-
-Use Atx-style syntax for headings: `##h2`, `### h3`, etc. Do not use underlining syntax (`-----`).
-
-### Indentation
-
-Use spaces instead of tabs. Use hanging indentations where appropriate.
-
-### Lists
-
-If appropriate, make numerals in numbered lists match between Markdown source and HTML output. Some users read the Markdown source directly, and this makes numbered lists easier to follow.
-
-### Code blocks
-
-When writing code blocks, use [syntax highlighting](https://github.github.com/gfm/#info-string) where possible (see [here](https://github.com/jneen/rouge/wiki/List-of-supported-languages-and-lexers) for a list of supported languages). Use `[...]` for anything omitted.
-
-### Line wrapping
-
-Do not hard wrap text, except where necessary (e.g., inside code blocks).
-
-### Do not use Markdown syntax for styling
-
-For example, there is a common temptation to use block quotations (created by beginning lines with the `>` character) in order to stylistically distinguish some portion of text from the rest of the document, e.g.:
-
-```
-> Note: This is an important note!
-```
-
-This renders as:
-
-> Note: This is an important note!
-
-There are two problems with this:
-
-1. It is a violation of the [separation of content and presentation](https://en.wikipedia.org/wiki/Separation_of_content_and_presentation), since it abuses markup syntax in order to achieve unintended stylistic results. The Markdown (and HTML, if any) should embody the *content* of the documentation, while the *presentation* is handled by (S)CSS.
-
-2. It is an abuse of quotation syntax for text that is not actually a quotation. (You are not quoting anyone here. You're just telling the reader to note something and trying to draw their attention to your note visually.)
-
-Instead, an example of an appropriate way to stylistically distinguish a portion of text is by using [alerts](#alerts). Consider also that extra styling and visual distinction may not even be necessary. In most cases, traditional writing methods are perfectly sufficient, e.g.,:
-
-```
-**Note:** This is an important note.
-```
-
-This renders as:
-
-**Note:** This is an important note.
-
-### Alerts
-
-Alerts are sections of HTML used to draw the reader's attention to important information, such as warnings, and for stylistic purposes. They are typically styled as colored text boxes, usually accompanied by icons. Alerts should generally be used somewhat sparingly, so as not to cause [alert fatigue](https://en.wikipedia.org/wiki/Alarm_fatigue) and since they must be written in HTML instead of Markdown, which makes the source less readable and more difficult to work with for localization and automation purposes. Here are examples of several types of alerts and their recommended icons:
-
-```
-
-
- Did you know? The Qubes OS installer is completely offline. It doesn't
- even load any networking drivers, so there is no possibility of
- internet-based data leaks or attacks during the installation process.
-
-
-
-
-
Note: Using Rufus to create the installation medium means that you
won't be able
- to choose the "Test this media and install Qubes OS" option mentioned in the
- example below. Instead, choose the "Install Qubes OS" option.
-
-
-
-
- Note: Qubes OS is not meant to be installed inside a virtual machine
- as a guest hypervisor. In other words, nested virtualization is not
- supported. In order for a strict compartmentalization to be enforced, Qubes
- OS needs to be able to manage the hardware directly.
-
-
-
-
-
Warning: Qubes has no control over what happens on your computer
- before you install it. No software can provide security if it is installed on
- compromised hardware. Do not install Qubes on a computer you don't trust. See
-
installation security for more
- information.
-
-```
-
-These render as:
-
-
-
- Did you know? The Qubes OS installer is completely offline. It doesn't
- even load any networking drivers, so there is no possibility of
- internet-based data leaks or attacks during the installation process.
-
-
-
-
-
Note: Using Rufus to create the installation medium means that you
won't be able
- to choose the "Test this media and install Qubes OS" option mentioned in the
- example below. Instead, choose the "Install Qubes OS" option.
-
-
-
-
- Note: Qubes OS is not meant to be installed inside a virtual machine
- as a guest hypervisor. In other words, nested virtualization is not
- supported. In order for a strict compartmentalization to be enforced, Qubes
- OS needs to be able to manage the hardware directly.
-
-
-
-
-
Warning: Qubes has no control over what happens on your computer
- before you install it. No software can provide security if it is installed on
- compromised hardware. Do not install Qubes on a computer you don't trust. See
-
installation security for more
- information.
-
-
-## Writing guidelines
-
-### Correct use of terminology
-
-Familiarize yourself with the terms defined in the [glossary](/doc/glossary/). Use these terms consistently and accurately throughout your writing.
-
-### Sentence case in headings
-
-Use sentence case (rather than title case) in headings for the reasons explained [here](https://www.sallybagshaw.com.au/articles/sentence-case-v-title-case/). In particular, since the authorship of the Qubes documentation is decentralized and widely distributed among users from around the world, many contributors come from regions with different conventions for implementing title case, not to mention that there are often differing style guide recommendations even within a single region. It is much easier for all of us to implement sentence case consistently across our growing body of pages, which is very important for managing the ongoing maintenance burden and sustainability of the documentation.
-
-### Writing command-line examples
-
-When providing command-line examples:
-
-- Tell the reader where to open a terminal (dom0 or a specific domU), and show the command along with its output (if any) in a code block, e.g.:
-
- ~~~markdown
- Open a terminal in dom0 and run:
- ```shell_session
- $ cd test
- $ echo Hello
- Hello
- ```
- ~~~
-
-- Precede each command with the appropriate command prompt: At a minimum, the prompt should contain a trailing `#` (for the user `root`) or `$` (for other users) on Linux systems and `>` on Windows systems, respectively.
-
-- Don't try to add comments inside the code block. For example, *don't* do this:
-
- ~~~markdown
- Open a terminal in dom0 and run:
- ```shell_session
- # Navigate to the new directory
- $ cd test
- # Generate a greeting
- $ echo Hello
- Hello
- ```
- ~~~
-
- The `#` symbol preceding each comment is ambiguous with a root command prompt. Instead, put your comments *outside* of the code block in normal prose.
-
-### Variable names in commands
-
-Syntactically distinguish variables in commands. For example, this is ambiguous:
-
- $ qvm-run --dispvm=disposable-template --service qubes.StartApp+xterm
-
-It should instead be:
-
- $ qvm-run --dispvm= --service qubes.StartApp+xterm
-
-Note that we syntactically distinguish variables in three ways:
-
-1. Surrounding them in angled brackets (`< >`)
-2. Using underscores (`_`) instead of spaces between words
-3. Using all capital letters
-
-We have observed that many novices make the mistake of typing the surrounding angled brackets (`< >`) on the command line, even after substituting the desired real value between them. Therefore, in documentation aimed at novices, we also recommend clarifying that the angled brackets should not be typed. This can be accomplished in one of several ways:
-
-- Explicitly say something like "without the angled brackets."
-- Provide an example command using real values that excludes the angled brackets.
-- If you know that almost all users will want to use (or should use) a specific command containing all real values and no variables, you might consider providing exactly that command and forgoing the version with variables. Novices may not realize which parts of the command they can substitute with different values, but if you've correctly judged that they should use the command you've provided as is, then this shouldn't matter.
-
-### Capitalization of "qube"
-
-We introduced the term ["qube"](/doc/glossary/#qube) as a user-friendly alternative to the term ["virtual machine" ("VM")](/doc/glossary/#vm) in the context of Qubes OS. Nonetheless, "qube" is a common noun like the words "compartment" and "container." Therefore, in English, "qube" follows the standard capitalization rules for common nouns. For example, "I have three qubes" is correct, while "I have three Qubes" is incorrect. Like other common nouns, "qube" should still be capitalized at the beginnings of sentences, the beginnings of sentence-case headings, and in title-case headings. Note, however, that starting a sentence with the plural of "qube" (e.g., "Qubes can be shut down...") can be ambiguous, since it may not be clear whether the referent is a plurality of qubes, [Qubes OS](/doc/glossary/#qubes-os), or even the Qubes OS Project itself. Hence, it is generally a good idea to rephrase such sentences in order to avoid this ambiguity.
-
-Many people feel a strong temptation to capitalize the word "qube" all the time, like a proper noun, perhaps because it's a new and unfamiliar term that's closely associated with a particular piece of software (namely, Qubes OS). However, these factors are not relevant to the capitalization rules of English. In fact, it's not unusual for new common nouns to be introduced into English, especially in the context of technology. For example, "blockchain" is a relatively recent technical term that's a common noun. Why is it a common noun rather than a proper noun? Because proper nouns refer to *particular* people, places, things, and ideas. There are many different blockchains. However, even when there was just one, the word still denoted a collection of things rather than a particular thing. It happened to be the case that there was only one member in that collection at the time. For example, if there happened to be only one tree in the world, that wouldn't change the way we capitalize sentences like, "John sat under a tree." Intuitively, it makes sense that the addition and removal of objects from the world shouldn't cause published books to become orthographicallly incorrect while sitting on their shelves.
-
-Accordingly, the reason "qube" is a common noun rather than a proper noun is because it doesn't refer to any one specific thing (in this case, any one specific virtual machine). Rather, it's the term for any virtual machine in a Qubes OS installation. (Technically, while qubes are currently implemented as virtual machines, Qubes OS is independent of its underlying compartmentalization technology. Virtual machines could be replaced with a different technology, and qubes would still be called "qubes.")
-
-I have several qubes in my Qubes OS installation, and you have several in yours. Every Qubes OS user has their own set of qubes, just as each of us lives in some neighborhood on some street. Yet we aren't tempted to treat words like "neighborhood" or "street" as proper nouns (unless, of course, they're part of a name, like "Acorn Street"). Again, while this might seem odd because "qube" is a new word that we invented, that doesn't change how English works. After all, *every* word was a new word that someone invented at some point (otherwise we wouldn't have any words at all). We treat "telephone," "computer," "network," "program," and so on as common nouns, even though those were all new technological inventions in the not-too-distant past (on a historical scale, at least). So, we shouldn't allow ourselves to be confused by irrelevant factors, like the fact that the inventors happened to be *us* or that the invention was *recent* or is not in widespread use among humanity.
-
-### English language conventions
-
-For the sake of consistency and uniformity, the Qubes documentation aims to follow the conventions of American English, where applicable. (Please note that this is an arbitrary convention for the sake consistency and not a value judgment about the relative merits of British versus American English.)
-
-## Organizational guidelines
-
-### Do not duplicate documentation
-
-Duplicating documentation is almost always a bad idea. There are many reasons for this. The main one is that almost all documentation has to be updated as some point. When similar documentation appears in more than one place, it is very easy for it to get updated in one place but not the others (perhaps because the person updating it doesn't realize it's in more than once place). When this happens, the documentation as a whole is now inconsistent, and the outdated documentation becomes a trap, especially for novice users. Such traps are often more harmful than if the documentation never existed in the first place. The solution is to **link** to existing documentation rather than duplicating it. There are some exceptions to this policy (e.g., information that is certain not to change for a very long time), but they are rare.
-
-### Core vs. external documentation
-
-Core documentation resides in the [Qubes OS Project's official repositories](https://github.com/QubesOS/), mainly in [qubes-doc](https://github.com/QubesOS/qubes-doc). External documentation can be anywhere else (such as forums, community websites, and blogs), but there is an especially large collection in the [Qubes Forum](https://forum.qubes-os.org/docs). External documentation should not be submitted to [qubes-doc](https://github.com/QubesOS/qubes-doc). If you've written a piece of documentation that is not appropriate for [qubes-doc](https://github.com/QubesOS/qubes-doc), we encourage you to submit it to the [Qubes Forum](https://forum.qubes-os.org/docs) instead. However, *linking* to external documentation from [qubes-doc](https://github.com/QubesOS/qubes-doc) is perfectly fine. Indeed, the maintainers of the [Qubes Forum](https://forum.qubes-os.org/) should regularly submit PRs against the documentation index (see [How to edit the documentation index](/doc/how-to-edit-the-documentation/#how-to-edit-the-documentation-index)) to add and update Qubes Forum links in the ["External documentation"](/doc/#external-documentation) section of the documentation table of contents.
-
-The main difference between **core** (or **official**) and **external** (or **community** or **unofficial**) documentation is whether it documents software that is officially written and maintained by the Qubes OS Project. The purpose of this distinction is to keep the core docs maintainable and high-quality by limiting them to the software output by the Qubes OS Project. In other words, we take responsibility for documenting all of the software we put out into the world, but it doesn't make sense for us to take on the responsibility of documenting or maintaining documentation for anything else. For example, Qubes OS may use a popular Linux distribution for an official [TemplateVM](/doc/templates/). However, it would not make sense for a comparatively small project like ours, with modest funding and a lean workforce, to attempt to document software belonging to a large, richly-funded project with an army of paid and volunteer contributors, especially when they probably already have documentation of their own. This is particularly true when it comes to Linux in general. Although many users who are new to Qubes are also new to Linux, it makes absolutely no sense for our comparatively tiny project to try to document Linux in general when there is already a plethora of documentation out there.
-
-Many contributors do not realize that there is a significant amount of work involved in *maintaining* documentation after it has been written. They may wish to write documentation and submit it to the core docs, but they see only their own writing process and fail to consider that it will have to be kept up-to-date and consistent with the rest of the docs for years afterward. Submissions to the core docs also have to [undergo a review process](/doc/how-to-edit-the-documentation/#security) to ensure accuracy before being merged, which takes up valuable time from the team. We aim to maintain high quality standards for the core docs (style and mechanics, formatting), which also takes up a lot of time. If the documentation involves anything external to the Qubes OS Project (such as a website, platform, program, protocol, framework, practice, or even a reference to a version number), the documentation is likely to become outdated when that external thing changes. It's also important to periodically review and update this documentation, especially when a new Qubes release comes out. Periodically, there may be technical or policy changes that affect all the core documentation. The more documentation there is relative to maintainers, the harder all of this will be. Since there are many more people who are willing to write documentation than to maintain it, these individually small incremental additions amount to a significant maintenance burden for the project.
-
-On the positive side, we consider the existence of community documentation to be a sign of a healthy ecosystem, and this is quite common in the software world. The community is better positioned to write and maintain documentation that applies, combines, and simplifies the official documentation, e.g., tutorials that explain how to install and use various programs in Qubes, how to create custom VM setups, and introductory tutorials that teach basic Linux concepts and commands in the context of Qubes. In addition, just because the Qubes OS Project has officially written and maintains some flexible framework, such as `qrexec`, it does not make sense to include every tutorial that says "here's how to do something cool with `qrexec`" in the core docs. Such tutorials generally also belong in the community documentation.
-
-See [#4693](https://github.com/QubesOS/qubes-issues/issues/4693) for more background information.
-
-### Release-specific documentation
-
-*See [#5308](https://github.com/QubesOS/qubes-issues/issues/5308) for pending changes to this policy.*
-
-We maintain only one set of documentation for Qubes OS. We do not maintain a different set of documentation for each release of Qubes. Our single set of Qubes OS documentation is updated on a continual, rolling basis. Our first priority is to document all **current, stable releases** of Qubes. Our second priority is to document the next, upcoming release (if any) that is currently in the beta or release candidate stage.
-
-In cases where a documentation page covers functionality that differs considerably between Qubes OS releases, the page should be subdivided into clearly-labeled sections that cover the different functionality in different releases (examples below).
-
-In general, avoid mentioning specific Qubes versions in the body text of documentation, as these references rapidly go out of date and become misleading to readers.
-
-#### Incorrect Example
-
-```
-## How to Foo
-
-Fooing is the process by which one foos. There are both general and specific
-versions of fooing, which vary in usefulness depending on your goals, but for
-the most part, all fooing is fooing.
-
-To foo in Qubes 3.2:
-
- $ qvm-foo
-
-Note that this does not work in Qubes 4.0, where there is a special widget
-for fooing, which you can find in the lower-right corner of the screen in
-the Foo Manager. Alternatively, you can use the more general `qubes-baz`
-command introduced in 4.0:
-
- $ qubes-baz --foo
-
-Once you foo, make sure to close the baz before fooing the next bar.
-```
-
-#### Correct Example
-
-```
-## Qubes 3.2
-
-### How to Foo
-
-Fooing is the process by which one foos. There are both general and specific
-versions of fooing, which vary in usefulness depending on your goals, but for
-the most part, all fooing is fooing.
-
-To foo:
-
- $ qvm-foo
-
-Once you foo, make sure to close the baz before fooing the next bar.
-
-## Qubes 4.0
-
-### How to Foo
-
-Fooing is the process by which one foos. There are both general and specific
-versions of fooing, which vary in usefulness depending on your goals, but for
-the most part, all fooing is fooing.
-
-There is a special widget for fooing, which you can find in the lower-right
-corner of the screen in the Foo Manager. Alternatively, you can use the
-general `qubes-baz` command:
-
- $ qubes-baz --foo
-
-Once you foo, make sure to close the baz before fooing the next bar.
-```
-
-Subdividing the page into clearly-labeled sections for each release has several benefits:
-
-- It preserves good content for older (but still supported) releases. Many documentation contributors are also people who prefer to use the latest release. Many of them are tempted to *replace* existing content that applies to an older, supported release with content that applies only to the latest release. This is somewhat understandable. Since they only use the latest release, they may be focused on their own experience, and they may even regard the older release as deprecated, even when it's actually still supported. However, allowing this replacement of content would do a great disservice to those who still rely on the older, supported release. In many cases, these users value the stability and reliability of the older, supported release. With the older, supported release, there has been more time to fix bugs and make improvements in both the software and the documentation. Consequently, much of the documentation content for this release may have gone through several rounds of editing, review, and revision. It would be a tragedy for this content to vanish while the very set of users who most prize stability and reliability are depending on it.
-- It's easy for readers to quickly find the information they're looking for, since they can go directly to the section that applies to their release.
-- It's hard for readers to miss information they need, since it's all in one place. In the incorrect example, information that the reader needs could be in any paragraph in the entire document, and there's no way to tell without reading the entire page. In the correct example, the reader can simply skim the headings in order to know which parts of the page need to be read and which can be safely ignored. The fact that some content is repeated in the two release-specific sections is not a problem, since no reader has to read the same thing twice. Moreover, as one release gets updated, it's likely that the documentation for that release will also be updated. Therefore, content that is initially duplicated between release-specific sections will not necessarily stay that way, and this is a good thing: We want the documentation for a release that *doesn't* change to stay the same, and we want the documentation for a release that *does* change to change along with the software.
-- It's easy for documentation contributors and maintainers to know which file to edit and update, since there's only one page for all Qubes OS releases. Initially creating the new headings and duplicating content that applies to both is only a one-time cost for each page, and many pages don't even require this treatment, since they apply to all currently-supported Qubes OS releases.
-
-By contrast, an alternative approach, such as segregating the documentation into two different branches, would mean that contributions that apply to both Qubes releases would only end up in one branch, unless someone remembered to manually submit the same thing to the other branch and actually made the effort to do so. Most of the time, this wouldn't happen. When it did, it would mean a second pull request that would have to be reviewed. Over time, the different branches would diverge in non-release-specific content. Good general content that was submitted only to one branch would effectively disappear once that release was deprecated. (Even if it were still on the website, no one would look at it, since it would explicitly be in the subdirectory of a deprecated release, and there would be a motivation to remove it from the website so that search results wouldn't be populated with out-of-date information.)
-
-For further discussion about release-specific documentation in Qubes, see [here](https://groups.google.com/d/topic/qubes-users/H9BZX4K9Ptk/discussion).
-
-## Git conventions
-
-Please follow our [Git commit message guidelines](/doc/coding-style/#commit-message-guidelines).
diff --git a/developer/general/gsoc.md b/developer/general/gsoc.md
deleted file mode 100644
index f1044aed..00000000
--- a/developer/general/gsoc.md
+++ /dev/null
@@ -1,568 +0,0 @@
----
-lang: en
-layout: doc
-permalink: /gsoc/
-redirect_from:
-- /GSoC/
-ref: 33
-title: Google Summer of Code (GSoC)
----
-
-## Information for Students
-
-Thank you for your interest in participating in the [Google Summer of Code program](https://summerofcode.withgoogle.com/) with the [Qubes OS team](/team/). You can read more about the Google Summer of Code program at the [official website](https://summerofcode.withgoogle.com/) and the [official FAQ](https://developers.google.com/open-source/gsoc/faq).
-
-Being accepted as a Google Summer of Code contributor is quite competitive. If you are interested in participating in the Summer of Code please be aware that you must be able to produce code for Qubes OS for 3-5 months. Your mentors, Qubes developers, will dedicate a portion of their time towards mentoring you. Therefore, we seek candidates who are committed to helping Qubes long-term and are willing to do quality work and be proactive in communicating with your mentor.
-
-You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining Qubes and other free and open source communities. The Qubes community maintains information about [contributing to Qubes development](/doc/contributing/#contributing-code) and [how to send patches](/doc/source-code/#how-to-send-patches). In order to contribute code to the Qubes project, you must be able to [sign your code](/doc/code-signing/).
-
-You should start learning the components that you plan on working on before the start date. Qubes developers are available on the [mailing lists](/support/#qubes-devel) for help. The GSoC timeline reserves a lot of time for bonding with the project -- use that time wisely. Good communication is key, you should plan to communicate with your team daily and formally report progress and plans weekly. Students who neglect active communication will be failed.
-
-### Overview of Steps
-
-- Join the [qubes-devel list](/support/#qubes-devel) and introduce yourself, and meet your fellow developers
-- Read [Google's instructions for participating](https://developers.google.com/open-source/gsoc/) and the [GSoC Student Manual](https://google.github.io/gsocguides/student/)
-- Take a look at the list of ideas below
-- Come up with a project that you are interested in (and feel free to propose your own! Don't feel limited by the list below.)
-- Read the Contributor Proposal guidelines below
-- Write a first draft proposal and send it to the qubes-devel mailing list for review
-- Submit proposal using [Google's web interface](https://summerofcode.withgoogle.com/) ahead of the deadline (this requires a Google Account!)
-- Submit proof of enrollment well ahead of the deadline
-
-Coming up with an interesting idea that you can realistically achieve in the time available to you (one summer) is probably the most difficult part. We strongly recommend getting involved in advance of the beginning of GSoC, and we will look favorably on applications from prospective contributors who have already started to act like free and open source developers.
-
-Before the summer starts, there are some preparatory tasks which are highly encouraged. First, if you aren't already, definitely start using Qubes as your primary OS as soon as possible! Also, it is encouraged that you become familiar and comfortable with the Qubes development workflow sooner than later. A good way to do this (and also a great way to stand out as an awesome applicant and make us want to accept you!) might be to pick up some issues from [qubes-issues](https://github.com/QubesOS/qubes-issues/issues) (our issue-tracking repo) and submit some patches addressing them. Some suitable issues might be those with tags ["help wanted" and "P: minor"](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue%20is%3Aopen%20label%3A%22P%3A%20minor%22%20label%3A%22help%20wanted%22) (although more significant things are also welcome, of course). Doing this will get you some practice with [qubes-builder](/doc/qubes-builder-v2/), our code-signing policies, and some familiarity with our code base in general so you are ready to hit the ground running come summer.
-
-### Contributor proposal guidelines
-
-A project proposal is what you will be judged upon. Write a clear proposal on what you plan to do, the scope of your project, and why we should choose you to do it. Proposals are the basis of the GSoC projects and therefore one of the most important things to do well.
-
-Below is the application template:
-
-```
-# Introduction
-
-Every software project should solve a problem. Before offering the solution (your Google Summer of Code project), you should first define the problem. What’s the current state of things? What’s the issue you wish to solve and why? Then you should conclude with a sentence or two about your solution. Include links to discussions, features, or bugs that describe the problem further if necessary.
-
-# Project goals
-
-Be short and to the point, and perhaps format it as a list. Propose a clear list of deliverables, explaining exactly what you promise to do and what you do not plan to do. “Future developments” can be mentioned, but your promise for the Google Summer of Code term is what counts.
-
-# Implementation
-
-Be detailed. Describe what you plan to do as a solution for the problem you defined above. Include technical details, showing that you understand the technology. Illustrate key technical elements of your proposed solution in reasonable detail.
-
-# Timeline
-
-Show that you understand the problem, have a solution, have also broken it down into manageable parts, and that you have a realistic plan on how to accomplish your goal. Here you set expectations, so don’t make promises you can’t keep. A modest, realistic and detailed timeline is better than promising the impossible.
-
-If you have other commitments during GSoC, such as a job, vacation, exams, internship, seminars, or papers to write, disclose them here. GSoC should be treated like a full-time job, and we will expect approximately 40 hours of work per week. If you have conflicts, explain how you will work around them. If you are found to have conflicts which you did not disclose, you may be failed.
-
-Open and clear communication is of utmost importance. Include your plans for communication in your proposal; daily if possible. You will need to initiate weekly formal communications such as a detailed email to the qubes-devel mailing list. Lack of communication will result in you being failed.
-
-# About me
-
-Provide your contact information and write a few sentences about you and why you think you are the best for this job. Prior contributions to Qubes are helpful; list your commits. Name people (other developers, students, professors) who can act as a reference for you. Mention your field of study if necessary. Now is the time to join the relevant mailing lists. We want you to be a part of our community, not just contribute your code.
-
-Tell us if you are submitting proposals to other organizations, and whether or not you would choose Qubes if given the choice.
-
-Other things to think about:
-* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, and perhaps 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?
-* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?
-* After you have written your proposal, you should get it reviewed. Do not rely on the Qubes mentors to do it for you via the web interface, although we will try to comment on every proposal. It is wise to ask a colleague or a developer to critique your proposal. Clarity and completeness are important.
-```
-
-## Project Ideas
-
-These project ideas were contributed by our developers and may be incomplete. If you are interested in submitting a proposal based on these ideas, you should contact the [qubes-devel mailing list](/support/#qubes-devel) and associated GitHub issue to learn more about the idea.
-
-```
-### Adding a Proposal
-
-**Project**: Something that you're totally excited about
-
-**Brief explanation**: What is the project, where does the code live?
-
-**Expected results**: What is the expected result in the timeframe given
-
-**Difficulty**: easy / medium / hard
-
-**Knowledge prerequisite**: Pre-requisites for working on the project. What coding language and knowledge is needed?
-If applicable, links to more information or discussions
-
-**Size of the project**: either 175 hours (medium) or 350 hours (large)
-
-**Mentor**: Name and email address.
-
-```
-
-### Qubes as a Vagrant provider
-
-**Project**: Qubes as a Vagrant provider
-
-**Brief explanation**: Currently using Vagrant on Qubes requires finding an image that uses Docker as isolation provider and running Docker in a qube, or downloading the Vagrantfile and manually setting up a qube according to the Vagrantfile. This project aims at simplifying this workflow. Since introduction of Admin API, it's possible for a qube to provision another qube - which is exactly what is needed for Vagrant. [Related discussion](https://groups.google.com/d/msgid/qubes-devel/535299ca-d16a-4a70-8223-a4ac6be4be41%40googlegroups.com)
-
-**Expected results**:
-
-- Design how Vagrant Qubes provider should look like, including:
- - [box format](https://www.vagrantup.com/docs/plugins/providers.html#box-format)
- - method for running commands inside (ssh vs qvm-run)
-- Write a Vagrant provider able to create/start/stop/etc a VM
-- Document how to configure and use the provider, including required qrexec policy changes and possibly firewall rules
-- Write integration tests
-
-**Difficulty**: medium
-
-**Knowledge prerequisite**:
-
-- Ruby
-- Vagrant concepts
-
-**Size of the project**: 350 hours
-
-**Mentor**: [Wojtek Porczyk](/team/), [Marek Marczykowski-Górecki](/team/)
-
-### System health monitor
-
-**Project**: System health monitor
-
-**Brief explanation**: A tool that informs the user about common system and configuration issues. Some of this is already available, but scattered across different places. See related issues: [6663](https://github.com/QubesOS/qubes-issues/issues/6663), [2134](https://github.com/QubesOS/qubes-issues/issues/2134)
-
-**Expected results**:
-
-- a tool / service that checks for common issues and things needing user attention, for example:
- - some updates to be applied (separate widget already exists)
- - running out of disk space (separate widget already exists)
- - insecure USB configuration (USB in dom0)
- - some system VM crashed
- - ...
-
-- a GUI that provides terse overview of the system state, and notifies the user if something bad happens
-
-**Difficulty**: medium
-
-**Knowledge prerequisite**:
-
-- Python
-- basic knowledge about systemd services
-- PyGTK (optional)
-
-**Size of the project**: 350 hours
-
-**Mentor**: [Marta Marczykowska-Górecka](/team/)
-
-### Mechanism for maintaining in-VM configuration
-
-**Project**: Mechanism for maintaining in-VM configuration
-
-**Brief explanation**: Large number of VMs is hard to maintain. Templates helps with keeping them updated, but many applications have configuration in user home directory, which is not synchronized.
-
-**Expected results**:
-
-- Design a mechanism how to _safely_ synchronize application configuration living in user home directory (`~/.config`, some other "dotfiles"). Mechanism should be resistant against malicious VM forcing its configuration on other VMs. Some approach could be a strict control which VM can send what changes (whitelist approach, not blacklist).
-- Implementation of the above mechanism.
-- Documentation how to configure it securely.
-
-**Difficulty**: medium
-
-**Knowledge prerequisite**:
-
-- shell and/or python scripting
-- Qubes OS qrexec services
-
-**Size of the project**: 175 hours
-
-**Mentor**: [Frédéric Pierret](/team/)
-
-
-### Qubes Live USB
-
-**Project**: Revive Qubes Live USB, integrate it with installer
-
-**Brief explanation**: Qubes Live USB is based on Fedora tools to build live
-distributions. But for Qubes we need some adjustments: starting Xen instead of
-Linux kernel, smarter copy-on-write handling (we run there multiple VMs, so a
-lot more data to save) and few more. Additionally in Qubes 3.2 we have
-so many default VMs that default installation does not fit in 16GB image
-(default value) - some subset of those VMs should be chosen. Ideally we'd like
-to have just one image being both live system and installation image. More
-details: [#1552](https://github.com/QubesOS/qubes-issues/issues/1552),
-[#1965](https://github.com/QubesOS/qubes-issues/issues/1965).
-
-**Expected results**:
-
-- Adjust set of VMs and templates included in live edition.
-- Update and fix build scripts for recent Qubes OS version.
-- Update startup script to mount appropriate directories as either
- copy-on-write (device-mapper snapshot), or tmpfs.
-- Optimize memory usage: should be possible to run sys-net, sys-firewall, and
- at least two more VMs on 4GB machine. This include minimizing writes to
- copy-on-write layer and tmpfs (disable logging etc).
-- Research option to install the system from live image. If feasible add
- this option.
-
-**Difficulty**: hard
-
-**Knowledge prerequisite**:
-
-- System startup sequence: bootloaders (isolinux, syslinux, grub, UEFI), initramfs, systemd.
-- Python and Bash scripting
-- Filesystems and block devices: loop devices, device-mapper, tmpfs, overlayfs, sparse files.
-
-**Size of the project**: 350 hours
-
-**Mentor**: [Frédéric Pierret](/team/)
-
-### LogVM(s)
-
-**Project**: LogVM(s)
-
-**Brief explanation**: Qubes AppVMs do not have persistent /var (on purpose).
-It would be useful to send logs generated by various VMs to a dedicated
-log-collecting VM. This way logs will not only survive VM shutdown, but also be
-immune to altering past entries. See
-[#830](https://github.com/QubesOS/qubes-issues/issues/830) for details.
-
-**Expected results**:
-
-- Design a _simple_ protocol for transferring logs. The less metadata (parsed
- in log-collecting VM) the better.
-- Implement log collecting service. Besides logs itself, should save
- information about logs origin (VM name) and timestamp. The service should
- _not_ trust sending VM in any of those.
-- Implement log forwarder compatible with systemd-journald and rsyslog. A
- mechanism (service/plugin) fetching logs in real time from those and sending
- to log-collecting VM over qrexec service.
-- Document the protocol.
-- Write unit tests and integration tests.
-
-**Difficulty**: easy
-
-**Knowledge prerequisite**:
-
-- syslog
-- systemd
-- Python/Bash scripting
-
-**Size of the project**: 175 hours
-
-**Mentor**: [Frédéric Pierret](/team/)
-
-
-### Whonix IPv6 and nftables support
-
-**Project**: Whonix IPv6 and nftables support
-
-**Brief explanation**: [T509](https://phabricator.whonix.org/T509)
-
-**Expected results**:
-
-- Work at upstream Tor: An older version of [TransparentProxy](https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy) page was the origin of Whonix. Update that page for nftables / IPv6 support without mentioning Whonix. Then discuss that on the tor-talk mailing list for wider input. [here](https://trac.torproject.org/projects/tor/ticket/21397)
-- implement corridor feature request add IPv6 support / port to nftables - [issue](https://github.com/rustybird/corridor/issues/39)
-- port [whonix-firewall](https://github.com/Whonix/whonix-firewall) to nftables
-- make connections to IPv6 Tor relays work
-- make connections to IPv6 destinations work
-
-**Difficulty**: medium
-
-**Knowledge prerequisite**:
-
-- nftables
-- iptables
-- IPv6
-
-**Size of the project**: 175 hours
-
-**Mentor**: [Patrick Schleizer](/team/)
-
-
-### GUI agent for Windows 8/10
-**Project**: GUI agent for Windows 8/10
-
-**Brief explanation**: Add support for Windows 8+ to the Qubes GUI agent and video driver. Starting from Windows 8, Microsoft requires all video drivers to conform to the WDDM display driver model which is incompatible with the current Qubes video driver. Unfortunately the WDDM model is much more complex than the old XPDM one and officially *requires* a physical GPU device (which may be emulated). Some progress has been made to create a full WDDM driver that *doesn't* require a GPU device, but the driver isn't working correctly yet. Alternatively, WDDM model supports display-only drivers which are much simpler but don't have access to system video memory and rendering surfaces (a key feature that would simplify seamless GUI mode). [#1861](https://github.com/QubesOS/qubes-issues/issues/1861)
-
-**Expected results**: Working display-only WDDM video driver or significant progress towards making the full WDDM driver work correctly.
-
-**Difficulty**: hard
-
-**Knowledge prerequisite**: C/C++ languages, familiarity with Windows API, familiarity with the core Windows WDM driver model. Ideally familiarity with the WDDM display driver model.
-
-**Size of the project**: 175 hours
-
-**Mentor**: [Rafał Wojdyła](/team/)
-
-### GNOME support in dom0 / GUI VM
-
-**Project**: GNOME support in dom0
-
-**Brief explanation**: Integrating GNOME into Qubes dom0. This include:
-
-- patching window manager to add colorful borders
-- removing stuff not needed in dom0 (file manager(s), indexing services etc)
-- adjusting menu for easy navigation (same applications in different VMs and such problems, dom0-related entries in one place)
-- More info: [#1806](https://github.com/QubesOS/qubes-issues/issues/1806)
-
-**Expected results**:
-
-- Review existing support for other desktop environments (KDE, Xfce4, i3, awesome).
-- Patch window manager to draw colorful borders (we use only server-side
- decorations), there is already very similar patch in
- [Cappsule project](https://github.com/cappsule/cappsule-gui).
-- Configure GNOME to not make use of dom0 user home in visible way (no search
- in files there, no file manager, etc).
-- Configure GNOME to not look into external devices plugged in (no auto
- mounting, device notifications etc).
-- Package above modifications as RPMs, preferably as extra configuration files
- and/or plugins than overwriting existing files. Exceptions to this rule may
- apply if no other option.
-- Adjust comps.xml (in installer-qubes-os repo) to define package group with
- all required packages.
-- Document installation procedure.
-
-**Difficulty**: hard
-
-**Knowledge prerequisite**:
-
-- GNOME architecture
-- C language (patching metacity)
-- Probably also javascript - for modifying GNOME shell extensions
-
-**Size of the project**: 175 hours
-
-**Mentor**: [Frédéric Pierret](/team/), [Marek Marczykowski-Górecki](/team/)
-
-### Generalize the Qubes PDF Converter to other types of files
-
-**Project**: Qubes Converters
-
-**Brief explanation**: One of the pioneering ideas of Qubes is to use disposable virtual machines to convert untrustworthy files (such as documents given to journalists by unknown and potentially malicious whistleblowers) into trustworthy files. See [Joanna's blog on the Qubes PDF Convert](https://theinvisiblethings.blogspot.co.uk/2013/02/converting-untrusted-pdfs-into-trusted.html) for details of the idea. Joanna has implemented a prototype for PDF documents. The goal of this project would be to generalize beyond the simple prototype to accommodate a wide variety of file formats, including Word documents, audio files, video files, spreadsheets, and so on. The converters should prioritise safety over faithful conversion. For example the Qubes PDF converter typically leads to lower quality PDFs (e.g. cut and paste is no longer possible), because this makes the conversion process safer.
-
-**Expected results**: We expect that in the timeframe, it will be possible to implement many converters for many file formats. However, if any unexpected difficulties arise, we would prioritise a small number of safe and high quality converters over a large number of unsafe or unuseful converters.
-
-**Difficulty**: easy
-
-**Knowledge prerequisite**: Most of the coding will probably be implemented as shell scripts to interface with pre-existing converters (such as ImageMagick in the Qubes PDF converter). However, shell scripts are not safe for processing untrusted data, so any extra processing will need to be implemented in another language -- probably Python.
-
-**Size of the project**: 175 hours
-
-**Mentors**: Andrew Clausen and Jean-Philippe Ouellet
-
-### Progress towards reproducible builds
-
-**Project**: Progress towards reproducible builds
-
-**Brief explanation**: A long-term goal is to be able to build the entire OS and installation media in a completely bit-wise deterministic manner, but there are many baby steps to be taken along that path. See:
-
-- "[Security challenges for the Qubes build process](/news/2016/05/30/build-security/)"
-- [This mailing list post](https://groups.google.com/d/msg/qubes-devel/gq-wb9wTQV8/mdliS4P2BQAJ)
-- and [reproducible-builds.org](https://reproducible-builds.org/)
-
-for more information and qubes-specific background.
-
-**Expected results**: Significant progress towards making the Qubes build process deterministic. This would likely involve cooperation with and hacking on several upstream build tools to eliminate sources of variability.
-
-**Difficulty**: medium
-
-**Knowledge prerequisite**: qubes-builder [[1]](/doc/qubes-builder-v2/) [[2]](https://github.com/QubesOS/qubes-builderv2), and efficient at introspecting complex systems: comfortable with tracing and debugging tools, ability to quickly identify and locate issues within a large codebase (upstream build tools), etc.
-
-**Size of the project**: 350 hours
-
-**Mentor**: [Marek Marczykowski-Górecki](/team/)
-
-### Porting Qubes to ARM/aarch64
-
-**Project**: Porting Qubes to ARM/aarch64
-
-**Brief explanation**:
-
-Qubes currently only supports the x86_64 CPU architecture. Xen currently has additional support for ARM32/ARM64 processors, however work needs to be done to integrate this into the Qubes build process, as well as work in integrating this with the Qubes toolstack and security model. This may also be beneficial in simplifying the process of porting to other architectures.
-
-Some related discussion:
-
-- [#4318](https://github.com/QubesOS/qubes-issues/issues/4318) on porting to ppc64.
-- [#3894](https://github.com/QubesOS/qubes-issues/issues/3894) on porting to L4 microkernel.
-
-**Expected results**:
-
-- Add cross-compilation support to qubes-builder and related components.
-- Make aarch64 specific adjustments to Qubes toolstacks/manager (including passthrough of devices from device tree to guest domains).
-- Aarch64 specific integration and unit tests.
-- Production of generic u-boot or uefi capable image/iso for target hardware.
-
-**Difficulty**: hard
-
-**Knowledge prerequisite**:
-
-- Libvirt and Qubes toolstacks (C and python languages).
-- Xen debugging.
-- General ARM architecture knowledge.
-
-**Size of the project**: 350 hours
-
-**Mentor**: [Marek Marczykowski-Górecki](/team/)
-
-
-### Android development in Qubes
-
-**Project**: Research running Android in Qubes VM (probably HVM) and connecting it to Android Studio
-
-**Brief explanation**: The goal is to enable Android development (and testing!)
-on Qubes OS. Currently it's only possible using qemu-emulated Android for ARM.
-Since it's software emulation it's rather slow.
-Details, reference: [#2233](https://github.com/QubesOS/qubes-issues/issues/2233)
-
-**Expected results**:
-
-- a simple way of setting up Android qubes with hardware emulation
- (distributed as a template or as a salt, handling various modern Android versions)
-- figuring out and implementing an easy and secure way to connect an Android
- qube to a development qube with Android studio
-- documentation and tests
-
-**Difficulty**: hard
-
-**Knowledge prerequisite**:
-
-**Size of the project**: 350 hours
-
-**Mentor**: Inquire on [qubes-devel](/support/#qubes-devel).
-
-### Admin API Fuzzer
-
-**Project**: Develop a [Fuzzer](https://en.wikipedia.org/wiki/Fuzzing) for the
-[Qubes OS Admin API](/doc/admin-api/).
-
-**Brief explanation**: The [Qubes OS Admin API](/doc/admin-api/)
-enables VMs to execute privileged actions on other VMs or dom0 - if allowed by the Qubes OS RPC policy.
-Programming errors in the Admin API however may cause these access rights to be more permissive
-than anticipated by the programmer.
-
-Since the Admin API is continuously growing and changing, continuous security assessments are required.
-A [Fuzzer](https://en.wikipedia.org/wiki/Fuzzing) would help to automate part of these assessments.
-
-**Expected results**:
-
- - fully automated & extensible Fuzzer for parts of the Admin API
- - user & developer documentation
-
-**Difficulty**: medium
-
-**Prerequisites**:
-
- - basic Python understanding
- - some knowledge about fuzzing & existing fuzzing frameworks (e.g. [oss-fuzz](https://github.com/google/oss-fuzz/tree/master/projects/qubes-os))
- - a hacker's curiosity
-
-**Size of the project**: 175 hours
-
-**Mentor**: Inquire on [qubes-devel](/support/#qubes-devel).
-
-
-### Secure Boot support
-
-**Project**: Add support for protecting boot binaries with Secure Boot technology, using user-generated keys.
-
-**Brief explanation**: Since recently, Xen supports "unified EFI boot" which allows to sign not only Xen binary itself, but also dom0 kernel and their parameters. While the base technology is there, enabling it is a painful and complex process. The goal of this project is to integrate configuration of this feature into Qubes, automating as much as possible. See discussion in [issue #4371](https://github.com/QubesOS/qubes-issues/issues/4371)
-
-**Expected results**:
-
- - a tool to prepare relevant boot files for unified Xen EFI boot - this includes collecting Xen, dom0 kernel, initramfs, config file, and possibly few more (ucode update?); the tool should then sign the file with user provided key (preferably propose to generate it too)
- - integrate it with updates mechanism, so new Xen or dom0 kernel will be picked up automatically
- - include a fallback configuration that can be used for troubleshooting (main unified Xen EFI intentionally does not allow to manipulate parameters at boot time)
-
-**Difficulty**: hard
-
-**Knowledge prerequisite**:
-
- - basic understanding of Secure Boot
- - Bash and Python scripting
-
-**Size of the project**: 175 hours
-
-**Mentor**: [Marek Marczykowski-Górecki](/team/)
-
-
-### Reduce logging of Disposable VMs
-
-**Project**: Reduce logging of Disposable VMs
-
-**Brief explanation**: Partial metadata of a DisposableVM is stored in the dom0 filesystem. This applies to various logs, GUI status files etc. There should be an option to hide as much of that as possible - including bypassing some logging, and removing various state files, or at the very least obfuscating any hints what is running inside DisposableVM. More details at [issue #4972](https://github.com/QubesOS/qubes-issues/issues/4972)
-
-**Expected results**: A DisposableVM should not leave logs hinting what was running inside.
-
-**Difficulty**: medium
-
-**Knowledge prerequisite**:
-
- - Python scripting
- - Basic knowledge of Linux system services management (systemd, syslog etc)
-
-**Size of the project**: 350 hours
-
-**Mentor**: [Marek Marczykowski-Górecki](/team/)
-
-
-## Past Projects
-
-You can view the projects we had in 2017 in the [GSoC 2017 archive](https://summerofcode.withgoogle.com/archive/2017/organizations/5074771758809088/). We also participated in GSoC 2020 and GSoC 2021, and you can see the project in the [GSoC 2020 archive](https://summerofcode.withgoogle.com/archive/2020/organizations/4924517870206976/) and [GSoC 2021 archive](https://summerofcode.withgoogle.com/archive/2021/organizations/5682513023860736).
-
-Here are some successful projects which have been implemented in the past by Google Summer of Code participants.
-
-### Template manager, new template distribution mechanism
-
-**Project**: Template manager, new template distribution mechanism
-
-**Brief explanation**: Template VMs currently are distributed using RPM
-packages. There are multiple problems with that, mostly related to static
-nature of RPM package (what files belong to the package). This means such
-Template VM cannot be renamed, migrated to another storage (like LVM), etc.
-Also we don't want RPM to automatically update template package itself (which
-would override all the user changes there). More details:
-[#2064](https://github.com/QubesOS/qubes-issues/issues/2064),
-[#2534](https://github.com/QubesOS/qubes-issues/issues/2534),
-[#3573](https://github.com/QubesOS/qubes-issues/issues/3573).
-
-**Expected results**:
-
- - Design new mechanism for distributing templates (possibly including some
- package format - either reuse something already existing, or design
- new one). The mechanism needs to handle:
- - integrity protection (digital signatures), not parsing any data in dom0
- prior to signature verification
- - efficient handling of large sparse files
- - ability to deploy the template into various storage mechanisms (sparse
- files, LVM thin volumes etc).
- - template metadata, templates repository - enable the user to browse
- available templates (probably should be done in dedicated VM, or DisposableVM)
- - manual template removal by users (without it, see problems such
- as [#5509](https://github.com/QubesOS/qubes-issues/issues/5509)
- - Implement the above mechanism:
- - tool to download named template - should perform download operation in
- some VM (as dom0 have no network access), then transfer the data to dom0,
- verify its integrity and then create Template VM and feed it's root
- filesystem image with downloaded data.
- - tool to browse templates repository - both CLI and GUI (preferably integrated
- with existing Template Manager tool)
- - integrate both tools - user should be able to choose some template to be
- installed from repository browsing tool - see
- [#1705](https://github.com/QubesOS/qubes-issues/issues/1705) for some idea
- (this one lacks integrity verification, but a similar service could
- be developed with that added)
- - If new "package" format is developed, add support for it into
- [linux-template-builder](https://github.com/QubesOS/qubes-linux-template-builder).
- - Document the mechanism.
- - Write unit tests and integration tests.
-
-**Knowledge prerequisite**:
-
- - Large files (disk images) handling (sparse files, archive formats)
- - Bash and Python scripting
- - Data integrity handling - digital signatures (gpg2, gpgv2)
- - PyGTK
- - RPM package format, (yum) repository basics
-
-**Mentor**: [Marek Marczykowski-Górecki](/team/)
-
-----
-
-We adapted some of the language here about GSoC from the [KDE GSoC page](https://community.kde.org/GSoC).
diff --git a/developer/general/gsoc.rst b/developer/general/gsoc.rst
new file mode 100644
index 00000000..07357272
--- /dev/null
+++ b/developer/general/gsoc.rst
@@ -0,0 +1,692 @@
+============================
+Google Summer of Code (GSoC)
+============================
+
+
+Information for Students
+------------------------
+
+
+Thank you for your interest in participating in the `Google Summer of Code program `__ with the `Qubes OS team `__. You can read more about the Google Summer of Code program at the `official website `__ and the `official FAQ `__.
+
+Being accepted as a Google Summer of Code contributor is quite competitive. If you are interested in participating in the Summer of Code please be aware that you must be able to produce code for Qubes OS for 3-5 months. Your mentors, Qubes developers, will dedicate a portion of their time towards mentoring you. Therefore, we seek candidates who are committed to helping Qubes long-term and are willing to do quality work and be proactive in communicating with your mentor.
+
+You don’t have to be a proven developer – in fact, this whole program is meant to facilitate joining Qubes and other free and open source communities. The Qubes community maintains information about :ref:`contributing to Qubes development ` and :ref:`how to send patches `. In order to contribute code to the Qubes project, you must be able to :doc:`sign your code `.
+
+You should start learning the components that you plan on working on before the start date. Qubes developers are available on the :ref:`mailing lists ` for help. The GSoC timeline reserves a lot of time for bonding with the project – use that time wisely. Good communication is key, you should plan to communicate with your team daily and formally report progress and plans weekly. Students who neglect active communication will be failed.
+
+Overview of Steps
+^^^^^^^^^^^^^^^^^
+
+
+- Join the :ref:`qubes-devel list ` and introduce yourself, and meet your fellow developers
+
+- Read `Google’s instructions for participating `__ and the `GSoC Student Manual `__
+
+- Take a look at the list of ideas below
+
+- Come up with a project that you are interested in (and feel free to propose your own! Don’t feel limited by the list below.)
+
+- Read the Contributor Proposal guidelines below
+
+- Write a first draft proposal and send it to the qubes-devel mailing list for review
+
+- Submit proposal using `Google’s web interface `__ ahead of the deadline (this requires a Google Account!)
+
+- Submit proof of enrollment well ahead of the deadline
+
+
+
+Coming up with an interesting idea that you can realistically achieve in the time available to you (one summer) is probably the most difficult part. We strongly recommend getting involved in advance of the beginning of GSoC, and we will look favorably on applications from prospective contributors who have already started to act like free and open source developers.
+
+Before the summer starts, there are some preparatory tasks which are highly encouraged. First, if you aren’t already, definitely start using Qubes as your primary OS as soon as possible! Also, it is encouraged that you become familiar and comfortable with the Qubes development workflow sooner than later. A good way to do this (and also a great way to stand out as an awesome applicant and make us want to accept you!) might be to pick up some issues from `qubes-issues `__ (our issue-tracking repo) and submit some patches addressing them. Some suitable issues might be those with tags `“help wanted” and “P: minor” `__ (although more significant things are also welcome, of course). Doing this will get you some practice with :doc:`qubes-builder `, our code-signing policies, and some familiarity with our code base in general so you are ready to hit the ground running come summer.
+
+Contributor proposal guidelines
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+
+A project proposal is what you will be judged upon. Write a clear proposal on what you plan to do, the scope of your project, and why we should choose you to do it. Proposals are the basis of the GSoC projects and therefore one of the most important things to do well.
+
+Below is the application template:
+
+.. code:: bash
+
+ # Introduction
+
+ Every software project should solve a problem. Before offering the solution (your Google Summer of Code project), you should first define the problem. What’s the current state of things? What’s the issue you wish to solve and why? Then you should conclude with a sentence or two about your solution. Include links to discussions, features, or bugs that describe the problem further if necessary.
+
+ # Project goals
+
+ Be short and to the point, and perhaps format it as a list. Propose a clear list of deliverables, explaining exactly what you promise to do and what you do not plan to do. “Future developments” can be mentioned, but your promise for the Google Summer of Code term is what counts.
+
+ # Implementation
+
+ Be detailed. Describe what you plan to do as a solution for the problem you defined above. Include technical details, showing that you understand the technology. Illustrate key technical elements of your proposed solution in reasonable detail.
+
+ # Timeline
+
+ Show that you understand the problem, have a solution, have also broken it down into manageable parts, and that you have a realistic plan on how to accomplish your goal. Here you set expectations, so don’t make promises you can’t keep. A modest, realistic and detailed timeline is better than promising the impossible.
+
+ If you have other commitments during GSoC, such as a job, vacation, exams, internship, seminars, or papers to write, disclose them here. GSoC should be treated like a full-time job, and we will expect approximately 40 hours of work per week. If you have conflicts, explain how you will work around them. If you are found to have conflicts which you did not disclose, you may be failed.
+
+ Open and clear communication is of utmost importance. Include your plans for communication in your proposal; daily if possible. You will need to initiate weekly formal communications such as a detailed email to the qubes-devel mailing list. Lack of communication will result in you being failed.
+
+ # About me
+
+ Provide your contact information and write a few sentences about you and why you think you are the best for this job. Prior contributions to Qubes are helpful; list your commits. Name people (other developers, students, professors) who can act as a reference for you. Mention your field of study if necessary. Now is the time to join the relevant mailing lists. We want you to be a part of our community, not just contribute your code.
+
+ Tell us if you are submitting proposals to other organizations, and whether or not you would choose Qubes if given the choice.
+
+ Other things to think about:
+ * Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, and perhaps 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?
+ * If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?
+ * After you have written your proposal, you should get it reviewed. Do not rely on the Qubes mentors to do it for you via the web interface, although we will try to comment on every proposal. It is wise to ask a colleague or a developer to critique your proposal. Clarity and completeness are important.
+
+
+
+Project Ideas
+-------------
+
+
+These project ideas were contributed by our developers and may be incomplete. If you are interested in submitting a proposal based on these ideas, you should contact the :ref:`qubes-devel mailing list