mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-07-22 06:29:28 -04:00
Fix links to qrexec docs
This commit is contained in:
parent
c0a91ca4a9
commit
a4b7b754bb
6 changed files with 6 additions and 9 deletions
|
@ -57,6 +57,3 @@ It even applies to the scenario of copying files between air-gapped machines.
|
|||
So, you should always copy data only from *more trusted* to *less trusted* qubes.
|
||||
|
||||
See also [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) for more information on this topic, and some ideas of how we might solve this problem in some future version of Qubes.
|
||||
|
||||
You may also want to read how to [revoke "Yes to All" authorization](/doc/qrexec3/#revoking-yes-to-all-authorization)
|
||||
|
||||
|
|
|
@ -168,7 +168,7 @@ This line means:
|
|||
|
||||
In other words, any VM will be allowed to create a new DisposableVM based on `online-dvm-template` and open a URL inside of that DisposableVM.
|
||||
|
||||
More information about RPC policies for DisposableVMs can be found [here][qrexec3-4.0].
|
||||
More information about RPC policies for DisposableVMs can be found [here][qrexec].
|
||||
|
||||
|
||||
## Customizing DisposableVMs ##
|
||||
|
@ -179,4 +179,4 @@ Full instructions can be found [here](/doc/disposablevm-customization/).
|
|||
|
||||
|
||||
[DisposableVM Template]: /doc/glossary/#disposablevm-template
|
||||
[qrexec3-4.0]: /doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
|
||||
[qrexec]: /doc/qrexec/#qubes-rpc-administration
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue