fixed reference errors, minor enhancements to the docs, fix pyproject.toml, alt text to images

This commit is contained in:
qubedmaiska 2025-09-09 11:39:34 -04:00
parent 4404a5d5f5
commit e93ddb3796
No known key found for this signature in database
GPG key ID: 204BCE0FD52C0501
15 changed files with 73 additions and 99 deletions

View file

@ -6,7 +6,7 @@ Certified hardware
The Qubes OS Project aims to partner with a select few computer vendors to ensure that Qubes users have reliable hardware purchasing options. We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.
.. DANGER::
**Warning:** The Qubes OS Project certifies only that a particular hardware *configuration* is *supported* by Qubes OS and is available to purchase with Qubes OS preinstalled. We take no responsibility for any vendors manufacturing, shipping, payment, or other practices; nor can we control whether physical hardware is modified (whether maliciously or otherwise) *en route* to the user.
You may also be interested in the `community-recommended hardware <https://forum.qubes-os.org/t/5560>`__ list and the `hardware compatibility list (HCL) <https://www.qubes-os.org/hcl/>`__.
@ -19,8 +19,8 @@ Qubes-certified computers are certified for a :doc:`major release </developer/re
The current Qubes-certified models are listed below in reverse chronological order of certification.
.. list-table::
:widths: 43 43 43
.. list-table::
:widths: 43 43 43
:align: center
:header-rows: 1
@ -28,22 +28,22 @@ The current Qubes-certified models are listed below in reverse chronological ord
- Model
- Certification details
* - `NovaCustom <https://novacustom.com/>`__
- `V54 Series <https://novacustom.com/product/v54-series/>`__
- `V54 Series <https://novacustom.com/product/v54-series/>`__
- :doc:`Certification details </user/hardware/certified-hardware/novacustom-v54-series/>`
* - `Nitrokey <https://www.nitrokey.com/>`__
- `NitroPad V56 <https://shop.nitrokey.com/shop/nitropad-v56-684>`__
- `NitroPad V56 <https://shop.nitrokey.com/shop/nitropad-v56-684>`__
- :doc:`Certification details </user/hardware/certified-hardware/nitropad-v56/>`
* - `NovaCustom <https://novacustom.com/>`__
- `V56 Series <https://novacustom.com/product/v56-series/>`__
- `V56 Series <https://novacustom.com/product/v56-series/>`__
- :doc:`Certification details </user/hardware/certified-hardware/novacustom-v56-series/>`
* - `Nitrokey <https://www.nitrokey.com/>`__
- `NitroPC Pro 2 <https://shop.nitrokey.com/shop/nitropc-pro-2-523>`__
- `NitroPC Pro 2 <https://shop.nitrokey.com/shop/nitropc-pro-2-523>`__
- :doc:`Certification details </user/hardware/certified-hardware/nitropc-pro-2/>`
* - `Star Labs <https://starlabs.systems/>`__
- `StarBook <https://starlabs.systems/pages/starbook>`__
- `StarBook <https://starlabs.systems/pages/starbook>`__
- :doc:`Certification details </user/hardware/certified-hardware/starlabs-starbook/>`
* - `Nitrokey <https://www.nitrokey.com/>`__
- `NitroPC Pro <https://web.archive.org/web/20231027112856/https://shop.nitrokey.com/shop/product/nitropc-pro-523>`__
- `NitroPC Pro <https://web.archive.org/web/20231027112856/https://shop.nitrokey.com/shop/product/nitropc-pro-523>`__
- :doc:`Certification details </user/hardware/certified-hardware/nitropc-pro/>`
* - `NovaCustom <https://novacustom.com/>`__
- `NV41 Series <https://novacustom.com/product/nv41-series/>`__
@ -52,7 +52,7 @@ The current Qubes-certified models are listed below in reverse chronological ord
- `Dasharo FidelisGuard Z690 <https://web.archive.org/web/20240917145232/https://shop.3mdeb.com/shop/open-source-hardware/dasharo-fidelisguard-z690-qubes-os-certified/>`__
- :doc:`Certification details </user/hardware/certified-hardware/dasharo-fidelisguard-z690/>`
* - `Nitrokey <https://www.nitrokey.com/>`__
- `NitroPad T430 <https://shop.nitrokey.com/shop/nitropad-t430-119>`__
- `NitroPad T430 <https://shop.nitrokey.com/shop/nitropad-t430-119>`__
- :doc:`Certification details </user/hardware/certified-hardware/nitropad-t430/>`
* - `Nitrokey <https://www.nitrokey.com/>`__
- `NitroPad X230 <https://shop.nitrokey.com/shop/product/nitropad-x230-67>`__
@ -60,7 +60,6 @@ The current Qubes-certified models are listed below in reverse chronological ord
* - `Insurgo <https://insurgo.ca/>`__
- `PrivacyBeast X230 <https://insurgo.ca/produit/qubesos-certified-privacybeast_x230-reasonably-secured-laptop/>`__
- :doc:`Certification details </user/hardware/certified-hardware/insurgo-privacybeast-x230/>`
Become hardware certified

View file

@ -11,8 +11,8 @@ The `Dasharo FidelisGuard Z690 <https://web.archive.org/web/20240917145232/https
The `Dasharo FidelisGuard Z690 <https://web.archive.org/web/20240917145232/https://shop.3mdeb.com/shop/open-source-hardware/dasharo-fidelisguard-z690-qubes-os-certified/>`__ is a full desktop PC build that brings the `Dasharo <https://dasharo.com/>`__ open-source firmware distribution to the MSI PRO Z690-A DDR4 motherboard with Qubes OS preinstalled. The full configuration includes:
.. list-table::
:widths: 14 14
.. list-table::
:widths: 14 14
:align: center
:header-rows: 1
@ -30,7 +30,6 @@ The `Dasharo FidelisGuard Z690 <https://web.archive.org/web/20240917145232/https
- SSD Intel 670p 512 GB M.2 2280 PCI-E x4 Gen3 NVMe
* - Enclosure
- SilentiumPC Armis AR1
|Photo of Dasharo FidelisGuard Z690 with open case|

View file

@ -6,7 +6,7 @@ NitroPad X230
.. DANGER::
**Warning:** The CPU in this computer no longer receives microcode updates from Intel. Without microcode updates, Qubes OS cannot ensure that this computer is secure against CPU vulnerabilities. While this computer remains certified for Qubes OS Release 4, we recommend that prospective buyers consider a newer Qubes-certified computer instead.
The `NitroPad X230 <https://shop.nitrokey.com/shop/product/nitropad-x230-67>`__ is :doc:`officially certified </user/hardware/certified-hardware/certified-hardware>` for Qubes OS Release 4.

View file

@ -6,11 +6,11 @@ NitroPC Pro
.. warning::
**Note:** When configuring your NitroPC Pro 2 on the Nitrokey website, there is an option for a discrete graphics card (e.g., Nvidia GeForce RTX 4070 or 4090) in addition to integrated graphics (e.g., Intel UHD 770, which is always included because it is physically built into the CPU). NitroPC Pro 2 configurations that include discrete graphics cards are *not* Qubes-certified. The only NitroPC Pro 2 configurations that are Qubes-certified are those that contain *only* integrated graphics.
.. warning::
**Note:** Only the “Dasharo TianoCore UEFI without Measured Boot, without Nitrokey” firmware option is certified. The “HEADS with Measured Boot, requires Nitrokey!” firmware option is *not* certified.
The `NitroPC Pro <https://web.archive.org/web/20231027112856/https://shop.nitrokey.com/shop/product/nitropc-pro-523>`__ is :doc:`officially certified </user/hardware/certified-hardware/certified-hardware>` for Qubes OS Release 4.
@ -19,8 +19,8 @@ The `NitroPC Pro <https://web.archive.org/web/20231027112856/https://shop.nitrok
Heres a summary of the main component options available for this mid-tower desktop PC:
.. list-table::
:widths: 29 29
.. list-table::
:widths: 29 29
:align: center
:header-rows: 1
@ -40,7 +40,6 @@ Heres a summary of the main component options available for this mid-tower de
- Wi-Fi 6E, 2400 Mbps, 802.11/a/b/g/n/ac/ax, Bluetooth 5.2
* - Operating system (optional)
- Qubes OS 4.1 or Ubuntu 22.04 LTS
Of special note for Qubes users, the NitroPC Pro features a combined PS/2 port that supports both a PS/2 keyboard and a PS/2 mouse simultaneously with a Y-cable (not included). This allows for full control of dom0 without the need for USB keyboard or mouse passthrough. Nitrokey also offers a special tamper-evident shipping method for an additional fee. With this option, the case screws will be individually sealed and photographed, and the NitroPC Pro will be packed inside a sealed bag. Photographs of the seals will be sent to you by email, which you can use to determine whether the case was opened during transit.

View file

@ -9,7 +9,7 @@ Qubes OS is effectively a “meta” operating system (OS) that can run almost a
The following instructions explain how to permanently install new software in a template. There are different instructions for software from the default repositories and all other software. (If youre not sure, try the default repositories first.)
.. installing-software-from-default-repositories:
.. _installing-software-from-default-repositories:
Installing software from default repositories
---------------------------------------------
@ -109,12 +109,12 @@ If things are still not working as expected:
How to update software
----------------------
Please see :doc:`how-to-update`.
Please see :doc:`/user/how-to-guides/how-to-update`.
Why don't templates have normal network access?
-----------------------------------------------
In order to protect you from performing risky activities in templates, they do not have normal network access by default. Instead, templates use an :ref:`updates-proxy` which allows you to install and update software using the distributions package manager over the proxy connection. **The updates proxy is already set up to work automatically out-of-the-box and requires no special action from you.** Most users should simply follow the normal instructions for :ref:`installing-software-from-default-repositories` and :doc:`updating <how-to-update>` software. If your software is not available in the default repositories, see `installing software from other sources <#installing-software-from-other-sources>`__.
In order to protect you from performing risky activities in templates, they do not have normal network access by default. Instead, templates use an :ref:`updates-proxy` which allows you to install and update software using the distributions package manager over the proxy connection. **The updates proxy is already set up to work automatically out-of-the-box and requires no special action from you.** Most users should simply follow the normal instructions for :ref:`installing-software-from-default-repositories` and :doc:`updating </user/how-to-guides/how-to-update>` software. If your software is not available in the default repositories, see `installing software from other sources <#installing-software-from-other-sources>`__.
Advanced
--------
@ -223,7 +223,7 @@ This is like the simple revert, except:
- The saved revision of the volumes must be uncompromised. With the default ``revisions_to_keep=1`` for the root volume, you must **not** have started the template since the compromising action.
.. updates-proxy:
.. _updates-proxy:
Updates proxy
^^^^^^^^^^^^^