diff --git a/user/hardware/certified-hardware/certified-hardware.md b/user/hardware/certified-hardware/certified-hardware.md index 3067080b..e3465e62 100644 --- a/user/hardware/certified-hardware/certified-hardware.md +++ b/user/hardware/certified-hardware/certified-hardware.md @@ -36,7 +36,7 @@ The current Qubes-certified models are listed below in reverse chronological ord | [NovaCustom](https://novacustom.com/) | [NV41 Series](https://novacustom.com/product/nv41-series/) | [Certification details](/doc/certified-hardware/novacustom-nv41-series/) | | [3mdeb](https://3mdeb.com/) | [Dasharo FidelisGuard Z690](https://web.archive.org/web/20240917145232/https://shop.3mdeb.com/shop/open-source-hardware/dasharo-fidelisguard-z690-qubes-os-certified/) | [Certification details](/doc/certified-hardware/dasharo-fidelisguard-z690/) | | [Nitrokey](https://www.nitrokey.com/) | [NitroPad T430](https://shop.nitrokey.com/shop/product/nitropad-t430-119) | [Certification details](/doc/certified-hardware/nitropad-t430/) | -| [Nitrokey](https://www.nitrokey.com/) | [NitroPad X230](https://shop.nitrokey.com/shop/product/nitropad-x230-67) | [Certification details](/doc/certified-hardware/nitropad-x230/) | +| [Nitrokey](https://www.nitrokey.com/) | [NitroPad X230](https://shop.nitrokey.com/shop/product/nitropad-x230-67) | [Certification details](/doc/certified-hardware/nitropad-x230/) | | [Insurgo](https://insurgo.ca/) | [PrivacyBeast X230](https://insurgo.ca/produit/qubesos-certified-privacybeast_x230-reasonably-secured-laptop/) | [Certification details](/doc/certified-hardware/insurgo-privacybeast-x230/) | ## Become hardware certified diff --git a/user/how-to-guides/how-to-install-software.md b/user/how-to-guides/how-to-install-software.md index 87f8af4b..0cc90323 100644 --- a/user/how-to-guides/how-to-install-software.md +++ b/user/how-to-guides/how-to-install-software.md @@ -164,8 +164,8 @@ Please see [How to Update](/doc/how-to-update/). ## Why don't templates have normal network access? In order to protect you from performing risky activities in templates, they do -not have normal network access by default. Instead, templates use an [updates -proxy](#updates-proxy) which allows you to install and update software using +not have normal network access by default. Instead, templates use an +[updates-proxy](#updates-proxy)which allows you to install and update software using the distribution's package manager over the proxy connection. **The updates proxy is already set up to work automatically out-of-the-box and requires no special action from you.** diff --git a/user/how-to-guides/how-to-update.md b/user/how-to-guides/how-to-update.md index 743c7bf1..5120701f 100644 --- a/user/how-to-guides/how-to-update.md +++ b/user/how-to-guides/how-to-update.md @@ -158,7 +158,7 @@ As of Qubes 4.2, firmware updates can be performed from within Qubes for [fwupd- ### In dom0 -First, ensure that your [UpdateVM](/doc/Software/UpdateVM/) +First, ensure that your UpdateVM contains the `fwupd-qubes-vm` package. This package is installed by default for qubes with `qubes-vm-recommended` packages. @@ -198,8 +198,7 @@ Repeat the update process for any additional devices on your computer. Devices that are attached to non-dom0 qubes can be updated via a graphical tool for `fwupd`, or via the `fwupdmgr` commandline tool. -To update the firmware of offline qubes, use the [Updates -proxy](/doc/how-to/install/software/#updates-proxy). +To update the firmware of offline qubes, use the [Updates proxy](/doc/how-to-install-software/#updates-proxy). ### Computers without fwupd support