From 6d15746f1a41b71a6c1ddcbdc04a00084886dc90 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Wed, 8 Nov 2023 21:26:14 -0600 Subject: [PATCH] Typo --- docs/os/qubes-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/os/qubes-overview.md b/docs/os/qubes-overview.md index 13d8fc7586..2c76e4fde5 100644 --- a/docs/os/qubes-overview.md +++ b/docs/os/qubes-overview.md @@ -52,7 +52,7 @@ The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Q We [recommend](../advanced/tor-overview.md) connecting to the Tor network via a [VPN](../vpn.md) provider, and luckily Qubes makes this easy to do with a combination of ProxyVMs and Whonix. -After [creating a new ProxyVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) which connects to the VPN of your choice, you can chain your Whonix qubes to that ProxyVM before it connects to the Tor network, by setting the NetVM of your Whonix Workstation (`sys-whonix`) to the newly-created ProxyVM. +After [creating a new ProxyVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) which connects to the VPN of your choice, you can chain your Whonix qubes to that ProxyVM **before** they connect to the Tor network, by setting the NetVM of your Whonix **Gateway** (`sys-whonix`) to the newly-created ProxyVM. Your qubes should be configured in a manner similar to this: