To force <code>dom0</code> updates over Tor, set Qubes' <code>dom0</code> UpdateVM to <code>{{project_name_gateway_vm}}</code>. <ref> Or manually set the torified UpdateVM in <code>dom0</code> terminal. {{CodeSelect|code= qubes-prefs updatevm {{project_name_gateway_vm}} }} </ref> * <code>Qube Manager</code> → <code><u>S</u>ystem</code> → <code><u>G</u>lobal Settings</code> → <code>Dom0 UpdateVM:</code> <code>{{project_name_gateway_vm}}</code> → <code>OK</code> To revert this change, set Qubes' <code>dom0</code> UpdateVM to <code>sys-firewall</code> or another preferred VM. <ref> To revert this change in <code>dom0</code> terminal, run. {{CodeSelect|code= qubes-prefs updatevm sys-firewall }} </ref> * <code>Qubes Manager</code> → <code><u>S</u>ystem</code> → <code><u>G</u>lobal Settings</code> → <code>Dom0 UpdateVM:</code> <code>sys-firewall</code></code> → <code>OK</code>