diff --git a/README.md b/README.md
index c73577b9ead99e90b393f7d1793cf42131bae513..84de871bf175b04fa880ba0360c678cdb97fb38a 100644
--- a/README.md
+++ b/README.md
@@ -42,7 +42,7 @@ Feel free to contact us in the PlagueOS matrix [chat](https://matrix.to/#/#plagu
  - Install from Void live image:
     - Start a live session in void
         - Sign in with credentials: `root:voidlinux`
-        - `xbps-install -S xbps ca-certificates wget`
+        - `xbps-install -S xbps ca-certificates wget && xbps-install -Su`
         - Pull down the latest PlagueOS installer [release](https://0xacab.org/optout/plagueos/-/releases)
         - Signature verification (Recommended)
           - Navigate to [KeyOxide](https://keyoxide.org/B8778B5C06CF8D5E69E4D4EB13BA4BD4C14170C0)
@@ -53,8 +53,8 @@ Feel free to contact us in the PlagueOS matrix [chat](https://matrix.to/#/#plagu
         - Validate the checksum of the file matches the signed message on the release listing:
           - `sha256sum plagueos-*`
           - If the result does **not** match, please cease the install and notify the PlagueOS matrix chat as soon as possible.
-        - `tar -xvf plagueos-v*`
-        - `bash plagueos-v*/plague-install`
+        - `tar -xvf plagueos-*`
+        - `bash plagueos-*/plague-install -v`
 
 ### Install Options
  - During the install, multiple configurations will be displayed. The selections are between the following:
diff --git a/base_configs/home/user/PlagueOS_Wiki/Security-Considerations.md b/base_configs/home/user/PlagueOS_Wiki/Security-Considerations.md
index 8c83ccaf293a222b5383932961f67edf43c82552..d8c9bf6de55dc88bfd11eb398556f0c33eb595fe 100644
--- a/base_configs/home/user/PlagueOS_Wiki/Security-Considerations.md
+++ b/base_configs/home/user/PlagueOS_Wiki/Security-Considerations.md
@@ -57,7 +57,7 @@
 - Increased password hashing rounds
 - Full Wayland Environment options
     - Wayland environments were prioritized due to their implementation of windows isolation, which Xorg lacks. Xorg windows with a nested X11 server and a sandboxing tool such as `bwrap` could accomplish this, however Wayland provides the better model by default. We currently leverage `gnome-core` as the desktop environment to provide a minimalist, easy-to-use interface.
-    - Window Manager options are still under consideration, however, few truly abide by the Wayland security model as observed with Sway WM (which we previously supported).
+    - Optional client only environment made available for those who chose to implement other environments. 
 - Hide process identifiers
     - By default, all users can view snoop on process identifiers, which could be leveraged by an attacker to spy on processes. We mount `/proc` with `hidepid=2,gid=proc` mount options.
 - Permission hardening
diff --git a/installer_scripts/env.cfg b/installer_scripts/env.cfg
index 8f26db0f5a79c0c9a138ee78ab6939a1a35cde51..897b4cc0349386456b8d0d15c115f111ce7f26fc 100644
--- a/installer_scripts/env.cfg
+++ b/installer_scripts/env.cfg
@@ -104,7 +104,6 @@ PATH_TO_GUI_CONFIGS="$SCRIPT_DIR""/gui_configs"
 
 # Static variables
 DE_PACKAGES=("gnome-core" "gnome-terminal" "gnome-tweaks" "virt-manager" "polkit-gnome" "gdm" "pulseaudio" "gedit")
-# WM_PACKAGES=("sway" "seatd" "qt6-wayland" "alacritty" "polkit" "swaylock" "swayidle" "dejavu-fonts-ttf" "virt-manager" "bemenu")
 CLI_PACKAGES=() # enter in some package names
 INTEL_GPU_PACKAGES=("void-repo-nonfree" "linux-firmware-intel" "mesa-dri" "vulkan-loader" "mesa-vulkan-intel" "intel-video-accel" "intel-media-driver" "libva-intel-driver")
 AMD_GPU_PACKAGES=("void-repo-nonfree" "linux-firmware-amd" "mesa-dri" "vulkan-loader" "mesa-vulkan-radeon" "amdvlk" "mesa-vaapi" "mesa-vdpau")