diff --git a/Docs/Configuration.md5 b/Docs/Configuration.md5
index 6a75109a..317de78b 100644
--- a/Docs/Configuration.md5
+++ b/Docs/Configuration.md5
@@ -1 +1 @@
-099da6a2cb197e5be23a304b2fdb0af5
+b69e893d885e6cd6904e007721e87592
diff --git a/Docs/Configuration.pdf b/Docs/Configuration.pdf
index e734d3a0..30ac4bd1 100644
Binary files a/Docs/Configuration.pdf and b/Docs/Configuration.pdf differ
diff --git a/Docs/Configuration.tex b/Docs/Configuration.tex
index f59ec431..ba4b4eb9 100755
--- a/Docs/Configuration.tex
+++ b/Docs/Configuration.tex
@@ -7064,11 +7064,14 @@ as the value for the following three GUID keys in \texttt{LegacySchema}:
\item 7C436110-AB2A-4BBB-A880-FE41995C9F82
\item 8BE4DF61-93CA-11D2-AA0D-00E098032B8C
\end{itemize}
-This enables all variables saved by \texttt{Launchd.command}, and additionally all arbitrary user
-test variables (e.g. as set by \texttt{sudo nvram foo="bar"}), to be saved to \texttt{nvram.plist}.
-However, once set up, only allowing strictly required variables (as shown in OpenCore's sample
-\texttt{.plist} files) is considerably more secure, and please note the following warning about the
-overall security of loading nvram variables from a non-vaulted file.
+This enables all variables saved by \texttt{Launchd.command} to be saved to \texttt{nvram.plist},
+therefore it allows all arbitrary user test variables (e.g. as set by \texttt{sudo nvram foo=bar})
+to be saved. Using this permissive policy is also future-proof against any changes in the variables
+which need to be passed from macOS update setup to the \texttt{macOS Installer} stage, in order for
+it to succeed.
+Nevertheless, once emulated NVRAM is set up, only allowing known strictly required variables
+(as shown in OpenCore's sample \texttt{.plist} files) is considerably more secure. See also the
+following warning about the overall security of loading NVRAM variables from a non-vaulted file.
\textbf{Warning}: The ability to load NVRAM from a file on disk can be dangerous, as it
passes unprotected data to firmware variable services. Only use when no hardware NVRAM
diff --git a/Docs/Differences/Differences.pdf b/Docs/Differences/Differences.pdf
index 9411db5b..c5662768 100644
Binary files a/Docs/Differences/Differences.pdf and b/Docs/Differences/Differences.pdf differ
diff --git a/Docs/Differences/Differences.tex b/Docs/Differences/Differences.tex
index 40eb6a66..785b2b47 100644
--- a/Docs/Differences/Differences.tex
+++ b/Docs/Differences/Differences.tex
@@ -1,7 +1,7 @@
\documentclass[]{article}
%DIF LATEXDIFF DIFFERENCE FILE
%DIF DEL PreviousConfiguration.tex Wed Jul 27 21:20:07 2022
-%DIF ADD ../Configuration.tex Thu Jul 28 23:20:08 2022
+%DIF ADD ../Configuration.tex Sat Jul 30 08:47:48 2022
\usepackage{lmodern}
\usepackage{amssymb,amsmath}
@@ -7328,11 +7328,14 @@ root }\texttt{\DIFadd{plist\ dictionary}} \DIFadd{type and contain two fields:
}\item \DIFadd{7C436110-AB2A-4BBB-A880-FE41995C9F82
}\item \DIFadd{8BE4DF61-93CA-11D2-AA0D-00E098032B8C
}\end{itemize}
-\DIFadd{This enables all variables saved by }\texttt{\DIFadd{Launchd.command}}\DIFadd{, and additionally all arbitrary user
-test variables (e.g. as set by }\texttt{\DIFadd{sudo nvram foo="bar"}}\DIFadd{), to be saved to }\texttt{\DIFadd{nvram.plist}}\DIFadd{.
-However, once set up, only allowing strictly required variables (as shown in OpenCore's sample
-}\texttt{\DIFadd{.plist}} \DIFadd{files) is considerably more secure, and please note the following warning about the
-overall security of loading nvram variables from a non-vaulted file.
+\DIFadd{This enables all variables saved by }\texttt{\DIFadd{Launchd.command}} \DIFadd{to be saved to }\texttt{\DIFadd{nvram.plist}}\DIFadd{,
+therefore it allows all arbitrary user test variables (e.g. as set by }\texttt{\DIFadd{sudo nvram foo=bar}}\DIFadd{)
+to be saved. Using this permissive policy is also future-proof against any changes in the variables
+which need to be passed from macOS update setup to the }\texttt{\DIFadd{macOS Installer}} \DIFadd{stage, in order for
+it to succeed.
+Nevertheless, once emulated NVRAM is set up, only allowing known strictly required variables
+(as shown in OpenCore's sample }\texttt{\DIFadd{.plist}} \DIFadd{files) is considerably more secure. See also the
+following warning about the overall security of loading NVRAM variables from a non-vaulted file.
}
\textbf{\DIFadd{Warning}}\DIFadd{: The ability to load NVRAM from a file on disk can be dangerous, as it
diff --git a/Docs/Errata/Errata.pdf b/Docs/Errata/Errata.pdf
index 9eb38f8d..02ae0bbb 100644
Binary files a/Docs/Errata/Errata.pdf and b/Docs/Errata/Errata.pdf differ
diff --git a/Include/Acidanthera/Library/OcBootManagementLib.h b/Include/Acidanthera/Library/OcBootManagementLib.h
index 0b09caad..4576098e 100644
--- a/Include/Acidanthera/Library/OcBootManagementLib.h
+++ b/Include/Acidanthera/Library/OcBootManagementLib.h
@@ -1,6 +1,5 @@
/** @file
- Copyright (C) 2019, vit9696. All rights reserved.
- Copyright (C) 2021, Mike Beaton. All rights reserved.
+ Copyright (C) 2019-2022, vit9696, mikebeaton. All rights reserved.
SPDX-License-Identifier: BSD-3-Clause
**/
diff --git a/Library/OcVariableLib/Sip.c b/Library/OcVariableLib/Sip.c
index fc32beac..ab024e27 100644
--- a/Library/OcVariableLib/Sip.c
+++ b/Library/OcVariableLib/Sip.c
@@ -1,7 +1,7 @@
/** @file
Manage Apple SIP variable csr-active-config.
- Copyright (C) 2022, mikebeaton. All rights reserved.
+ Copyright (C) 2021-2022, Mike Beaton. All rights reserved.
SPDX-License-Identifier: BSD-3-Clause
**/