diff --git a/src/pages/developers/architecture/privileged.mdx b/src/pages/developers/architecture/privileged.mdx
index 5cec4dae..685616a2 100644
--- a/src/pages/developers/architecture/privileged.mdx
+++ b/src/pages/developers/architecture/privileged.mdx
@@ -19,14 +19,14 @@ policy account has an admin, an address and a decision policy (threshold of
votes, voting period, etc.).
The group mechanism on ZetaChain is powered by the [`group` Cosmos SDK
-module](https://docs.cosmos.network/v0.46/modules/group/).
+module](https://docs.cosmos.network/v0.50/modules/group/).
ZetaChain can have any number of groups. Anyone can create a group. In this
document we only consider policy accounts that give authorization to perform
privileged actions.
These "special" policy accounts are defined in the [params of of the observer
-module](https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/observer/params).
+module](https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/policies).
These policy accounts are set during genesis and as any module parameter they
can be changed through governance. This is important, because even though the
protocol has a notion of admins and privileged policy accounts, they are chosen
@@ -40,11 +40,11 @@ module documentation and look for "Authorized" notice next to each message.
{" "}
- Notice that policy accounts below are called "Group1" and "Group2". These are just names that indicate the level of permissions
- and are not related to the actual groups associated with policy accounts. As you can see in testnet there are two entries
- ("Group1" and "Group2") and both point to the same policy account. This means that right now even though there are two
- levels of permissions ("Group1" and "Group2") there is only one policy account that is authorized to perform privileged
- actions. On mainnet this might change.{" "}
+ Notice that policy accounts below are called "groupEmergency", "groupOperational", "groupAdmin". These are just names that indicate the level of
+ permissions and are not related to the actual groups associated with policy accounts. As you can see in testnet there are three entries
+ that both point to the same policy account. This means that right now even though there are three
+ levels of permissions ("groupEmergency", "groupOperational", "groupAdmin") there is only one policy account that is authorized to perform
+ privileged actions. {" "}