OK, fun and games!
Based on all this technical information and much confusion, I have a draft for wiki entries below. This allows for Qubes-Whonix users to either:
a) install a standard dispVM Whonix-WS template;
b) install an optional dispVM Whonix-WS template with hardcoded changes for the hardened Tor Browser;
c) steps to create a customized dispVM Whonix-WS; and
d) steps to maintain dispVM images so the Tor Browser is up-to-date, whether it is the standard or hardcoded version.
Correct my text where I’m wrong - which I surely will be. 
I’ve just tested this procedure for the hardcoded (hardened) Tor Browser and customized dispVM changes, and it works fine except customized changes are never maintained.
It doesn’t matter if I run the touch command before or after using the Tor Browser, any changes are not maintained. Can someone in Qubes 3.2 please try it and see if it works for you.
There is no reason it should work for entr0py in 3.1, and not work in 3.2.
Below, I have just focused on steps required i.e. ‘do this’, ‘then do this’, because most users simply don’t care about the technical reasons involved, they just want a working solution.
Initial creation of the dispVM (Whonix-WS) in Qubes 3.2
Note: existing dispVMs will be based on the Fedora-23 or Fedora-24 template
1) Delete any existing instances of your dispVM
Qubes VM Manager -> View -> Show/Hide Internal VMs
Right click on the template ending in “-dvm”
Select “Remove VM”
2) OPTIONAL STEP - For users defaulting to the hardened Tor Browser series only
Note: Hardcoding of the tb-updater version is required
Special note for hardened Tor Browser users: Using this method means the user will potentially be at risk for a day or two following a Tor Browser security update. The alpha updates always come later than the stable release.
A) Open Konsole in the Whonix-WS TemplateVM
Left click on Qubes 3.2 ‘Q’ icon -> Select Template: whonix-ws -> Select Konsole
B) Create a user configuration file
Whonix 13:
sudo nano /etc/torbrowser.d/50_user.configuration
Whonix 14:
sudo nano /etc/torbrowser.d/50_user.configuration
OR
sudo nano /rw/config/torbrowser.d/50_user.conf
C) Set tbb version to hardened
tbb_version=“6.5a5-hardened”
D) Save file
Ctrl + X
E) Update the Whonix-WS TemplateVM
sudo apt-get update && sudo apt-get dist-upgrade
F) Run the Tor Browser Downloader in the Whonix-WS TemplateVM
Left click on Qubes 3.2 ‘Q’ icon -> Select Template: whonix-ws -> Run ‘Tor Browser Downloader’*
Note: If this option does not appear in the menu, add it to the menu with ‘Add more shortcuts…’ option
G) Check the Tor Browser signature
DO NOT install the Tor Browser unless the signature and subkey matches those below:
pub 4096R/0x4E2C6E8793298290 2014-12-15 [expires: 2020-08-24]
Key fingerprint = EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
uid Tor Browser Developers (signing key) torbrowser@torproject.org
sub 4096R/0x2E1AC68ED40814E0 2014-12-15 [expires: 2017-08-25]
sub 4096R/0x7017ADCEF65C2036 2014-12-15 [expires: 2017-08-25]
sub 4096R/0xD1483FA6C3C07136 2016-08-24 [expires: 2018-08-24]
3) Create the dispVM based on the Whonix-WS TemplateVM
A) Open a terminal in dom0
Left click on Qubes 3.2 ‘Q’ icon -> Select System Tools -> Xfce Terminal
B) Create the disp-VM
Run the commands:
qvm-create-default-dvm whonix-ws
exit
4) Confirm the netVM is set to sys-whonix
Qubes VM Manager -> View -> Show/Hide Internal dispVMs
Right click on “Whonix-WS-dvm”
Select “VM Settings”
NetVM should be using sys-whonix. Change it if that is not the case.
5) Check the disp-VM based on Whonix-WS works
Left click on Qubes 3.2 ‘Q’ icon -> Select DisposableVM -> xterm
Run the command:
torbrowser
6) Check Tor Browser version is correct
In the url tab, enter about:tor -> press enter
Check the Tor Browser instance either shows “6.0.7” or “6.5.a5-hardened” and matches the version you just installed.
Customization of the dispVM (Whonix-WS) in Qubes 3.2
Note: This step is OPTIONAL and is only required if you wish to store bookmarks, changes to add-on settings, maintain updates to the Tor Browser using the browser’s internal updater, and other unique changes.
1) Launch Konsole (Terminal) in the dispVM
Two methods are available to do this:
Left click on Qubes 3.2 ‘Q’ icon -> Select DisposableVM -> xterm
OR
Left click on the Qubes 3.2 ‘Q’ icon -> Select System Tools -> Xfce Terminal and run the command:
qvm-run -a whonix-ws-dvm xterm
2) Create a customized file path
Enter the command:
touch /home/user/.qubes-dispvm-customized
3) Make changes you wish to persist in the dispVM
Note: this usually relates to bookmarks, add-on updates, the privacy slider, javascript settings, search engine preferences, and minor Tor Browser updates you wish to persist
A) Run Tor Browser with the command:
torbrowser
B) Make changes as required and/or run the Tor Browser internal updater:
Select the green onion -> “Check for Tor Browser update…”
4) Close the Tor Browser
5) Shutdown the dispVM
6) Recreate the whonix-ws dispVM
A) Open a terminal in dom0
Left click on Qubes 3.2 ‘Q’ icon -> Select System Tools -> Xfce Terminal
B) Re-create the disp-VM
Run the commands:
qvm-create-default-dvm whonix-ws
exit
7) Check all of your changes are now persistent
Keeping your dispVM (Whonix-WS) image up to date
Important: If you DID NOT customize your dispVM to allow changes to be maintained, this means your dispVM private image WILL NOT CONSISTENTLY run the updated Tor Browser when subsequent releases become available. That is, your manual updates from within the dispVM will be lost after each session.
These steps must be followed after each major TBB release or minor update.
1) OPTIONAL STEP - Users who hardcoded their TBB version
Update your config file to show the latest hardened Tor Browser release. For example:
A) Open Konsole in the Whonix-WS TemplateVM
Left click on Qubes 3.2 ‘Q’ icon -> Select Template: whonix-ws -> Select Konsole
B) Edit the user configuration file
Whonix 13:
sudo nano /etc/torbrowser.d/50_user.configuration
Whonix 14:
sudo nano /etc/torbrowser.d/50_user.configuration
OR
sudo nano /rw/config/torbrowser.d/50_user.conf
C) Set tbb version to the latest hardened version, for example:
tbb_version=“6.5a6-hardened”
D) Save file
Ctrl + X
2) Update the Whonix-WS TemplateVM
Run Konsole in the Whonix-WS TemplateVM
Run the command:
sudo apt-get update && sudo apt-get dist-upgrade
3) Re-create the dispVM based on the updated Whonix-WS TemplateVM
A) Open a terminal in dom0
Left click on Qubes 3.2 ‘Q’ icon -> Select System Tools -> Xfce Terminal
B) Re-create the disp-VM
Run the commands:
qvm-create-default-dvm whonix-ws
exit
4) Confirm the netVM is still set to sys-whonix
Qubes VM Manager -> View -> Show/Hide Internal dispVMs
Right click on “Whonix-WS-dvm” -> Select “VM Settings”
NetVM should be using sys-whonix. Change it if that is not the case.
5) Check the disp-VM based on Whonix-WS works
Left click on Qubes 3.2 ‘Q’ icon -> Select DisposableVM -> xterm
Run the command:
torbrowser
6) Check the Tor Browser version is correct
In the url tab, enter:
about:tor
Check the Tor Browser instance matches the updated version you just installed.