diff --git a/phone_privacy_and_security/pres.pdf b/phone_privacy_and_security/pres.pdf
index 3913397261359407bc3d4bc2189b10013d7c2011..8cc4ef420f7db0b27a2c04d6e6b24b99afde543c 100644
Binary files a/phone_privacy_and_security/pres.pdf and b/phone_privacy_and_security/pres.pdf differ
diff --git a/phone_privacy_and_security/pres.tex b/phone_privacy_and_security/pres.tex
index 1c8832109de16bbcbe1d1b4227ab89304eb2aed9..d6685d441b2f625ddc4585c6b30da6e9cd72fb4f 100755
--- a/phone_privacy_and_security/pres.tex
+++ b/phone_privacy_and_security/pres.tex
@@ -110,6 +110,7 @@ Outline
 \begin{itemize}
 \item Threat models
 \item Apps \& Services overview
+\item Miscellaneous
 \item Conclusion \& Links
 \end{itemize}
 \pause
@@ -187,24 +188,6 @@ probably going to have to do it {\color{red}gradually}.
 }
 
 
-{
-\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
-\begin{frame}[plain]
-\begin{slidetitle}
-Threat models
-\end{slidetitle}
-\begin{slidecontent}
-\begin{itemize}
-\item Threat models are THE most important aspect of (cyber)security.
-\item Without a proper threat model the info you read online will seem
-contradictory.
-\item It {\color{red}is} possible to improve your (cyber)security: only you are
-probably going to have to do it {\color{red}gradually}.
-\end{itemize}
-\end{slidecontent}
-\end{frame}
-}
-
 {
 \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
 \begin{frame}[plain]
@@ -250,8 +233,6 @@ to say how to mitigate them.
 }
 
 
-
-
 {
 \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background2.png}}
 \begin{frame}[plain]
@@ -263,10 +244,6 @@ Apps \& services overview
 }
 
 
-
-
-
-
 {
 \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
 \begin{frame}[plain]
@@ -577,6 +554,8 @@ How to install a new OS
 \item[{\color{black}2.}] Unlock the bootloader
 \item[{\color{black}$\frac{5}{2}$.}] Flash Google Apps (Gapps)
 \item[{\color{black}3.}] Flash the OS
+\pause
+\item You can find more details online.
 \end{itemize}
 \end{slidecontent}
 \end{frame}
@@ -625,12 +604,24 @@ Life without Gapps
 perhaps only Monero.} anonymous option anyway).
 \item Usually the apps that break aren't privacy-respecting anyway. Sometimes
 only the privacy-ignoring part doesn't work (Uber).
+\item Banking apps won't work!
 \end{itemize}
 \end{slidecontent}
 \end{frame}
 }
 
 
+{
+\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background2.png}}
+\begin{frame}[plain]
+\centering
+\vspace*{4cm}
+\Huge
+Miscellaneous
+\end{frame}
+}
+
+
 {
 \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}}
 \begin{frame}[plain]
@@ -662,7 +653,38 @@ Linux phones
 \end{slidetitle}
 \begin{slidecontent}
 \begin{itemize}
-\item They are not there yet, wait like 5 years.
+\item PinePhone, FairPhone, Librem 5
+\item They are missing crucial functions, wait like 5 years.
+\item People from The Alternative have direct experience (so contact us if interested :) ).
+\end{itemize}
+\end{slidecontent}
+\end{frame}
+}
+
+
+{
+\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}}
+\begin{frame}[plain]
+\begin{slidetitle}
+Pegasus (spyware)
+\end{slidetitle}
+\begin{slidecontent}
+\begin{itemize}
+\item A~spyware developed by Israel.
+\item They most likely sell it to the highest bidder (or there are other, similar pieces of SW).
+\item „Zero-click” attacks
+\begin{itemize}
+\item You can't know if you have it.
+\item Reads input/output directly, so bypasses e2e.
+\item There is no defence against it, since it uses zero-day vulnerabilities.
+\end{itemize}
+\item Luckily only targets high-profile individuals.
+\item When in doubt:
+\begin{itemize}
+\item[{\color{black} 1.}] don't use your phone for „problematic”  things,
+\item[{\color{black} 2.}] factory reset your phone regularly.
+\end{itemize}
+\item \url{https://www.theguardian.com/news/series/pegasus-project}
 \end{itemize}
 \end{slidecontent}
 \end{frame}
@@ -670,6 +692,7 @@ Linux phones
 
 
 
+
 {
 \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
 \begin{frame}[plain]
@@ -710,5 +733,40 @@ Resources
 }
 
 
+{
+\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
+\begin{frame}[plain]
+\begin{slidetitle}
+Genocide on trans people
+\end{slidetitle}
+\begin{slidecontent}
+\begin{itemize}
+\item ``Several states have gone even further, considering measures that would make providing trans-affirming health care to minors illegal.'' \url{https://www.vox.com/first-person/22977970/anti-trans-legislation-texas-idaho}
+\item Missouri lawmakers consider extending proposed ban on gender-affirming care to adults
+\url{https://tinyurl.com/4d2b3v9u}
+\item Listen to trans people online, e.\,g. Jim Stephanie Sterling:
+\url{https://twitter.com/JimSterling/status/1501589325070409728}
+\item Sidenote, history of men-only sports: \url{https://twitter.com/shereebekker/status/1504899936843935746?t=aTMLRbpw1AtL7AeDZUN-OA&s=19}
+\end{itemize}
+\end{slidecontent}
+\end{frame}
+}
+
+{
+\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
+\begin{frame}[plain]
+\begin{slidetitle}
+Genocide on trans people
+\end{slidetitle}
+\begin{slidecontent}
+\begin{itemize}
+\item Engels on social murder:
+``When one individual inflicts bodily injury upon another such that death results, we call the deed manslaughter; when the assailant knew in advance that the injury would be fatal, we call his deed murder. But when society places hundreds of [people] in such a position that they inevitably meet a too early and an unnatural death, [...] when it deprives thousands of the necessaries of life, places them under conditions in which they cannot live – forces them, through the strong arm of the law, to remain in such conditions until that death ensues which is the inevitable consequence – [...] and yet permits these conditions to remain, its deed is murder just as surely as the deed of the single individual; disguised, [...] because no man sees the murderer, because the death of the victim seems a natural one, since the offence is more one of omission than of commission. But murder it remains.''
+\end{itemize}
+\end{slidecontent}
+\end{frame}
+}
+
+
 
 \end{document}