You would have to log the incoming/out coming connections, then trace the ip address back to source. That's if they did it sloppy. Alot of backdoors run on firmware level/kernel level code so unless you have a experienced programmer to diagnose and find it you wouldn't know. If they deleted the logs you wouldn't know at all, and their software is advanced enough to do that as well most likely. Pegasus 2.0 only needs a phone number and they can get into your phone if connected to cellular data. If you want more info on this look up the joe rogan video with the guy who helped trace who hacked Jeff bezos phone, it was the Saudis using an ex mossad Israeli intelligence company that provides it and has been banned already in the U.S. but have still been using it. There is a current lawsuit right now between them and Apple.
You would have to log the incoming/out coming connections, then trace the ip address back to source. That's if they did it sloppy. Alot of backdoors run on firmware level/kernel level code so unless you have a experienced programmer to diagnose and find it you wouldn't know. If they deleted the logs you wouldn't know at all, and their software is advanced enough to do that as well most likely. Pegasus 2.0 only needs a phone number and they can get into your phone if connected to cellular data. If you want more info on this look up the joe rogan video with the guy who helped trace who hacked Jeff bezos phone, it was the Saudis using an ex mossad Israeli intelligence company that provides it and has been banned already in the U.S. but have still been using it. There is a current lawsuit right now between them and Apple.
Why did you write "Alot"? Is it really Apain to put Aspace between words?