I analyzed my iPhone for the Pegasus spyware... - How-To Guide
censiCLICK
► Support the channel on Patreon: https://www.patreon.com/censiclick ► Paypal: https://www.paypal.me/censiclick ► Twitter: https://twitter.com/CensiClick ► Odysee channel: https://odysee.com/@censiCLICK:3 (or use the invite link https://odysee.com/$/invite/@censiCLICK:3) ► Music by Epidemic Sound (referral link): https://www.epidemicsound.com/referral/3308ry/
Commands from the video: brew install git python3 libusb git clone https://github.com/mvt-project/mvt.git cd mvt pip3 install . mvt-ios decrypt-backup -p 'password_of_backup' -d 'path_to_output_folder' 'path_to_encrypted_backup/123SomeRandomID456' history -p git clone https://github.com/AmnestyTech/investigations.git mvt-ios check-backup -i 'path_to_pegasus.stix2' -o 'output_folder' 'path_to_decrypted_backup'
This video shows step-by-step how to analyze your iPhone with open-source forensic software from Amnesty International for certain spyware like the recently discovered Pegasus, that was used against journalists, activists and politicians. This tutorial was recorded on macOS with Homebrew in Terminal, but it would also work on Linux.
» Sources « Massive data leak reveals Israeli NSO Group's spyware used to target activists, journalists, and political leaders globally: https://www.amnesty.org/en/latest/news/2021/07/the-pegasus-project/ The Pegasus Project: https://www.theguardian.com/news/series/pegasus-project Homebrew: https://brew.sh Mobile Verification Toolkit on Github: https://github.com/mvt-project/mvt Mobile Verification Toolkit Documentation: https://mvt.readthedocs.io/en/latest/ iPhones selbst auf Pegasus und andere Spyware prüfen: https://www.heise.de/hintergrund/iPhones-selbst-auf-Pegasus-und-andere-Spyware-pruefen-6143960.html
» Credits « Stock footage by Videezy.com Stock footage by Videvo, downloaded from Videvo.net ... https://www.youtube.com/watch?v=iLOSlHhGI9U
61830402 Bytes