After trying out the Mobile Verification Toolkit, provided by Amnesty International Security Lab, to find indications of compromise with Pegasus and similar spyware on the phone I got this bedtime vision:
What if known indicators of compromise could be found within GrapheneOS per default?
I live in Sweden and authorities now gets permission to tap and collect information electronically without direct suspicion of crime. In other words you can know, be related to or work with someone that is a suspect and be targeted because of that. It used to be regulated to suspicion of a crime giving 2 or more years prison penalty for compromising the microphone and 5 or more years for compromising camera and microphone (if I remember the exact figures correct).
Source: https://www.svt.se/nyheter/inrikes/rikspolischefen-over-30-gripna-med-hjalp-av-ny-avlyssningslag
This whole topic is very scary in regards to personal integrity and human rights. The process to check your phone is a bit complicated for a non technical person, hence this whole idea.
Forensic indicators for Pegasus and other zero clicks identified on Android and iOS can be found here:
https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/
Mobile Verification Toolkit and other tools and guides can be found here:
https://securitylab.amnesty.org/tools-and-guides/
The GitHub project with MVT, Android Quick Forensics and known indicators can be found here:
https://github.com/mvt-project/
I have been trying MVT in Debian on a Pixel 6 Pro with GOS "for fun". I came out clean :)
Thoughts?