0xsigsev If your phone would be hacked I can guarantee you would not notice it.
Depends on. If you are an attractive target, you will know, because your sensitive information will leak, or your important files will be destroyed. That is, you will be doxxed if you get hacked, even if the hacker did not specifically target you. But you might not know exactly when the compromise happened, only learn about it a few days or weeks later.
gk7ncklxlts99w1 What happened that made you suspect your phone had been compromised, and what steps did you take to mitigate it? Was it something small, or something obvious?
For my phone, I have not had any suspicion of attempt at hacking me. I still clear data and cache for Tor Browser and Vanadium once every month or every second month, just as a precaution. Those apps are the most likely for me to get compromised, since used to visit only marginally trusted or entirely untrusted websites. The idea for clearing cache and data is in case app has been compromised, but no sandbox escape has been possible, yet. Clearing data should be enough to evict the attacker in that case.
For my laptop, there have been cases where I have reacted. One thing that caused me to strongly suspect a hacking attempt against Tor Browser running in one of my Whonix virtual machine in QubesOS, was that the web browser crashed within a second of opening a totally untrusted site I never visited before, and a popup talking about memory violation detected popped up. Crashes might be innocent, but can also be indicative of someone trying to hack you, as it is common things do crash during hacking attempts. I immediately nuked that virtual machine, are recreated it from scratch, restoring all files from backup. I also changed all passwords for accounts I used in that virtual machine. Needless to say, I did not have anything compromising in that virtual machine, as I do compartmentalize my life into security domains.
I also recreate or reinstall things regularly after some general sense of "having been exposed too much". Just in case. But apps, profiles and virtual machines that are only used for highly trusted things I basically never recreate, since they aren't really getting any exposure. It is unlikely any hacking attempts have been made.