fxnn please see
https://m.youtube.com/watch?v=Fsh5JcK5F4k&pp
TLDR : pegasus is a zero click exploit, NSO keeps on envolving it and keeps on changing to adapt to the environtment. It's a constant chess game.
At the end of the day, we can only speculate about it's capability.
And the most important thing is how to mitigate the risk
Like Sun Tzu said "If a battle can't be won don't fight it" and then we have to change rules of the game
AFAIK the only easy way to win this battle is with using multiple device for different purpose. Using different identity, operating system, account, email, network, behaviour, etc then keep it seperate and do not intersect.
You must protect your attribution (identity) at all cost
Disclaimer, this is just sharing my thought
For example, If you are a journalist, you can keep using iphone as public persona or decoy device for public usage subject for surveillance.
And then you must have secret secondary device like Graphene OS for sensitive use only (no simcard, no wifi wired only, always airplane modes) with seperated identity
To be noted don't use whatsapp, it is closed software, no one could verified the source code, don't use email, it's by design not secure. Only do comms with something like simpleX with TOR proxy, becuse it protect your metadata.
The point is you should protect your attribution (sensitive device) at first place, so they did not even realize it is exist with you