If you’ve ever wondered whether someone (or something) is snooping around in your phone, you’re not alone. With the Mobile Verification Toolkit (MVT), you can finally play detective and see if your device has been compromised. Developed by Amnesty International’s Security Lab in the wake of the Pegasus Project, this tool is here to give you peace of mind—or at least let you know if it’s time to switch devices.
In this guide, I’ll walk you through a step-by-step setup of MVT for both Android and iOS devices using your phone, with some handy tips and humor along the way to make it feel a bit less like you’re working in a forensics lab. Let’s jump in!
What Exactly Is MVT?
The Mobile Verification Toolkit (MVT) is a forensic tool that helps you analyze your device (Android or iOS) for potential signs of compromise. It’s designed for consensual (meaning, please don’t use this on your friend’s phone without asking) analysis, so you can make sure you’re secure without breaching anyone else’s privacy.

MVT is particularly handy for spotting traces of spyware, and it’s been maintained by Amnesty International, so you know it’s legit.
Step 1: Prepare Your Phone for MVT (Like a Pro)
Before diving in, take a deep breath. This process isn’t too complex, but it helps if you’re familiar with the basics of connecting your phone to a computer. If you’re ready:
- Back Up Your Phone: No one likes data loss, and we’re about to start a process that will involve forensic-level analysis, so do yourself a favor and back up your phone just in case.
- Get a Computer Ready (Sorry, We Need One): While we’re doing most of this for your phone’s sake, we actually need a computer to run the tool. It could be Windows, Mac, or Linux. Whatever works for you, so long as it’s functional and has some free space.
Step 2: Install the Prerequisites
To run MVT, we need a few prerequisites on your computer. Here’s what to do:
- Install Python: MVT uses Python, so you’ll need to have it installed. Go to python.org and download the latest version (3.x). Make sure to check the box that says “Add Python to PATH” before hitting install.
- Install pip and Git: These are tools for managing Python packages and downloading files from GitHub. If you’re on a Mac, you’re probably all set. For Windows, follow the official instructions for setting up
pipandGit. - Download MVT from GitHub: Head over to MVT’s GitHub page, and download the toolkit. Make sure to unzip it in a convenient folder—you’re going to need it soon!
Step 3: Install MVT and Required Packages
Once everything is downloaded, open up your terminal (or Command Prompt if you’re on Windows) and type:
bashCopy codepip install -r requirements.txt
This command tells Python to install everything MVT needs to run. You might need to wait a few seconds—go grab a coffee, you deserve it.
Step 4: Connect Your Device and Enable Developer Mode (Just This Once)
If you’re using an Android device, you’ll need to enable Developer Mode. Here’s how:
- Go to Settings > About Phone and tap Build Number seven times. Congrats, you’re a developer now!
- Go to Developer Options and enable USB Debugging.
For iOS devices, it’s a bit simpler. Just make sure you have a recent iTunes backup of your device on your computer (MVT will analyze this backup for any suspicious activity).
Step 5: Run MVT on Your Device
Now we’re ready to run MVT and see if there’s anything suspicious going on. Let’s break it down by device:
For Android:
- Open your terminal and run:bashCopy code
mvt-android check-adb --output /path/to/your/output/folderReplace/path/to/your/output/folderwith the path where you want to save your results. - The tool will scan through the device, looking for known signs of compromise.
For iOS:
- In your terminal, run:bashCopy code
mvt-ios decrypt-backup -p /path/to/your/backup -o /path/to/your/output/folderThis will analyze your iTunes backup to see if anything’s off.
Step 6: Interpreting Results Like a Pro
When the scan is complete, MVT will give you an output with various flags, which indicate whether your device has traces of compromise. Here’s a quick breakdown:
- Green flags: Your phone seems to be in the clear.
- Yellow flags: Something unusual, but it’s likely not a threat.
- Red flags: Alarms may start ringing, as these could be indicators of compromise.
If you do find red flags, don’t panic. MVT is very thorough, and sometimes these can be false positives. That said, if you see any clear indicators of spyware, it might be time to take your device to a professional or reset your phone.
Quick Tips and Warnings
- Humor yourself through it: This process might feel a bit intense, but remember, you’re doing it for peace of mind. So, if things look overly complicated, take a deep breath, grab some popcorn, and keep going. You’ve got this.
- Stay Informed: MVT is just one part of staying secure. Make sure your apps are updated, avoid shady links, and keep an eye on app permissions.
- Backup Regularly: Running forensic scans like this doesn’t risk data loss, but it’s always a good habit to keep backups for moments like these!
And there you have it! You’re now equipped with the Mobile Verification Toolkit, ready to defend your device like a cybersecurity pro. Whether you found something suspicious or your phone got a clean bill of health, give yourself a pat on the back—you’ve taken an important step towards securing your data.

Leave a comment