Boon Hong Wong wrote:
Lookout app - https://itunes.apple.com/sg/app/lookout-security-backup-missing/id434893913?mt=8
Lookout claims that iOS 9.3.5 does not uninstall or detect Pegasus on previously infected devices - https://www.lookout.com/
While I see no point to the app, I would point out that Lookout Inc was one of the companies that originally identified the operating system exploits that allowed the Trident exploit to work. They reportedly worked with Apple itself to identify the issues (validation issues and memory utilization issues) that were patched with iOS 9.3.5. The iOS patch fixes those kernel exploits so the operating system exploits that allow pegasus and Trident to work no longer exist. So even if some Pegasus code remained on the device, it can no longer function in iOS 9.3.5.
iOS 9.3.5 never claimed to seek, identify nor remove any malicious code. It does fix the operating system exploits that allowed the code to run and work. With those exploits patched, the malicious code itself is useless and cannot function.
As for the jailbreak, that could only have happened if someone had complete unrestricted physical access to your device for some period of time to install the j/b. If you erase all content and settings, or restore as new in iTunes, or remote wipe it with iCloud, it should be removed. You would then have to set up the device anew. If you restore from a backup, you may simply re-apply the jailbreak.