How could one effectively remove all backdoor installed on a device

Let's say hypothetically a state and federal character installed a backdoor on a laptop how could one reasonably remove all trace of it and considering the internet was likely breached as well is it possible to remove it from that as well or is that not really possible except for a Internet company?

submitted by /u/Such_Investigator184
[link] [comments]

from hacking: security in practice https://ift.tt/L7VZ4Ds

Comments