FBI Extracted Deleted Signal Messages from iPhone Notification Database
Law enforcement was able to recover plaintext copies of Signal messages from an iPhone even after deleting the app, exploiting data preserved in the operating system's notification database rather than breaking Signal's encryption.
3 sources · cross-referenced
- The FBI recovered Signal message previews from an iPhone's internal notification database during a criminal investigation, bypassing app deletion by exploiting where iOS stores notification content.
- The vulnerability stems from iOS storing message previews in a persistent notification database when Signal's lock-screen notification feature is enabled, not from any flaw in Signal's encryption.
- Signal already offers a setting to disable message preview display in push notifications; Apple has patched the underlying vulnerability in iOS.
The FBI successfully recovered deleted Signal messages from an iPhone by accessing data stored in the device's internal notification database, according to reporting on a legal case. The messages had been deleted from the Signal app itself, but copies of incoming message previews persisted in a lower-level iOS system database that handles push notifications. This forensic extraction was possible because Signal's default configuration allows message content and sender information to display in lock-screen notifications, and iOS automatically archives these notification previews in persistent storage that forensic tools can access.
The recovery method did not compromise Signal's end-to-end encryption or break the messaging protocol. Instead, it exploited the fact that notification content—before being displayed to the user—exists temporarily in plaintext within the operating system. Once Signal generates a notification preview for display, the iOS system independently stores that preview data. A device with physical access and forensic tools can then recover these artifacts, even if the user later deletes the Signal app. The case underscores a longstanding security principle: encrypted messaging is only as secure as the device it runs on.
Signal has long offered a setting to prevent message previews from appearing on lock screens, eliminating the plaintext notification that iOS would store. Following disclosure of the case, Apple released a patch that removes the notification database vulnerability entirely. The incident highlights the importance of both application-level settings and device-level security posture for users seeking to protect sensitive communications from forensic recovery.
- Apr 24, 2026 · TechCrunch — AI
Delve's security certifications failed to prevent breaches at multiple customers
Trust57 - Apr 22, 2026 · MIT Technology Review — AI
AI is lowering barriers for cybercriminals while defenses race to catch up
Trust52 - Apr 21, 2026 · TechCrunch
Clarifai deletes 3 million OkCupid photos following FTC settlement over unauthorized facial recognition training
Trust65