Skip to content
Safety · Apr 26, 2026

FBI Extracted Deleted Signal Messages from iPhone Notification Database

Law enforcement was able to recover plaintext copies of Signal messages from an iPhone even after deleting the app, exploiting data preserved in the operating system's notification database rather than breaking Signal's encryption.

Trust66
HypeLow hype

3 sources · cross-referenced

ShareXLinkedInEmail
TL;DR
  • The FBI recovered Signal message previews from an iPhone's internal notification database during a criminal investigation, bypassing app deletion by exploiting where iOS stores notification content.
  • The vulnerability stems from iOS storing message previews in a persistent notification database when Signal's lock-screen notification feature is enabled, not from any flaw in Signal's encryption.
  • Signal already offers a setting to disable message preview display in push notifications; Apple has patched the underlying vulnerability in iOS.

The FBI successfully recovered deleted Signal messages from an iPhone by accessing data stored in the device's internal notification database, according to reporting on a legal case. The messages had been deleted from the Signal app itself, but copies of incoming message previews persisted in a lower-level iOS system database that handles push notifications. This forensic extraction was possible because Signal's default configuration allows message content and sender information to display in lock-screen notifications, and iOS automatically archives these notification previews in persistent storage that forensic tools can access.

The recovery method did not compromise Signal's end-to-end encryption or break the messaging protocol. Instead, it exploited the fact that notification content—before being displayed to the user—exists temporarily in plaintext within the operating system. Once Signal generates a notification preview for display, the iOS system independently stores that preview data. A device with physical access and forensic tools can then recover these artifacts, even if the user later deletes the Signal app. The case underscores a longstanding security principle: encrypted messaging is only as secure as the device it runs on.

Signal has long offered a setting to prevent message previews from appearing on lock screens, eliminating the plaintext notification that iOS would store. Following disclosure of the case, Apple released a patch that removes the notification database vulnerability entirely. The incident highlights the importance of both application-level settings and device-level security posture for users seeking to protect sensitive communications from forensic recovery.

Sources
  1. 01404 MediaFBI Extracts Suspects' Deleted Signal Messages Saved in iPhone Notification Database
  2. 02TechCrunchApple Fixes Bug That Cops Used to Extract Deleted Chat Messages from iPhones
  3. 039to5MaciOS 26.4.2 Fixes Bug That Allowed Deleted Notifications to Be Retrieved
Also on Safety

Stories may contain errors. Dispatch is assembled with AI assistance and curated by human editors; despite the trust-score filter, mistakes happen. We correct publicly — every article links to its revision history. Nothing here is financial, legal, or medical advice. Verify before relying on any claim.

© 2026 Dispatch. No ads. No sponsorships. No paid placement. Reader-supported via Ko-fi.

Built by a person who cares about honest AI news.