FBI Extracts Deleted Signal Messages from iPhone Notification Database, Raising Encryption Questions

Available in: 中文
2026-04-09T16:37:53.594Z·1 min read
The FBI has successfully extracted Signal messages from a defendant iPhone by accessing the phone notification database, where incoming message content was viewable even after the Signal app was de...

FBI Extracts Suspect Deleted Signal Messages from iPhone Notifications

The FBI has successfully extracted Signal messages from a defendant iPhone by accessing the phone notification database, where incoming message content was viewable even after the Signal app was deleted, according to an investigation by 404 Media.

How It Works

Signal is widely considered one of the most secure messaging apps, offering end-to-end encryption. However, the exploit does not break Signal encryption itself:

  1. Notification previews: By default, iOS displays message previews in notifications
  2. Notification database: iOS stores notification content in a system database that persists even after the app is deleted
  3. No encryption required: Since the notification database is a system-level iOS feature, it is accessible to anyone with device access

The Implications

This is not a Signal vulnerability but a platform-level issue:

What Users Should Do

Signal users can protect themselves by:

Broader Impact

This case highlights a fundamental tension in security: the strongest end-to-end encryption is useless if the plaintext is exposed at the notification layer. The lesson applies to all encrypted messaging apps, not just Signal.

Source: 404 Media / The Verge — April 9, 2026

↗ Original source · 2026-04-09T10:00:00.000Z
← Previous: Ubuntu 26.04 Raises Minimum RAM Requirement to 6GB: A Wake-Up Call for Desktop LinuxNext: Canva Acquires AI Agent Platform Simtheory and Marketing Automation Company Ortto →
Comments0