In a recent case, the FBI managed to recover copies of incoming Signal messages from a defendant's iPhone—even after the app had been deleted—because the device's push notification database retained the message content. This incident, first reported by 404 Media, highlights how forensic extraction techniques can uncover sensitive data from secure messaging apps in unexpected places. Below, we answer key questions about this discovery and what it means for your privacy.
1. How did the FBI extract deleted Signal messages from the iPhone?
The FBI used forensic extraction software after gaining physical access to the defendant's iPhone. This specialized software accessed the device's internal push notification database, which had stored copies of Signal message previews. Even though the Signal app itself was deleted from the phone, the notification logs remained in the database because iOS routinely saves push notification content for display on the lock screen. The extracted data included message text and sender information that had been delivered via Apple's push notification service while the app was still installed.

2. What is the role of push notifications in this security lapse?
Push notifications on iPhones can display message previews directly on the lock screen or in the notification center. When Signal sends an incoming message, iOS receives the notification content—including the message body—and stores it temporarily in the notification database. If the user has enabled message previews in Signal's settings, the notification will contain the full text. Even after the user deletes the Signal app, the database records persist until manually cleared or overwritten. This is how the FBI was able to recover message content that users assumed was gone.
3. Does this vulnerability affect all iPhone users, or only those with certain settings?
This vulnerability primarily affects iPhone users who have enabled message previews in the Signal app's notification settings. Signal already offers a feature that blocks message content from appearing in push notifications. If a user turns off "Show Previews" in Signal's notification settings, only the sender's name (or no preview) will appear, and the notification database will not store the message text. However, even with previews off, some metadata like timestamps might still be logged. For maximum privacy, users should also consider disabling lock screen notifications entirely.
4. Has Apple addressed this security issue?
Yes, Apple patched this vulnerability in late April 2024, according to reports. The patch likely changes how iOS stores notification data, making it harder for forensic tools to extract message content from deleted apps. However, it's important to note that the patch may only prevent future extractions for users who update their operating system. Older iOS versions remain vulnerable, and the fix does not retroactively secure previously stored notification logs. Users are advised to keep their devices updated to the latest iOS version for optimal security.

5. What steps can Signal users take to protect their message privacy?
Signal users can take several precautions to minimize the risk of forensic extraction from notification databases:
- Disable message previews in Signal's notification settings: Go to Signal > Settings > Notifications > Show > No Name or No Preview.
- Turn off lock screen notifications entirely to prevent any content from being visible when the phone is locked.
- Clear notification history regularly by going to iPhone Settings > Notifications > Show Previews (set to Never) or by manually dismissing all notifications.
- Enable disappearing messages in Signal so that messages self-delete after a set time, reducing the window of exposure.
Combining these settings greatly reduces the amount of sensitive data stored in notification logs.
6. What does this case mean for the security of encrypted messaging apps in general?
This case underscores a fundamental challenge: even end-to-end encrypted apps like Signal are only as secure as the device they run on. While the content of messages is encrypted in transit and at rest within the app, operating system features like push notifications can create unintended data copies. Any app that displays message previews in notifications on iOS or Android could theoretically be vulnerable to similar forensic extraction. Users who require high privacy should therefore consider not only the app's encryption but also device-level settings, such as disabling lock screen notifications and using full-disk encryption, to protect against physical access attacks.