FBI used iPhone notification data to retrieve deleted Signal messages
What actually happened (per thread)
- iOS keeps an internal SQLite/plist database of delivered notifications.
- Signal’s push via APNs/FCM is effectively empty; it just wakes the app.
- The Signal app then fetches the encrypted message, decrypts it locally, and creates a system notification.
- iOS stores the resulting preview text unencrypted in its notification database, which persisted even after Signal was uninstalled and messages deleted in‑app.
- Forensics tools accessed that database on an unlocked iPhone and recovered incoming Signal message content.
Who is “at fault”?
- One camp: this is entirely an OS issue; Signal sends encrypted/empty pushes, iOS decides to store plaintext previews.
- Another camp: Signal markets itself as “secure,” so defaults that leak plaintext via notifications are bad design, regardless of OS behavior.
- Several note that many apps are affected, not just Signal.
Defaults, usability, and threat models
- Signal allows configuring notification content: full preview, name only, or neither.
- There’s disagreement over what the default actually is, but multiple users report that name+content will be shown unless changed.
- Critics argue a “secure by default” messenger should minimize leaked data and only show “new message” by default.
- Others stress tradeoffs: most users expect rich notifications and rarely change settings; too strict defaults hurt adoption.
Platform behavior and persistence
- iOS: notification previews are cached in an internal DB, seemingly not wiped when swiped away or when the app is removed; Apple could in principle tie this to per‑app keys or delete on uninstall, but apparently does not.
- Android: also has notification history features (often opt‑in) and third‑party “notification log” apps; some ROMs let you disable history entirely.
Limits of end‑to‑end encryption / OPSEC
- Multiple comments stress that E2EE only protects data in transit; anything before encryption or after decryption (notifications, screenshots, backups, OS caches, keyboards) is outside its guarantees.
- Deleting messages or even uninstalling the app does not ensure erasure if the OS or backups retain copies.
- Some argue this case shows how hard real operational security is and how much users over‑trust “secure” apps.
Mitigations and suggestions
- Use Signal’s in‑app setting to show “name only” or “no name or content” in notifications, especially for sensitive chats.
- Possibly add chat‑ or group‑level policies that can require stricter notification behavior for all participants.
- Calls for Apple/Google to:
- Delete notification data on app uninstall or after dismissal,
- Store notification content with stronger data‑protection classes or rolling per‑app keys,
- Make notification retention more transparent/configurable.