FBI Extracts Deleted Signal Messages from iPhone Notification Database
Schneier on Security [Unofficial]
April 23, 2026
404 Media reports (alternate site):
> The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database….
>
> The news shows how forensic extraction—when someone has physical access to a device and is able to run specialized software on it—can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on...
Discussion in the ATmosphere