{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiggkcd4iz62bgtqs52pg3zmfyeudgh7jzg7qngn3ub5o22xvuoj4i",
    "uri": "at://did:plc:kyxdufbi5qaljy7bxivztuhy/app.bsky.feed.post/3mk7kszuzgdg2"
  },
  "path": "/blog/archives/2026/04/fbi-extracts-deleted-signal-messages-from-iphone-notification-database.html",
  "publishedAt": "2026-04-23T11:05:42.000Z",
  "site": "https://www.schneier.com",
  "tags": [
    "Uncategorized",
    "databases",
    "FBI",
    "iPhone",
    "Signal",
    "terrorism",
    "reports",
    "site"
  ],
  "textContent": "404 Media reports (alternate site):\n\n> The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database….\n>\n> The news shows how forensic extraction—­when someone has physical access to a device and is able to run specialized software on it—­can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on...",
  "title": "FBI Extracts Deleted Signal Messages from iPhone Notification Database"
}