{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiggkcd4iz62bgtqs52pg3zmfyeudgh7jzg7qngn3ub5o22xvuoj4i",
"uri": "at://did:plc:kyxdufbi5qaljy7bxivztuhy/app.bsky.feed.post/3mk7kszuzgdg2"
},
"path": "/blog/archives/2026/04/fbi-extracts-deleted-signal-messages-from-iphone-notification-database.html",
"publishedAt": "2026-04-23T11:05:42.000Z",
"site": "https://www.schneier.com",
"tags": [
"Uncategorized",
"databases",
"FBI",
"iPhone",
"Signal",
"terrorism",
"reports",
"site"
],
"textContent": "404 Media reports (alternate site):\n\n> The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database….\n>\n> The news shows how forensic extraction—when someone has physical access to a device and is able to run specialized software on it—can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on...",
"title": "FBI Extracts Deleted Signal Messages from iPhone Notification Database"
}