Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…?

y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…?

Scheduled Pinned Locked Moved Uncategorized
signalfbiiphoneforensicsencryption
12 Posts 4 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

    y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…? 🤔

    FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

    “The #FBI was able to forensically extract copies of incoming Signal messages from a defendant’s #iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database”

    💰 https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

    a detailed write-up that’s not paywalled 👇

    When deleting Signal is not enough: the FBI, iPhone notifications, and what #forensics can reveal

    ”A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No #encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.”

    Link Preview Image
    When deleting Signal is not enough: the FBI, iPhone notifications, and what forensics can reveal

    A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.

    favicon

    Andrea Fortuna (andreafortuna.org)

    #DFIR
    #iOS  

    scottymace@infosec.exchangeS This user is from outside of this forum
    scottymace@infosec.exchangeS This user is from outside of this forum
    scottymace@infosec.exchange
    wrote last edited by
    #2

    @itgrrl I see no mention of the implications for Android devices. Does the same issue exist?

    itgrrl@infosec.exchangeI 1 Reply Last reply
    0
    • scottymace@infosec.exchangeS scottymace@infosec.exchange

      @itgrrl I see no mention of the implications for Android devices. Does the same issue exist?

      itgrrl@infosec.exchangeI This user is from outside of this forum
      itgrrl@infosec.exchangeI This user is from outside of this forum
      itgrrl@infosec.exchange
      wrote last edited by
      #3

      @scottymace I don’t know the details of push notification storage on Android, but limiting the content of push notifications for any privacy-focused apps is a sensible precaution regardless of the app or the platform you use it on (some people run Signal on desktop OSes too)

      1 Reply Last reply
      0
      • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

        y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…? 🤔

        FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

        “The #FBI was able to forensically extract copies of incoming Signal messages from a defendant’s #iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database”

        💰 https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

        a detailed write-up that’s not paywalled 👇

        When deleting Signal is not enough: the FBI, iPhone notifications, and what #forensics can reveal

        ”A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No #encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.”

        Link Preview Image
        When deleting Signal is not enough: the FBI, iPhone notifications, and what forensics can reveal

        A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.

        favicon

        Andrea Fortuna (andreafortuna.org)

        #DFIR
        #iOS  

        scottymace@infosec.exchangeS This user is from outside of this forum
        scottymace@infosec.exchangeS This user is from outside of this forum
        scottymace@infosec.exchange
        wrote last edited by
        #4

        @itgrrl Yes, it does have android implications.
        1. Open Signal.
        2. Tap your profile icon.
        3. Tap Notifications.
        4. Under Show, select “No name or message”.
        If using Molly, users can additionally enable database encryption at rest, which encrypts Signal’s local database with a separate passphrase — adding protection against on-device forensic extraction of the app’s own data.

        itgrrl@infosec.exchangeI 1 Reply Last reply
        0
        • scottymace@infosec.exchangeS scottymace@infosec.exchange

          @itgrrl Yes, it does have android implications.
          1. Open Signal.
          2. Tap your profile icon.
          3. Tap Notifications.
          4. Under Show, select “No name or message”.
          If using Molly, users can additionally enable database encryption at rest, which encrypts Signal’s local database with a separate passphrase — adding protection against on-device forensic extraction of the app’s own data.

          itgrrl@infosec.exchangeI This user is from outside of this forum
          itgrrl@infosec.exchangeI This user is from outside of this forum
          itgrrl@infosec.exchange
          wrote last edited by
          #5

          @scottymace Signal’s database #encryption wasn’t the problem in this instance, it was the amount of detail in the content of push notifications (and it’s persistence) in the iOS ̶A̶P̶N̶ ̶ notifications database

          choosing to use a #Signal fork like #Molly instead of the official client brings its own set of risks and trade-offs to be weighed in the context of your specific threat model

          scottymace@infosec.exchangeS david_chisnall@infosec.exchangeD 2 Replies Last reply
          0
          • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

            @scottymace Signal’s database #encryption wasn’t the problem in this instance, it was the amount of detail in the content of push notifications (and it’s persistence) in the iOS ̶A̶P̶N̶ ̶ notifications database

            choosing to use a #Signal fork like #Molly instead of the official client brings its own set of risks and trade-offs to be weighed in the context of your specific threat model

            scottymace@infosec.exchangeS This user is from outside of this forum
            scottymace@infosec.exchangeS This user is from outside of this forum
            scottymace@infosec.exchange
            wrote last edited by
            #6

            @itgrrl Totally agree.

            1 Reply Last reply
            0
            • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

              @scottymace Signal’s database #encryption wasn’t the problem in this instance, it was the amount of detail in the content of push notifications (and it’s persistence) in the iOS ̶A̶P̶N̶ ̶ notifications database

              choosing to use a #Signal fork like #Molly instead of the official client brings its own set of risks and trade-offs to be weighed in the context of your specific threat model

              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchange
              wrote last edited by
              #7

              @itgrrl @scottymace

              Nearly:

              it was the amount of detail in the content of push notifications

              It wasn’t the information in the push notification. This goes via Apple’s server and is a one-bit signal that says ‘there may be some messages waiting for you, you should go and check’ (may be, because Signal sends some spurious push notifications to make traffic correlations harder).

              The Signal app then gets the message and asks the local OS notification mechanism to display the notification. If the permissions are set up to display Signal notifications on the lock screen, these are also persisted in a database on iOS (I have no idea why. Is there some way of searching them?). If you’re worried about people with physical access to your device reading your messages, I would suggest that turning off the thing that shows them on the lock screen is probably a good idea.

              buherator@infosec.placeB itgrrl@infosec.exchangeI 2 Replies Last reply
              0
              • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                @itgrrl @scottymace

                Nearly:

                it was the amount of detail in the content of push notifications

                It wasn’t the information in the push notification. This goes via Apple’s server and is a one-bit signal that says ‘there may be some messages waiting for you, you should go and check’ (may be, because Signal sends some spurious push notifications to make traffic correlations harder).

                The Signal app then gets the message and asks the local OS notification mechanism to display the notification. If the permissions are set up to display Signal notifications on the lock screen, these are also persisted in a database on iOS (I have no idea why. Is there some way of searching them?). If you’re worried about people with physical access to your device reading your messages, I would suggest that turning off the thing that shows them on the lock screen is probably a good idea.

                buherator@infosec.placeB This user is from outside of this forum
                buherator@infosec.placeB This user is from outside of this forum
                buherator@infosec.place
                wrote last edited by
                #8
                @david_chisnall @itgrrl @scottymace "Is there some way of searching them?" I can only speak of Android: here definitely is a system-level option keep a browsable notification history.
                itgrrl@infosec.exchangeI 1 Reply Last reply
                0
                • buherator@infosec.placeB buherator@infosec.place
                  @david_chisnall @itgrrl @scottymace "Is there some way of searching them?" I can only speak of Android: here definitely is a system-level option keep a browsable notification history.
                  itgrrl@infosec.exchangeI This user is from outside of this forum
                  itgrrl@infosec.exchangeI This user is from outside of this forum
                  itgrrl@infosec.exchange
                  wrote last edited by
                  #9

                  @buherator @david_chisnall @scottymace AFAIK on iOS there’s no on-device way to search or view the contents any of the internal system databases without jailbreaking (which has become increasingly difficult to do), but there are digital forensics tools (both commercial & open source) that can enumerate them – this is the sort of tool that the FBI used

                  david_chisnall@infosec.exchangeD 1 Reply Last reply
                  0
                  • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                    @itgrrl @scottymace

                    Nearly:

                    it was the amount of detail in the content of push notifications

                    It wasn’t the information in the push notification. This goes via Apple’s server and is a one-bit signal that says ‘there may be some messages waiting for you, you should go and check’ (may be, because Signal sends some spurious push notifications to make traffic correlations harder).

                    The Signal app then gets the message and asks the local OS notification mechanism to display the notification. If the permissions are set up to display Signal notifications on the lock screen, these are also persisted in a database on iOS (I have no idea why. Is there some way of searching them?). If you’re worried about people with physical access to your device reading your messages, I would suggest that turning off the thing that shows them on the lock screen is probably a good idea.

                    itgrrl@infosec.exchangeI This user is from outside of this forum
                    itgrrl@infosec.exchangeI This user is from outside of this forum
                    itgrrl@infosec.exchange
                    wrote last edited by
                    #10

                    @david_chisnall @scottymace I’ve updated my toot to use a more precise descriptor

                    1 Reply Last reply
                    0
                    • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

                      @buherator @david_chisnall @scottymace AFAIK on iOS there’s no on-device way to search or view the contents any of the internal system databases without jailbreaking (which has become increasingly difficult to do), but there are digital forensics tools (both commercial & open source) that can enumerate them – this is the sort of tool that the FBI used

                      david_chisnall@infosec.exchangeD This user is from outside of this forum
                      david_chisnall@infosec.exchangeD This user is from outside of this forum
                      david_chisnall@infosec.exchange
                      wrote last edited by
                      #11

                      @itgrrl @buherator @scottymace

                      Do you have any idea why they bother persisting more than the notifications currently on the screen? It's weird to collect data that you have no use for. Does it train on-device text-prediction models or something?

                      buherator@infosec.placeB 1 Reply Last reply
                      0
                      • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                        @itgrrl @buherator @scottymace

                        Do you have any idea why they bother persisting more than the notifications currently on the screen? It's weird to collect data that you have no use for. Does it train on-device text-prediction models or something?

                        buherator@infosec.placeB This user is from outside of this forum
                        buherator@infosec.placeB This user is from outside of this forum
                        buherator@infosec.place
                        wrote last edited by
                        #12
                        @david_chisnall @itgrrl @scottymace User story: I explicitly looked for and manually enabled the history on Android bc there were notifs that contained important info but I sometimes removed them from the screen by accident and I couldn't find them in the corresponding app (can't tell the exact app/feature).
                        1 Reply Last reply
                        1
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups