Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted.

New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted.

Scheduled Pinned Locked Moved Uncategorized
15 Posts 11 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • josephcox@infosec.exchangeJ josephcox@infosec.exchange

    New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

    stevebellovin@infosec.exchangeS This user is from outside of this forum
    stevebellovin@infosec.exchangeS This user is from outside of this forum
    stevebellovin@infosec.exchange
    wrote last edited by
    #2

    @josephcox As I've long said, "you don't go through strong security, you go around it."

    drwho@masto.hackers.townD 1 Reply Last reply
    0
    • josephcox@infosec.exchangeJ josephcox@infosec.exchange

      New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

      misusecase@twit.socialM This user is from outside of this forum
      misusecase@twit.socialM This user is from outside of this forum
      misusecase@twit.social
      wrote last edited by
      #3

      @josephcox There has been some concern about security vulnerabilities and leaks associated with iOS notifications for a while, right?

      1 Reply Last reply
      0
      • josephcox@infosec.exchangeJ josephcox@infosec.exchange

        New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

        ujay68@mastodon.worldU This user is from outside of this forum
        ujay68@mastodon.worldU This user is from outside of this forum
        ujay68@mastodon.world
        wrote last edited by
        #4

        @josephcox Can we be more specific here? I can’t imagine technically that there’s a possibility of messages arriving *after* deleting the app being decrypted and stored in a device’s notification database? So this is probably about messages that arrived *before* deleting the app?

        netraven@hear-me.socialN 1 Reply Last reply
        0
        • lasagne@chaos.socialL This user is from outside of this forum
          lasagne@chaos.socialL This user is from outside of this forum
          lasagne@chaos.social
          wrote last edited by
          #5

          @arrakeen_urbanite @josephcox

          If these fucking blogs would not just repost and instead provide advice...
          Like maybe testing how to clear that buffer.

          jdoe@freeradical.zoneJ 1 Reply Last reply
          0
          • ujay68@mastodon.worldU ujay68@mastodon.world

            @josephcox Can we be more specific here? I can’t imagine technically that there’s a possibility of messages arriving *after* deleting the app being decrypted and stored in a device’s notification database? So this is probably about messages that arrived *before* deleting the app?

            netraven@hear-me.socialN This user is from outside of this forum
            netraven@hear-me.socialN This user is from outside of this forum
            netraven@hear-me.social
            wrote last edited by
            #6

            @ujay68 @josephcox I just read the text and it seems pretty clear that it was saved in the notification databse. so....not the app. Does that help?

            ujay68@mastodon.worldU 1 Reply Last reply
            0
            • josephcox@infosec.exchangeJ josephcox@infosec.exchange

              New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

              pee@mastodon.onlineP This user is from outside of this forum
              pee@mastodon.onlineP This user is from outside of this forum
              pee@mastodon.online
              wrote last edited by
              #7

              @josephcox

              this is an old problem and as far as I remember, does not only affect iOS but all platforms incl. Android, Windows etc.

              Therefore it's a good idea to disable 'preview' in all notifications for all Apps on all platforms - as far as I recall, these are already mass-intercepted in transit.

              What's new to me is that iOS stores these, even after having deleted an App - begs the question, what about other platforms?

              1 Reply Last reply
              0
              • lasagne@chaos.socialL lasagne@chaos.social

                @arrakeen_urbanite @josephcox

                If these fucking blogs would not just repost and instead provide advice...
                Like maybe testing how to clear that buffer.

                jdoe@freeradical.zoneJ This user is from outside of this forum
                jdoe@freeradical.zoneJ This user is from outside of this forum
                jdoe@freeradical.zone
                wrote last edited by
                #8

                @lasagne @arrakeen_urbanite @josephcox Just yet another click baity headline from 404 media, nothing new.

                1 Reply Last reply
                0
                • josephcox@infosec.exchangeJ josephcox@infosec.exchange

                  New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

                  peteorrall@mastodon.bsd.cafeP This user is from outside of this forum
                  peteorrall@mastodon.bsd.cafeP This user is from outside of this forum
                  peteorrall@mastodon.bsd.cafe
                  wrote last edited by
                  #9

                  @josephcox While obviously concerning, my first thought is if someone needs to securely communicate then perhaps a smartphone with an OS you can't fully control isn't the best tool.

                  Signal may have great encryption but if the host OS has known vulnerabilities or design flaws that allow for this, then what's the point?

                  I am certainly open to suggestions and discussion for better solutions.

                  1 Reply Last reply
                  0
                  • josephcox@infosec.exchangeJ josephcox@infosec.exchange

                    New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

                    elly@donotsta.reE This user is from outside of this forum
                    elly@donotsta.reE This user is from outside of this forum
                    elly@donotsta.re
                    wrote last edited by
                    #10
                    @josephcox I thought it was obvious? Anyone who ever looked at iOS or Android logs knows that every single notification you ever received is stored in the system logs, which are transferred to new devices if you use migration assistant or encrypted backup.

                    It's a valid and big attack vector, that's why I personally have notifications enabled to just tell me which app it is and why i'm getting a notification, no other context. Especially since push notifications are handled by Google/Apple's servers so if you can MITM it, you can collect a lot of sensitive data.
                    1 Reply Last reply
                    0
                    • netraven@hear-me.socialN netraven@hear-me.social

                      @ujay68 @josephcox I just read the text and it seems pretty clear that it was saved in the notification databse. so....not the app. Does that help?

                      ujay68@mastodon.worldU This user is from outside of this forum
                      ujay68@mastodon.worldU This user is from outside of this forum
                      ujay68@mastodon.world
                      wrote last edited by
                      #11

                      @Netraven I guess so. Wondering if iOS offers an API that Signal could (have) use(d) to completely clear its notifications from that db. I guess not so.

                      netraven@hear-me.socialN 1 Reply Last reply
                      0
                      • ujay68@mastodon.worldU ujay68@mastodon.world

                        @Netraven I guess so. Wondering if iOS offers an API that Signal could (have) use(d) to completely clear its notifications from that db. I guess not so.

                        netraven@hear-me.socialN This user is from outside of this forum
                        netraven@hear-me.socialN This user is from outside of this forum
                        netraven@hear-me.social
                        wrote last edited by
                        #12

                        @ujay68 I don't know, sorry.

                        1 Reply Last reply
                        0
                        • stevebellovin@infosec.exchangeS stevebellovin@infosec.exchange

                          @josephcox As I've long said, "you don't go through strong security, you go around it."

                          drwho@masto.hackers.townD This user is from outside of this forum
                          drwho@masto.hackers.townD This user is from outside of this forum
                          drwho@masto.hackers.town
                          wrote last edited by
                          #13

                          @SteveBellovin @josephcox Can I quote you on that?

                          stevebellovin@infosec.exchangeS 1 Reply Last reply
                          0
                          • drwho@masto.hackers.townD drwho@masto.hackers.town

                            @SteveBellovin @josephcox Can I quote you on that?

                            stevebellovin@infosec.exchangeS This user is from outside of this forum
                            stevebellovin@infosec.exchangeS This user is from outside of this forum
                            stevebellovin@infosec.exchange
                            wrote last edited by
                            #14

                            @drwho @josephcox Sure.

                            drwho@masto.hackers.townD 1 Reply Last reply
                            0
                            • stevebellovin@infosec.exchangeS stevebellovin@infosec.exchange

                              @drwho @josephcox Sure.

                              drwho@masto.hackers.townD This user is from outside of this forum
                              drwho@masto.hackers.townD This user is from outside of this forum
                              drwho@masto.hackers.town
                              wrote last edited by
                              #15

                              @SteveBellovin @josephcox Thank you kindly.

                              1 Reply Last reply
                              0
                              • R relay@relay.publicsquare.global shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups