Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…?

y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…?

Scheduled Pinned Locked Moved Uncategorized
signalfbiiphoneforensicsencryption
12 Posts 4 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • itgrrl@infosec.exchangeI This user is from outside of this forum
    itgrrl@infosec.exchangeI This user is from outside of this forum
    itgrrl@infosec.exchange
    wrote last edited by
    #1

    y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…? 🤔

    FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

    “The #FBI was able to forensically extract copies of incoming Signal messages from a defendant’s #iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database”

    💰 https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

    a detailed write-up that’s not paywalled 👇

    When deleting Signal is not enough: the FBI, iPhone notifications, and what #forensics can reveal

    ”A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No #encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.”

    https://andreafortuna.org/2026/04/11/signal-fbi-iphone-notifications-forensics/

    #DFIR
    #iOS  

    scottymace@infosec.exchangeS 2 Replies Last reply
    0
    • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

      y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…? 🤔

      FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

      “The #FBI was able to forensically extract copies of incoming Signal messages from a defendant’s #iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database”

      💰 https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

      a detailed write-up that’s not paywalled 👇

      When deleting Signal is not enough: the FBI, iPhone notifications, and what #forensics can reveal

      ”A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No #encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.”

      https://andreafortuna.org/2026/04/11/signal-fbi-iphone-notifications-forensics/

      #DFIR
      #iOS  

      scottymace@infosec.exchangeS This user is from outside of this forum
      scottymace@infosec.exchangeS This user is from outside of this forum
      scottymace@infosec.exchange
      wrote last edited by
      #2

      @itgrrl I see no mention of the implications for Android devices. Does the same issue exist?

      itgrrl@infosec.exchangeI 1 Reply Last reply
      0
      • scottymace@infosec.exchangeS scottymace@infosec.exchange

        @itgrrl I see no mention of the implications for Android devices. Does the same issue exist?

        itgrrl@infosec.exchangeI This user is from outside of this forum
        itgrrl@infosec.exchangeI This user is from outside of this forum
        itgrrl@infosec.exchange
        wrote last edited by
        #3

        @scottymace I don’t know the details of push notification storage on Android, but limiting the content of push notifications for any privacy-focused apps is a sensible precaution regardless of the app or the platform you use it on (some people run Signal on desktop OSes too)

        1 Reply Last reply
        0
        • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

          y’all have your #Signal notifications set to “Name Only” or “No Name or Content”, right…? 🤔

          FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

          “The #FBI was able to forensically extract copies of incoming Signal messages from a defendant’s #iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database”

          💰 https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

          a detailed write-up that’s not paywalled 👇

          When deleting Signal is not enough: the FBI, iPhone notifications, and what #forensics can reveal

          ”A few days ago, 404 Media published a detailed report that made a lot of people uncomfortable: the FBI managed to recover Signal messages from a suspect’s iPhone, even though the app had already been uninstalled. No #encryption was broken. No Signal server was compromised. The messages were sitting in the phone’s own notification database, waiting to be found.”

          https://andreafortuna.org/2026/04/11/signal-fbi-iphone-notifications-forensics/

          #DFIR
          #iOS  

          scottymace@infosec.exchangeS This user is from outside of this forum
          scottymace@infosec.exchangeS This user is from outside of this forum
          scottymace@infosec.exchange
          wrote last edited by
          #4

          @itgrrl Yes, it does have android implications.
          1. Open Signal.
          2. Tap your profile icon.
          3. Tap Notifications.
          4. Under Show, select “No name or message”.
          If using Molly, users can additionally enable database encryption at rest, which encrypts Signal’s local database with a separate passphrase — adding protection against on-device forensic extraction of the app’s own data.

          itgrrl@infosec.exchangeI 1 Reply Last reply
          0
          • scottymace@infosec.exchangeS scottymace@infosec.exchange

            @itgrrl Yes, it does have android implications.
            1. Open Signal.
            2. Tap your profile icon.
            3. Tap Notifications.
            4. Under Show, select “No name or message”.
            If using Molly, users can additionally enable database encryption at rest, which encrypts Signal’s local database with a separate passphrase — adding protection against on-device forensic extraction of the app’s own data.

            itgrrl@infosec.exchangeI This user is from outside of this forum
            itgrrl@infosec.exchangeI This user is from outside of this forum
            itgrrl@infosec.exchange
            wrote last edited by
            #5

            @scottymace Signal’s database #encryption wasn’t the problem in this instance, it was the amount of detail in the content of push notifications (and it’s persistence) in the iOS ̶A̶P̶N̶ ̶ notifications database

            choosing to use a #Signal fork like #Molly instead of the official client brings its own set of risks and trade-offs to be weighed in the context of your specific threat model

            scottymace@infosec.exchangeS david_chisnall@infosec.exchangeD 2 Replies Last reply
            0
            • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

              @scottymace Signal’s database #encryption wasn’t the problem in this instance, it was the amount of detail in the content of push notifications (and it’s persistence) in the iOS ̶A̶P̶N̶ ̶ notifications database

              choosing to use a #Signal fork like #Molly instead of the official client brings its own set of risks and trade-offs to be weighed in the context of your specific threat model

              scottymace@infosec.exchangeS This user is from outside of this forum
              scottymace@infosec.exchangeS This user is from outside of this forum
              scottymace@infosec.exchange
              wrote last edited by
              #6

              @itgrrl Totally agree.

              1 Reply Last reply
              0
              • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

                @scottymace Signal’s database #encryption wasn’t the problem in this instance, it was the amount of detail in the content of push notifications (and it’s persistence) in the iOS ̶A̶P̶N̶ ̶ notifications database

                choosing to use a #Signal fork like #Molly instead of the official client brings its own set of risks and trade-offs to be weighed in the context of your specific threat model

                david_chisnall@infosec.exchangeD This user is from outside of this forum
                david_chisnall@infosec.exchangeD This user is from outside of this forum
                david_chisnall@infosec.exchange
                wrote last edited by
                #7

                @itgrrl @scottymace

                Nearly:

                it was the amount of detail in the content of push notifications

                It wasn’t the information in the push notification. This goes via Apple’s server and is a one-bit signal that says ‘there may be some messages waiting for you, you should go and check’ (may be, because Signal sends some spurious push notifications to make traffic correlations harder).

                The Signal app then gets the message and asks the local OS notification mechanism to display the notification. If the permissions are set up to display Signal notifications on the lock screen, these are also persisted in a database on iOS (I have no idea why. Is there some way of searching them?). If you’re worried about people with physical access to your device reading your messages, I would suggest that turning off the thing that shows them on the lock screen is probably a good idea.

                buherator@infosec.placeB itgrrl@infosec.exchangeI 2 Replies Last reply
                0
                • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                  @itgrrl @scottymace

                  Nearly:

                  it was the amount of detail in the content of push notifications

                  It wasn’t the information in the push notification. This goes via Apple’s server and is a one-bit signal that says ‘there may be some messages waiting for you, you should go and check’ (may be, because Signal sends some spurious push notifications to make traffic correlations harder).

                  The Signal app then gets the message and asks the local OS notification mechanism to display the notification. If the permissions are set up to display Signal notifications on the lock screen, these are also persisted in a database on iOS (I have no idea why. Is there some way of searching them?). If you’re worried about people with physical access to your device reading your messages, I would suggest that turning off the thing that shows them on the lock screen is probably a good idea.

                  buherator@infosec.placeB This user is from outside of this forum
                  buherator@infosec.placeB This user is from outside of this forum
                  buherator@infosec.place
                  wrote last edited by
                  #8
                  @david_chisnall @itgrrl @scottymace "Is there some way of searching them?" I can only speak of Android: here definitely is a system-level option keep a browsable notification history.
                  itgrrl@infosec.exchangeI 1 Reply Last reply
                  0
                  • buherator@infosec.placeB buherator@infosec.place
                    @david_chisnall @itgrrl @scottymace "Is there some way of searching them?" I can only speak of Android: here definitely is a system-level option keep a browsable notification history.
                    itgrrl@infosec.exchangeI This user is from outside of this forum
                    itgrrl@infosec.exchangeI This user is from outside of this forum
                    itgrrl@infosec.exchange
                    wrote last edited by
                    #9

                    @buherator @david_chisnall @scottymace AFAIK on iOS there’s no on-device way to search or view the contents any of the internal system databases without jailbreaking (which has become increasingly difficult to do), but there are digital forensics tools (both commercial & open source) that can enumerate them – this is the sort of tool that the FBI used

                    david_chisnall@infosec.exchangeD 1 Reply Last reply
                    0
                    • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                      @itgrrl @scottymace

                      Nearly:

                      it was the amount of detail in the content of push notifications

                      It wasn’t the information in the push notification. This goes via Apple’s server and is a one-bit signal that says ‘there may be some messages waiting for you, you should go and check’ (may be, because Signal sends some spurious push notifications to make traffic correlations harder).

                      The Signal app then gets the message and asks the local OS notification mechanism to display the notification. If the permissions are set up to display Signal notifications on the lock screen, these are also persisted in a database on iOS (I have no idea why. Is there some way of searching them?). If you’re worried about people with physical access to your device reading your messages, I would suggest that turning off the thing that shows them on the lock screen is probably a good idea.

                      itgrrl@infosec.exchangeI This user is from outside of this forum
                      itgrrl@infosec.exchangeI This user is from outside of this forum
                      itgrrl@infosec.exchange
                      wrote last edited by
                      #10

                      @david_chisnall @scottymace I’ve updated my toot to use a more precise descriptor

                      1 Reply Last reply
                      0
                      • itgrrl@infosec.exchangeI itgrrl@infosec.exchange

                        @buherator @david_chisnall @scottymace AFAIK on iOS there’s no on-device way to search or view the contents any of the internal system databases without jailbreaking (which has become increasingly difficult to do), but there are digital forensics tools (both commercial & open source) that can enumerate them – this is the sort of tool that the FBI used

                        david_chisnall@infosec.exchangeD This user is from outside of this forum
                        david_chisnall@infosec.exchangeD This user is from outside of this forum
                        david_chisnall@infosec.exchange
                        wrote last edited by
                        #11

                        @itgrrl @buherator @scottymace

                        Do you have any idea why they bother persisting more than the notifications currently on the screen? It's weird to collect data that you have no use for. Does it train on-device text-prediction models or something?

                        buherator@infosec.placeB 1 Reply Last reply
                        0
                        • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                          @itgrrl @buherator @scottymace

                          Do you have any idea why they bother persisting more than the notifications currently on the screen? It's weird to collect data that you have no use for. Does it train on-device text-prediction models or something?

                          buherator@infosec.placeB This user is from outside of this forum
                          buherator@infosec.placeB This user is from outside of this forum
                          buherator@infosec.place
                          wrote last edited by
                          #12
                          @david_chisnall @itgrrl @scottymace User story: I explicitly looked for and manually enabled the history on Android bc there were notifs that contained important info but I sometimes removed them from the screen by accident and I couldn't find them in the corresponding app (can't tell the exact app/feature).
                          1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups