You could have noticed the recent case of the US Federal Bureau of Investigation pulling Signal messages from a defendant’s iPhone, despite the fact that the messages have been set to vanish routinely, and the Sign app itself had been deleted from the telephone.
The trick utilized by regulation enforcement? Previews of every incoming Sign message have been logged within the notification database saved by iOS. Despite the fact that Sign had deleted the conversations, and Sign itself was deleted, this database was nonetheless out there to the FBI’s forensics groups.
There may be some excellent news: Apple has pushed out an iOS 26.4.2 update that makes positive notification logs are correctly cleaned up after the notifications have expired. Be sure that your iPhone is up to date (by way of Basic > Software program Replace) and you need to be protected towards any such intrusion.
Nonetheless, the occasions are regarding for anybody taken with defending their very own privateness. And despite the fact that Apple has improved iOS’s housekeeping, there are steps you possibly can take to additional reduce your danger in related circumstances.
What Did the FBI Do?
Unsurprisingly, the FBI is reluctant to offer step-by-step directions for the way it breaks into smartphones and extracts information. Nonetheless, by reporting by 404 Media and evaluation from specialists comparable to cybersecurity specialist Andrea Fortuna, we will make some educated guesses about what occurred.
What appears clear is that the forensics crew did not break Sign’s encryption, or hack into any Sign database, however centered its consideration on the database of notifications logged by iOS. It is notable that the FBI might solely extract incoming messages moderately than outgoing ones, as a result of messages being despatched out from a tool would not present up in a notification.
On condition that Apple retains iOS fairly tightly locked down, it appears doubtless that the analyzed iPhone was unlocked, or at the least in an After First Unlock (AFU) state. When a telephone reboots and first presents the lock display screen, that is a Earlier than First Unlock (BFU) state—however once you subsequently lock and unlock your telephone by the day, that is AFU.
Despite the fact that an app’s messages could also be gone, its notifications aren’t.{Photograph}: David Nield
Each states present the lock display screen and hold your telephone shielded from unwelcome guests, however BFU comes with some additional safety and encryption measures. It is one of many causes Android telephones now auto-reboot in the event that they have not been used for 3 days—as a result of that very first unlock display screen after a restart is barely safer.

