Deleted Signal? Your iPhone Kept Copies.

The FBI recovered Signal messages from an iPhone's push notification database after the app was deleted. Signal's encryption wasn't the problem. iOS was.

Smartphone notification preview showing message content on lock screen
iOS stores push notification content in a local database outside app control

The FBI extracted deleted Signal messages from an iPhone notification database during a 2025 federal prosecution. Signal's end-to-end encryption was never broken. iOS stored the evidence anyway.

In a 2025 federal trial connected to protests at an ICE detention facility in Alvarado, Texas, FBI forensic investigators extracted Signal messages from an iPhone. The app had been deleted. The messages had not. iOS preserved copies of message content in its push notification database, a system-level log the app itself does not control. Forensic software with physical device access pulled them out.

Signal's encryption did exactly what it was built to do. Messages in transit were protected. iOS receives notification content before the app even opens it, and that content gets written to a local database. When Signal shows a preview in your notification banner or on your lock screen, iOS has already stored a copy. Deleting Signal removes the app. It does not go back and purge OS-level records of what the app received.

Signal does have a setting for this. Turning off message previews in notifications stops iOS from ever seeing the content in the first place. If that setting is on, the notification arrives as a generic alert with no message text. Nothing gets logged. The FBI found messages specifically because notification previews were enabled, which meant the content existed in a system layer outside the app's reach. Most Signal users have never touched that setting. Most do not know the database exists.

End-to-end encryption protects a message while it moves between two points. It does not govern what happens to a message after it arrives. iOS decides what to do with incoming notifications. Android does the same. The app author can provide a setting, but they cannot prevent the OS from doing what operating systems do. Once content leaves the encrypted channel and lands on a device, the device's retention decisions apply. The app company cannot override them.

Physical device access changes everything in this model. A warrant, a border stop, a forensic lab with the phone in hand unlocks the full system layer, not just what the app stores. Deleted apps leave system-level artifacts. Notification logs, keyboard caches, clipboard history, app state files. These are not user-facing storage. They are OS infrastructure, and most people have no visibility into what is retained there or for how long.

Signal being secure does not make your iPhone secure. Privacy tools protect what they are designed to protect. They do not protect the rest of the device by proximity. A secure app on a retained device is not a secure situation. If the threat model includes physical device access, the whole device is the attack surface, not just one app.

Disable notification previews in Signal. That closes the specific mechanism used here. The setting is under Notifications in Signal's preferences. It stops iOS from storing message content in the notification database entirely. It should be on by default. It is not.

Blackout VPN exists because privacy is a right. Your first name is too much information for us.

Keep learning

FAQ

How did the FBI get Signal messages if Signal is end-to-end encrypted?

Signal's encryption protects messages in transit. The FBI did not break the encryption. They used forensic software on the physical device to extract messages stored in iOS's push notification database. Those copies were saved by iOS when notifications were delivered with message previews enabled.

Does deleting Signal remove these notification copies from the iPhone?

No. The notification database is a system-level iOS log, not app storage. Deleting Signal removes the app but does not purge OS-layer records of previously delivered notification content.

What can Signal users do to prevent this?

Turn off message previews in Signal's notification settings. When previews are disabled, iOS receives only a generic alert with no message content and nothing gets written to the notification database.

Is this an iOS-only issue?

No. Android handles push notifications similarly. Any operating system that stores notification content locally creates the same retention exposure. The structural problem is the same across platforms.

Does a VPN protect against this kind of extraction?

No. A VPN encrypts traffic between your device and a server. It does not prevent forensic extraction of data already stored on the device. Physical access bypasses network-layer protections entirely.