{"id":86664,"date":"2026-04-29T14:07:28","date_gmt":"2026-04-29T14:07:28","guid":{"rendered":"https:\/\/diyhaven858.wasmer.app\/index.php\/your-phone-notifications-reveal-more-than-you-realize-heres-how-to-lock-them-down\/"},"modified":"2026-04-29T14:07:28","modified_gmt":"2026-04-29T14:07:28","slug":"your-phone-notifications-reveal-more-than-you-realize-heres-how-to-lock-them-down","status":"publish","type":"post","link":"https:\/\/diyhaven858.wasmer.app\/index.php\/your-phone-notifications-reveal-more-than-you-realize-heres-how-to-lock-them-down\/","title":{"rendered":"Your Phone Notifications Reveal More Than You Realize. Here\u2019s How to Lock Them Down"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"lead-in-text-callout\">You may have<\/span> spotted the recent case of the US Federal Bureau of Investigation pulling Signal messages from a defendant&#8217;s iPhone, even though the messages were set to disappear automatically, and the Signal app itself had been deleted from the phone.<\/p>\n<p class=\"paywall\">The trick used by law enforcement? Previews of each incoming Signal message were logged in the notification database kept by iOS. Even though Signal had deleted the conversations, and Signal itself was deleted, this database was still available to the FBI&#8217;s forensics teams.<\/p>\n<p class=\"paywall\">There is some good news: Apple has pushed out an iOS 26.4.2 update that makes sure notification logs are properly cleaned up after the notifications have expired. Make sure your iPhone is updated (via <strong>General &gt; Software Update<\/strong>) and you should be protected against this type of intrusion.<\/p>\n<p class=\"paywall\">Still, the events are concerning for anyone interested in protecting their own privacy. And even though Apple has improved iOS\u2019s housekeeping, there are steps you can take to further minimize your risk in similar circumstances.<\/p>\n<h2 class=\"paywall\">What Did the FBI Do?<\/h2>\n<p class=\"paywall\">Unsurprisingly, the FBI is reluctant to provide step-by-step instructions for how it breaks into smartphones and extracts data. Nevertheless, through reporting by 404 Media and analysis from experts such as cybersecurity specialist Andrea Fortuna, we can make some educated guesses about what happened.<\/p>\n<p class=\"paywall\">What seems clear is that the forensics team didn&#8217;t break Signal&#8217;s encryption, or hack into any Signal database, but focused its attention on the database of notifications logged by iOS. It&#8217;s notable that the FBI could only extract incoming messages rather than outgoing ones, because messages being sent out from a device wouldn&#8217;t show up in a notification.<\/p>\n<p class=\"paywall\">Given that Apple keeps iOS pretty tightly locked down, it seems likely that the analyzed iPhone was unlocked, or at least in an After First Unlock (AFU) state. When a phone reboots and first presents the lock screen, that&#8217;s a Before First Unlock (BFU) state\u2014but when you subsequently lock and unlock your phone through the day, that&#8217;s AFU.<\/p>\n<figure class=\"AssetEmbedWrapper-iJvQnD cOWUYC asset-embed\">\n<div class=\"AssetEmbedAssetContainer-fnduJP iaVSwI asset-embed__asset-container\"><span class=\"SpanWrapper-kFnjvc eKnjjD responsive-asset AssetEmbedResponsiveAsset-gaAbQ hXaxHA asset-embed__responsive-asset\"><picture class=\"ResponsiveImagePicture-jKunQM gjCCFj AssetEmbedResponsiveAsset-gaAbQ hXaxHA asset-embed__responsive-asset responsive-image\"><img decoding=\"async\" alt=\"Image may contain Text\" loading=\"lazy\" class=\"ResponsiveImageContainer-dkeESL cQPiWi responsive-image__image\" srcset=\"https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_120,c_limit\/01-alert.jpg 120w, https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_240,c_limit\/01-alert.jpg 240w, https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_320,c_limit\/01-alert.jpg 320w, https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_640,c_limit\/01-alert.jpg 640w, https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_960,c_limit\/01-alert.jpg 960w, https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_1280,c_limit\/01-alert.jpg 1280w, https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_1600,c_limit\/01-alert.jpg 1600w\" sizes=\"100vw\" src=\"https:\/\/media.wired.com\/photos\/69ebc382b5b091eb05750603\/master\/w_1600%2Cc_limit\/01-alert.jpg\"\/><\/picture><\/span><\/div>\n<p><span class=\"BaseText-fEwdHD CaptionText-cQpRdU kRTNAB hbiMYj caption__text\">Even though an app&#8217;s messages may be gone, its notifications aren&#8217;t.<\/span><span class=\"BaseText-fEwdHD CaptionCredit-cUgOGk iQbGEh hRFzlA caption__credit\">Photograph: David Nield<\/span><\/p>\n<\/figure>\n<p class=\"paywall\">Both states show the lock screen and keep your phone protected from unwelcome visitors, but BFU comes with some extra security and encryption measures. It&#8217;s one of the reasons Android phones now auto-reboot if they haven&#8217;t been used for three days\u2014because that very first unlock screen after a restart is slightly more secure.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may have spotted the recent case of the US Federal Bureau of Investigation pulling Signal messages from a defendant&#8217;s iPhone, even though the messages were set to disappear automatically, and the Signal app itself had been deleted from the phone. The trick used by law enforcement? Previews of each incoming Signal message were logged [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":86665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daextam_enable_autolinks":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-86664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/diyhaven858.wasmer.app\/wp-content\/uploads\/2026\/04\/Forensic-Searches-Can-Expose-Deleted-Signal-Messages-Gear-2264943495.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/86664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/comments?post=86664"}],"version-history":[{"count":0,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/86664\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media\/86665"}],"wp:attachment":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media?parent=86664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/categories?post=86664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/tags?post=86664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}