this post was submitted on 07 Apr 2026
208 points (98.6% liked)

Technology

83569 readers
3406 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

TLDR: signal content in Apple notification can be retrieved even after signal app deletion.

I saw from this reddit thread: Signal messages retrieved from iPhone after uninstalling app. : signal

Referencing this news article: Pretti Killing May Affect ICE Prairieland "Antifa Cell" Terrorism Trial

The mention of signal is in court documents here: March 10: Federal Trial Day 12 - Support the Prairieland Defendants

Signal chat evidence from Sharp’s device (Exhibit 158):
Messages were recovered from Sharp’s phone through Apple’s internal notification storage — Signal had been removed, but incoming notifications were preserved in internal memory. Only incoming messages were captured (no outgoing).

you are viewing a single comment's thread
view the rest of the comments
[–] SnoringEarthworm@sh.itjust.works 74 points 23 hours ago* (last edited 23 hours ago) (6 children)

Basically, they didn't do this:

(I'm on Android, so I don't know what the options look like in iOS, but they should be identical.)

[–] blargh513@sh.itjust.works 2 points 28 minutes ago* (last edited 26 minutes ago)

This is the problem, not what is shown in the per-app notifications. Don't turn on notification history.

[–] napkin2020@sh.itjust.works 5 points 11 hours ago* (last edited 11 hours ago) (1 children)

They shouldn't have had to do this though.

[–] Quill7513@slrpnk.net 5 points 9 hours ago

there's a lot of things under fascism that shouldn't be needed

[–] Crackhappy@lemmy.world 3 points 10 hours ago

Thank you internet stranger. I'm going to do this but fuck me if I can get my family to change their settings. They don't even know they can create a poll.

Don't ask me. I made all of you admins do I don't have to answer questions like how do I make a poll. Click the + button. Yeah. The one on your fucking screen right now.

No grandpa. We are not trying to figure out who is trans. No popop none of are naxies (I hope)

Anyway, click the +. Right there. That is how you create a poll.

[–] Kupi@sh.itjust.works 7 points 16 hours ago* (last edited 16 hours ago)

They are similar

[–] RIotingPacifist@lemmy.world 27 points 22 hours ago (2 children)

It would be nice if Signal let you do this per conversation.

It's sort of a victim of its own success, I use it for both things that do and don't require opsec

[–] rezifon@lemmy.world 2 points 5 hours ago

I imagine that the signal devs viewed it as a similar concern as when you mistype your password the error message doesn’t give you any way to know if the password is wrong or if the account doesn’t exist.

If only some of your notifications are sanitized then those are the suspicious ones. If all of your notifications are sanitized then none of them are suspicious. Or, at least, they’re all equally suspicious, opaque, and unidentifiable.

[–] Quill7513@slrpnk.net 2 points 8 hours ago (1 children)

and on some level it's important for good opsec that things that don't require opsec be done with good opsec

[–] RIotingPacifist@lemmy.world 1 points 2 hours ago

That doesn't work in reality, as evidenced here, it's far more likely people compromise their security for convenience than the other way around.

Also sometimes opsec requires in get messages from certain chats quickly. Knowing where ICE are in a timely manner is important.

[–] Bazoogle@lemmy.world 17 points 21 hours ago (4 children)

You also don't need to do this on Android unless you are concerned about random people seeing the messages on your screen. Signal on Android does not use Google's push notification service

[–] 0_o7@lemmy.dbzer0.com 4 points 9 hours ago

Signal on Android does not use Google's push notification service

Source? I'm pretty sure it falls back to a different mechanism when it doesn't find google services. And that is only on the version downloaded from their website.

https://github.com/signalapp/Signal-Android/issues/13290

[–] Quill7513@slrpnk.net 3 points 9 hours ago

as far as i know signal uses Google's notification service and if you want it to not you need to use Molly

[–] Quexotic@infosec.pub 4 points 10 hours ago

You most certainly do. I looked in my notification history in my founding of signal messages.

Then I turned off my notification history.

[–] electric_nan@lemmy.ml 4 points 19 hours ago (2 children)

It's not about how it's pushed. It's how it's displayed (and stored) on the phone.

[–] mic_check_one_two@lemmy.dbzer0.com 0 points 16 hours ago* (last edited 16 hours ago) (1 children)

It’s both. Governments have started subpoenaing the push notification servers for data, instead of targeting individual devices. That little pop-in that says who the message was from, and maybe a little bit of the body of the text? Yeah, the push notification server handled that, and the government has access to that server. So any notification you see on your screen, you can be pretty positive that the government has also seen.

But this is about the notification data being stored in a part of the phone that isn’t encrypted. Signal is (or at least claims to be) E2E encrypted, so it shouldn’t be possible for a warrant to get access to the messages in the app. But since the phone is storing those notifications in a separate area (which isn’t encrypted), the warrant was able to read them.

The point is that there are two different attack vectors, and you should harden your device against both.

[–] Auli@lemmy.ca 1 points 10 hours ago (1 children)

This doesn't make sense as the whole phone is encrypted. Do what magical unencrypted space is it stored. The push notification server yes that is an issue

[–] Quill7513@slrpnk.net 1 points 9 hours ago

if your whole phone is encrypted this likely doesn't apply to you so long as you have a strong passpharse (6 characters or more) and a good data shredding policy (shred after 5 wrong guesses)

however, that is not most people

[–] Bazoogle@lemmy.world -1 points 19 hours ago (1 children)

Source? I am not seeing anything about that. The only problem I have seen on Android is when applications use firebase for notifications, which is most play store apps to be fair, just no FDroid apps or some privacy preserving apps

[–] electric_nan@lemmy.ml 5 points 19 hours ago (1 children)

Android Settings>Notifications>History. If this is on, you can clearly see past Signal notifications, including sender name and message preview (if you enabled those in Signal). I don't know whether there is any 'hidden' history/cache that is stored even with notification history disabled.

[–] Bazoogle@lemmy.world -3 points 18 hours ago* (last edited 18 hours ago) (2 children)

I know about the setting. Why are you saying that information is sent to Google's servers? As far as I have found, that information is only stored locally on your phone

Edit: If this is just about the fact it's on the phone locally, of course if they have your actual phone they can see it. Signal is end to end encrypted, but it isn't go to be encrypted on each end, otherwise you couldn't read messages. Them getting your actual phone is very different from them intercepting the communication without you knowing

[–] nforminvasion@lemmy.world 6 points 17 hours ago

The issue is that even if a message is deleted, message content can be retrieved through notification history.

[–] electric_nan@lemmy.ml 6 points 18 hours ago (1 children)

Read the original story. This whole thing is about retrieving data from the phone itself, not from Apple or Google servers.

[–] Bazoogle@lemmy.world 1 points 6 hours ago (1 children)

Gotcha. I misunderstood. I didn't think it would be just that, because of course if they have your phone they have the contents. Signal encrypts end to end, but if they have the end device of course it isn't encrypted.

[–] electric_nan@lemmy.ml 1 points 5 hours ago

Well, kind of. They could have your phone, but you have a strong passcode locking Signal, or you could have uninstalled Signal, as in the OP. In those cases, the full Signal conversations would be protected, while any notification history stored by the system would be recoverable.