Image
Review

Apple patches iPhone bug that let police tools recover deleted Signal messages

A flaw in how iPhones stored notification data allowed law enforcement forensic tools to recover deleted Signal messages, according to a federal criminal complaint filed in connection with a deadly shooting at an immigration detention facility in Texas. Apple has since addressed the issue in an iOS update, closing a gap that let traces of […]

A flaw in how iPhones stored notification data allowed law enforcement forensic tools to recover deleted Signal messages, according to a federal criminal complaint filed in connection with a deadly shooting at an immigration detention facility in Texas. Apple has since addressed the issue in an iOS update, closing a gap that let traces of encrypted conversations persist on a device long after a user believed they were erased.

The vulnerability came to light through the FBI’s investigation of a July 4, 2025, shooting at the Prairieland Detention Center in Alvarado, Texas. A federal complaint filed by the U.S. Attorney’s Office for the Northern District of Texas documented how investigators extracted deleted Signal message artifacts from an iPhone seized during the probe. The FBI Dallas Field Office has publicly confirmed the investigation and requested tips from anyone with information about the incident.

How the notification database became a back door

Signal is built around the promise that messages can vanish on a schedule and that deleted content stays deleted. But the app operates inside Apple’s iOS, and the operating system keeps its own records. When a Signal message triggered a push notification, iOS logged data about that notification in a system-level database separate from Signal’s encrypted storage. That trace remained even after the user opened Signal and deleted the conversation.

Forensic extraction tools, the kind sold to federal, state, and local agencies by companies such as Cellebrite and Grayshift, could read this notification database and reconstruct fragments of deleted Signal exchanges. The technique did not crack Signal’s end-to-end encryption. Instead, it exploited a side channel: the operating system’s own bookkeeping around what had briefly appeared on a lock screen. In practical terms, the notification log became an unintended archive that neither Signal nor its users anticipated.

The criminal complaint describes investigators using this method to recover Signal conversations that shed light on the suspect’s planning and intent. Those reconstructed messages formed part of the probable-cause narrative presented to a federal judge, illustrating how a subtle software behavior can shape the outcome of a high-stakes case.

What Apple fixed, and what remains unclear

As of April 2026, Apple has rolled out an iOS update that addresses the notification-database gap, according to reporting by security researchers and technology journalists who analyzed the change. However, Apple has not issued a public statement identifying the specific iOS version that introduced the fix or explaining the technical mechanism behind it.

That silence leaves several important questions open. It is unclear whether the patch scrubs existing notification artifacts from devices that update or only prevents new artifacts from being created going forward. The distinction matters: anyone who used Signal on an iPhone before the update may still have recoverable traces sitting in a system database unless the device has been wiped and restored.

Signal’s developers have not publicly addressed the notification-database issue either. Whether Signal knew about the behavior before the Prairieland case surfaced it, and whether the company coordinated with Apple on a fix, has not been disclosed. No joint security advisory has appeared from either company.

The specific forensic tool used in the Prairieland extraction is not named in the complaint. Cellebrite’s UFED and Grayshift’s GrayKey are the two platforms most widely deployed by U.S. law enforcement, but attributing the extraction to either vendor based solely on the court record would be speculative.

Could other encrypted apps be affected?

If the flaw was rooted in how iOS handled push notifications system-wide, rather than in anything unique to Signal’s implementation, the implications could extend to other encrypted messaging apps. WhatsApp, Telegram, and even iMessage conversations configured with disappearing-message modes all generate push notifications on iOS. Without a detailed technical disclosure from Apple, independent researchers cannot easily test whether comparable artifacts linger for those services.

Forensic investigators have long targeted system-level artifacts precisely because they fall outside the protections that individual apps provide. iOS maintains databases for notifications, location history, app usage, and more. Each of those stores can, in theory, retain fragments of activity that an app’s own deletion routines never touch. The Signal case is a vivid example, but it is unlikely to be the last.

What iPhone users should do now

The most effective step is straightforward: update to the latest version of iOS. Apple typically bundles privacy and security changes into system updates without detailing every low-level modification, so the fix is available even though Apple has not spotlighted it.

Users concerned about previously stored notification artifacts can go further. Performing a full encrypted backup, erasing the device, and restoring from that backup after updating forces iOS to rebuild system databases, which can eliminate old traces. Even then, no consumer measure can absolutely guarantee that every historical artifact is gone.

Signal’s disappearing-messages feature remains a strong privacy tool, but it was never designed to govern what the operating system does with notification data outside the app’s sandbox. Users who want maximum privacy can disable message previews in iOS notification settings altogether, trading some convenience for a smaller forensic footprint. To do this, go to Settings > Notifications > Signal and set “Show Previews” to “Never.”

The gap between app encryption and OS behavior

The Prairieland case highlights a tension that runs through every smartphone: encryption protects message content in transit and at rest within an app, but the operating system that hosts the app generates its own data trails. Notifications, caches, thumbnails, and indexing services all create copies or references that sit outside an app’s encrypted container.

For law enforcement, these system-level artifacts are a valuable investigative resource. For privacy-conscious users, they represent a blind spot. As long as smartphones juggle usability features like rich notifications and background processing, there will be gaps between what a user thinks has been erased and what a skilled examiner can still recover. Apple’s patch narrows one such gap, but the underlying design tension is not going away.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.

logo logo

“A next-generation news and blog platform built to share stories that matter.”