联邦调查局利用iPhone通知数据恢复已删除的Signal消息。
FBI used iPhone notification data to retrieve deleted Signal messages

原始链接: https://9to5mac.com/2026/04/09/fbi-used-iphone-notification-data-to-retrieve-deleted-signal-messages/

## FBI 从 iPhone 通知中恢复已删除的 Signal 消息 最近的庭审显示,FBI 通过访问苹果的内部通知存储,成功地从一部 iPhone 上恢复了已删除的 Signal 消息内容。此案涉及被指控破坏 ICE 拘留设施的个人,证词显示,在 Signal 应用卸载后,联邦调查局特工从被告林内特·夏普 (Lynette Sharp) 的手机中检索到了*接收*的 Signal 消息。 恢复成为可能的原因是夏普没有启用 Signal 设置来阻止消息在通知中预览。iOS 会缓存这些预览,即使在应用删除后,通知数据仍然可以访问。虽然确切的方法尚不清楚——可能涉及设备备份或利用 iOS 漏洞——但此案凸显了一个潜在的安全漏洞。 苹果最近更新了 iOS 推送通知令牌验证 (iOS 16.4),但尚未确认与此案的直接关联。Signal 和苹果均未对通知处理和存储的具体细节发表评论。此事件强调了在消息应用中启用隐私设置以限制数据暴露的重要性。

一份最新报告详细说明了联邦调查局(FBI)如何通过访问iPhone通知数据来恢复已删除的Signal消息。尽管Signal使用了端到端加密,但iOS会在内部数据库中存储已显示通知的历史记录。 联邦调查局利用这个iOS功能在消息从Signal应用程序完全删除*之前*检索消息内容。选择在iPhone通知中显示消息预览的用户尤其容易受到攻击,因为这些内容并未在iOS通知数据库中加密。 Signal建议禁用通知内容显示以减轻此风险,因为这是一种超出应用程序直接控制范围的漏洞。这凸显了一种潜在的隐私差距,即使是来自安全消息应用程序的数据,也可能通过操作系统级别的存储来访问。
相关文章

原文

A new report from 404 Media reveals that the FBI was able to recover deleted Signal messages from an iPhone by extracting data stored in the device’s notification database. Here are the details.

Notification history was accessed even after Signal was deleted

According to 404 Media, testimony in a recent trial involving “a group of people setting off fireworks and vandalizing property at the ICE Prairieland Detention Facility in Alvarado, Texas,” showed that the FBI was able to recover content of incoming Signal messages from a defendant’s iPhone, even though Signal had been removed from the device:

One of the defendants was Lynette Sharp, who previously pleaded guilty to providing material support to terrorists. During one day of the related trial, FBI Special Agent Clark Wiethorn testified about some of the collected evidence. A summary of Exhibit 158 published on a group of supporters’ website says, “Messages were recovered from Sharp’s phone through Apple’s internal notification storage—Signal had been removed, but incoming notifications were preserved in internal memory. Only incoming messages were captured (no outgoing).”

As 404 Media notes, Signal’s settings include an option that prevents the actual message content from being previewed in notifications. However, it appears the defendant did not have that setting enabled, which, in turn, seemingly allowed the system to store the content in the database.

404 Media reached out to Signal and Apple, but neither company provided any statements on how notifications are handled or stored.

But how does this internal storage work?

With little to no technical details about the exact condition of the defendant’s iPhone, it is obviously impossible to pinpoint the precise method the FBI used to recover the information.

For instance, there are multiple system states an iPhone can be in, each with its own security and data access constraints, such as BFU (Before First Unlock), AFU (After First Unlock) mode, and so on.

Security and data access also change even more dramatically when the device is unlocked, since the system assumes the user is present and permits access to a wider range of protected data.

That said, iOS does store and cache a lot of data locally, trusting that it can rely on these different states to keep that information safe but readily available in case the device’s rightful owner needs it.

Another important factor to keep in mind: the token used to send push notifications isn’t immediately invalidated when an app is deleted. And since the server has no way of knowing whether the app is still installed after the last notification it sent, it may continue pushing notifications, leaving it up to the iPhone to decide whether to display them.

Interestingly, Apple just changed how iOS validates push notification tokens on iOS 26.4. While it is impossible to tell whether this is a result of this case, the timing is still notable.

Post by @[email protected]

View on Mastodon

Back to the case, given Exhibit 158’s description that the messages “were recovered from Sharp’s phone through Apple’s internal notification storage,” it is possible the FBI extracted the information from a device backup.

In that case, there are many commercially available tools for law enforcement that exploit iOS vulnerabilities to extract data that could have helped the FBI access this information.

To read 404 Media’s original report of this case, follow this link.

Worth checking out on Amazon

FTC: We use income earning auto affiliate links. More.

联系我们 contact @ memedata.com