logoalt Hacker News

FBI used iPhone notification data to retrieve deleted Signal messages

510 pointsby 01-_-today at 11:29 AM260 commentsview on HN

Comments

upofadowntoday at 4:17 PM

Putting on my user hat...

"OK. Signal has forward secrecy. So messages are gone after I receive them. Great!"

Oh, you didn't turn on disappearing messages? Oh, right, then forensic tools like Cellebrite can get them. You have to turn on disappearing messages. The default is off.

Oh, you did turn on disappearing messages? We send the messages in notifications. So the OS can keep them. Turns out Apple was doing that. There is an option you can turn on to prevent that. It is off by default.

"I'll just delete the entire app!" No, sorry, the OS still has your messages...

At what point does the usability get so bad that we can blame the messaging system?

This same app had a usability issue that turned into a security issue just last year:

End to End Encrypted Messaging in the News: An Editorial Usability Case Study (my article)

https://articles.59.ca/doku.php?id=em:sg

show 4 replies
jonpalmisctoday at 12:18 PM

Settings > Notifications > Notification Content > Show: "Name Only" or "No Name or Content"

I've had this enabled to prevent sensitive messages from appearing in full whilst showing someone something on my phone, but I guess this is an added benefit as well.

show 9 replies
chasiltoday at 12:00 PM

First, a critical setting for Signal users:

"Signal’s settings include an option that prevents the actual message content from being previewed in notifications. However, it appears the defendant did not have that setting enabled, which, in turn, seemingly allowed the system to store the content in the database."

Second, how can I see this notification history?

show 7 replies
piggggtoday at 2:48 PM

Just curious, how come at least once a month signal bugs me to turn on notifications? I said no for a reason, every single time - why does it keep asking?

Not implying anything evil but it feels a bit weird esp after this.

show 6 replies
blitzartoday at 1:04 PM

> testimony in a recent trial

Court cases are the real way to audit security.

Larping about security and complaining about companies responding to court orders only gets you so far. Its way more useful to look at what actually happens in reality.

show 5 replies
1vuio0pswjnm7today at 2:38 PM

"However, it appears the defendant did not have that setting enabled, which, in turn, seemingly allowed the system to store the content in the database."

"[A]llowing the system to store the content in the database" where a third party, such as Apple or a government, can access it is the default

Only a small minority of users know about settings and how to change them. The vast majority of users do not change default settings. Apple knows this

show 4 replies
AlBugdytoday at 6:07 PM

So Signal is sending the notifications through Apple's ecosystem somehow, presumably to save battery life by not having a persistent connection to Signal's servers? That's what I think happens on Android, too. When I had Lineage years ago, I had a persistent connection to Signal as the notifications didn't come through Google. Unfortunately there was a persistent notification for the persistent connection with no way to remove it.

After these news Signal should ask the users ASAP and on new installs something like:

> Do you want the notifications to pass through Apple (no privacy, better battery) or through Signal itself (better privacy, but less battery life due to the persistent connection to Signal's servers.

It should be as part of the setup wizard, not inside the settings.

Correct me if I've misunderstood something.

show 2 replies
alsetmusictoday at 1:02 PM

Original article: FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database[0]

0. https://www.404media.co/fbi-extracts-suspects-deleted-signal...

show 1 reply
niek_pastoday at 12:58 PM

I wonder why Apple doesn't 'just' delete the notification data associated with the app from the internal database when the user deletes the app? It seems like asking for problems to just keep old notification content around forever.

show 4 replies
6thbittoday at 1:57 PM

So this is where we find out the one end of e2e is the phone and not the app.

Semi-related, in whatsapp reading the text in the notification doesn't mark the message as read, so the OS is kinda mitm here.

show 1 reply
donohoetoday at 3:49 PM

Was this not a known issue (in terms of trade-offs) for years? I recall discussion back in 2018 at least that made mention of this concern.

https://github.com/RealityNet/iOS-Forensics-References https://theforensicscooter.com/2021/10/03/ios-knowledgec-db-...

halaprotoday at 3:25 PM

While it's definitely surprising that the OS caches this data after the notifications have been swiped away, I always thought that notifications are an obvious hole in the whole E2E encryption setup.

show 1 reply
ttkaritoday at 6:24 PM

This is the same issue that got a local drug organization busted some time ago - their entire α-PVP cooking operation was busted after one of the gang members was caught during a sale, his iphone was confiscated and the entire org was right there in the notification history.

I guess that's what you deserve if you trust apple with your operational security.

chinathrowtoday at 12:22 PM

On Android, when I use WhatsApp and have notifications for groups turned off, I can still see that they arrive briefly and then get removed (the icon top left vanishes). I wonder often, if this is a way to push all group message content into an unencrypted data trace as well - for the same use case.

show 2 replies
SwtCybertoday at 4:58 PM

This is one of those cases where the "secure app" narrative collides with how messy real systems actually are

kouru225today at 6:18 PM

I don’t know why anyone trusts Signal. People keep talking about them. I thought it was clear years ago that they were a sketchy company

frizlabtoday at 11:48 AM

Aren’t notifications supposed to be encrypted for Signal?

show 5 replies
echelon_musktoday at 1:42 PM

As an aside, I decrypted an encrypted iPhone backup using a tool from GitHub because I wanted easy access to my Voice Memo recordings.

Photos I had long deleted were still in the backup! It's quite surprising just how much is being stored by the phone.

show 1 reply
shalmanesetoday at 12:47 PM

I thought Signal didn’t show message previews by default and you had to go in and enable it? I’ve never had message previews in my Signal and I don’t remember changing anything. Maybe when they introduced the feature, you could pick but they strongly suggested it not showing?

show 1 reply
seydortoday at 3:28 PM

We are running out of Murphy's laws for digital communications. People will go back to physical messaging

show 1 reply
b8today at 3:55 PM

Sounds like an intentional government feature. Just speculation though. I'm glad I have a Pixel, but I'm on the default OS and need to switch to GrapiousOS (secure version). Just haven't due to lack of nice Google features.

seethishattoday at 3:39 PM

A lot of dumb criminals seem to carry smart phones. The irony.

show 1 reply
kevincloudsectoday at 2:42 PM

everyone's arguing about whether apple or the government is to blame. the actual problem is the verification methods themselves. credit card, drivers license, or a pass card. three options that each create a centralized database linking your real identity to your device. age verification is just identity verification with a friendlier name.

the verification accepts other people's credit cards and IDs. so the 'age gate' doesn't even verify the person using the device, just that someone with a credit card touched it once. it's all the privacy cost of an identity check with none of the supposed child safety benefit

show 2 replies
davtoday at 3:36 PM

iOS Data Protection — The Four Classes

Data Protection is implemented by constructing and managing a hierarchy of keys, building on the hardware encryption technologies built into Apple devices. It's controlled on a per-file basis by assigning each file to a class; accessibility is determined by whether the class keys have been unlocked.

The four protection classes, from strongest to weakest:

NSFileProtectionComplete — Files are only accessible when the device is unlocked.

NSFileProtectionCompleteUnlessOpen — A file can only be opened when the device is unlocked, but is not closed when the device is locked — it's encrypted when the last open handle is closed. Suitable for data being uploaded in the background.

NSFileProtectionCompleteUntilFirstUserAuthentication — The resource cannot be accessed until after the device has booted. After the user unlocks the device for the first time, the app can access the resource and continue to do so even if the user subsequently locks the device. Fortify This is commonly called AFU (After First Unlock). This is the default class for all third-party app data not otherwise assigned to a Data Protection class.

NSFileProtectionNone — The resource has no special protections. It can be read or written at any time. The encryption only uses a key derived from the device's UID.

The BFU/AFU Distinction — The Heart of the Signal Issue

Apple's iOS devices operate in two key security states that directly impact data accessibility: Before First Unlock (BFU) and After First Unlock (AFU).

When an iPhone is in the BFU state, it has been powered on or rebooted but not yet unlocked with a passcode. In this state, the Secure Enclave does not release the decryption keys needed to access most user data.

Once you've unlocked once (AFU), files protected with NSFileProtectionCompleteUntilFirstUserAuthentication become accessible, the Keychain is available, and background processes and apps can access encrypted content as needed.

The Signal notification content issue connects here because notification data (including previews) stored in the default CompleteUntilFirstUserAuthentication class remains decryptable by any process — including OS-level forensic tools — as long as the phone has been unlocked at least once since the last reboot.

mnlstoday at 12:28 PM

People who NEED to hide their notifications from iOS have this already disabled.

They rest who "evaluate their threat models" can practice Spy-life-gymnastics by disabling it from Signal.

show 2 replies
walmastoday at 2:39 PM

People also got charges in the same case for removing people from a Signal chat

nottorptoday at 2:44 PM

... and I thought I'm turning off notifications for all apps just so I don't get spammed. Looks like the setting is more useful than that.

jsdevtomtoday at 3:29 PM

If I have access to the UI, I don't need to break your encryption.

lowbloodsugartoday at 4:54 PM

Terrorism charges. That’s what we should be talking about.

show 1 reply
SilverElfintoday at 4:36 PM

Is there a way to delete all Apple notification history from Apple’s servers?

sneaktoday at 4:36 PM

How convenient that Apple can turn a blind eye to this, and maintain their useful fiction that they don’t provide law enforcement backdoors.

Privacy, that’s Apple: https://www.reuters.com/article/world/exclusive-apple-droppe...

lenerdenatortoday at 12:07 PM

There needs to be a bit more "group chat" control in Signal messages, wherein you could enforce certain settings for certain chats regardless of the phone settings. You could have group chats that would enforce not showing more information in the notifications, while others would still allow it.

show 1 reply
i_am_proteustoday at 12:07 PM

Reminder that no end-to-end encryption arrangement can do anything before encryption, or after decryption, at the endpoints.

show 1 reply
ChrisArchitecttoday at 2:18 PM

[dupe] Discussion on source: https://news.ycombinator.com/item?id=47703573

SergeAxtoday at 1:27 PM

Probably stupid question: why won't they e2e-encrypt push notifications too? The vector is obvious and has been open since forever.

show 3 replies
SilasXtoday at 4:33 PM

Hmmm this is interesting. Because I've long had the complaint that notifications are frustratingly ephemeral. There have been many cases where I've gotten a notification that my phone clearly has but which I can't read, because when I tap it, it's purged permanently, and then I have a spotty internet connection, so I can't see it in the actual app that loaded.

I'm always like "JFC, can't you cache the notifications, so I can see it there while waiting for the app to gets its act together?" But no, that's never an option.

So I'm getting a laugh out of how notifications last long enough to be extracted by someone just not the person that they're for. (Though to be fair, it could be a case of a notification that was never tapped, and therefore hadn't been purged yet. I couldn't tell from the story.)

lofaszvanitttoday at 3:42 PM

Sigh, just the usual. If you don't know the platform's nuances, you are fckd.

nixosbestostoday at 1:43 PM

Um. Android has notification history also and I see no similar ability to hide notification content from the system ...

show 2 replies
dfir-labtoday at 1:03 PM

[dead]

iririririrtoday at 3:20 PM

[dead]

kometoday at 12:22 PM

signal is security theater, and a very bad user experience

show 1 reply
bharat1010today at 3:08 PM

Kind of a wake-up call that even "deleted" messages aren't really gone if the OS is caching notification previews — makes you rethink what end-to-end encryption actually protects you from.