
The 404 Media Podcast How the FBI Extracted Deleted Signal Messages
42 snips
Apr 16, 2026 Matthew Gould, infrastructure and data center reporter, breaks down how deleted Signal messages were recovered from an iPhone notification database. He also covers Maine’s proposed moratorium on large data centers and local backlash to secretive projects. Short takes on town hall arrests and nationwide resistance to rapid data center expansion.
AI Snips
Chapters
Transcript
Episode notes
Deleted Signal Messages Persist In iPhone Notifications
- Secure messaging apps can leave traces outside the app itself on the phone's OS notification database.
- In the Prairieland Detention Center case the FBI forensically extracted deleted Signal messages from an iPhone notification database after the app was removed.
Forensic Extraction Is A Separate Threat From Server Privacy
- Forensic extraction is a distinct black box separate from server-side privacy guarantees of apps like Signal.
- Even when Signal stores minimal server-side metadata, physical access plus tools like Cellebrite or GrayKey and OS-level artifacts can reveal messages.
Hide Signal Previews To Reduce Stored Notification Data
- Change Signal notification content settings to hide message previews to reduce the amount of message text stored in the iPhone notification database.
- Signal offers options (name and preview, name only, nothing) that appear to limit what the OS saves and may mitigate forensic extraction.

