Skip to main content
  1. Home
  2. Phones
  3. How tos

The FBI just cracked open Signal texts on an iPhone. Here’s how to lock yours down

How investigators recovered Signal messages from an iPhone, and the settings you should change to stay protected.

Add as a preferred source on Google
Signal app banner on an iPhone.
Rachit Agarwal / Digital Trends

Signal has long been one of the most secure messaging apps available. It uses end-to-end encryption, collects very little data, and offers features like disappearing messages to keep conversations private. For many users, it’s the go-to app when privacy actually matters. While that hasn’t changed, a recent case shows how parts of your conversation may still be exposed. The good news is there’s an easy way to prevent this.

How the FBI recovered Signal messages from an iPhone

According to a report by 404 Media, the FBI recently managed to recover deleted Signal messages from an iPhone. The method did not involve breaking Signal’s encryption. Instead, investigators retrieved the messages from data stored by iOS itself.

Recommended Videos

To understand how this works, it helps to know how iPhones handle notifications. When message previews are enabled, iOS temporarily stores parts of incoming messages so they can be displayed in the notification preview. That data can persist outside the app, even after the messages are deleted within Signal or the app itself is deleted.

In this case, the FBI reportedly extracted those cached notification previews. Only incoming messages were recovered, based on available details, but that still means part of conversations can exist beyond Signal’s encrypted environment.

It’s worth noting that this is not a flaw in Signal’s encryption. Messages remain secure in transit and within the app. The issue lies in how iOS handles convenience features like notification previews, which can create a secondary copy of message content.

How to stop your iPhone from exposing Signal messages

There are two ways to plug this loophole. One involves changing your iPhone’s settings, while the other focuses on Signal itself. The former stops iOS from storing message previews, while the latter limits what the app allows to be shown outside its encrypted environment.

If you don’t want iOS to make a copy of message content, you should disable notification previews. To do this, head to Settings > Notifications > Show Previews, and set it to “When Unlocked” or “Never.” The first option ensures message content is only shown in previews when your phone is unlocked, while the second disables previews entirely and is the safer choice.

This method works well if you use multiple apps for private conversations, as it doesn’t require adjusting settings for each one individually. However, if you still want previews for other apps while disabling them for Signal, you can tweak the app’s settings instead.

Open Signal, tap the profile icon in the top left corner, and go to Settings > Notifications. Then tap on “Show” under the Notification Content section and select either “Name Only” or “No Name or Content.” This prevents message content from appearing in notification previews while still allowing you to receive alerts.

What this means for your privacy

This isn’t something most users need to worry about on a day-to-day basis. The kind of data extraction used in this case requires physical access to the device and is not a widespread vulnerability being exploited by authorities.

But it does highlight how privacy works in practice. Using a secure app is only part of the equation. The operating system, its default settings, and even small convenience features can affect how your data is actually protected.

Signal is still one of the most secure messaging apps you can use. But if you rely on it for private conversations, it’s worth taking a few minutes to make sure your iPhone isn’t undermining that security.

Pranob Mehrotra
Pranob is a seasoned tech journalist with over eight years of experience covering consumer technology. His work has been…
You can legally ask apps to delete your nudes, if you can navigate the maze
The Take It Down Act forces platforms to pull nonconsensual intimate images in 48 hours
how-to-remove-nudes-ai-deepfake-non-consensual-images

For years, victims of revenge porn and nonconsensual deepfake imagery had almost no reliable way to get that content taken down. State laws were all over the place, and tech platforms either dragged their feet or simply did not act. That is finally changing.

As of May 19, the Take It Down Act is now in full effect across the United States. It requires online platforms to remove nonconsensual intimate images, real or AI-generated, within 48 hours of receiving a valid report. Platforms that fail to comply face civil penalties of up to $53,088 per violation.

Read more
Google’s new tool will end the long wait for iOS apps to appear on your Android phone
Android may finally get iOS apps faster thanks to Google’s new AI tool
Google showcases Android Studio migrating iOS apps to Android

Android users are familiar with the usual game. A cool app launches on the iPhone first, and the Android version either takes months to hit the Play Store or never arrives at all. But Google may have a new way to make that wait shorter. At Google I/O 2026, the company previewed a new Migration Assistant inside Android Studio, designed to help developers port existing apps from platforms like iOS, React Native, and web frameworks into native Android apps.

How this could speed up Android ports

Read more
Samsung Galaxy S27 series could expand to four models with a new “Pro” variant
Galaxy S27 Pro could be Samsung’s answer to the iPhone Pro
Samsung S26 Plus

While the Galaxy S26 series skipped a fourth model, the Galaxy S27 lineup might be getting one of the biggest shake-ups in years. A new report from South Korea's ETNews, the company is planning on releasing a new model that sits right below the standard and Ultra variants. This new addition will reportedly be called the Galaxy S27 Pro.

Where does the Galaxy S27 Pro sit in Samsung's flagship line?

Read more