Your Phone's Push Notifications Are Secretly Snitching on You to the FBI
Key Takeaways
- The FBI retrieved encrypted Signal messages from push notifications stored in an iPhone's memory — even after Signal was deleted
- This vulnerability affects ALL apps that send push notifications, not just Signal
- You can protect yourself by changing notification settings to hide message content and sender names
- Iran's internet blackout has now exceeded 1,000 hours, becoming one of the longest in world history
Read in Short
The FBI accessed encrypted Signal messages through a loophole nobody talks about: push notifications. Even though Signal was deleted from the phone, the notification content stayed in memory. This affects every app that sends push notifications. Change your Signal settings NOW: Settings → Notifications → "No Name or Content."
The Encryption Backdoor Hiding in Plain Sight
Here's a security nightmare that should make you reconsider every notification you've ever received. According to a recent report from 404 Media, the FBI successfully obtained copies of encrypted Signal messages from a defendant's iPhone — but not by breaking Signal's famously robust encryption. Instead, they simply read the push notifications.
Let that sink in for a moment. You download Signal specifically because you want end-to-end encryption. You trust that your messages are secure. But every time your phone buzzes with a preview saying "Mom: Don't forget to pick up milk" or something far more sensitive, that content gets cached in your phone's internal memory. And it stays there. Even after you delete the app.
How This Actually Works
When you receive a push notification, your phone doesn't just flash it on your screen and forget about it. The notification data gets stored in various system logs and caches. Think of it like leaving sticky notes all over your house — sure, you threw away the original document, but the notes are still there for anyone who looks.
- Push notification content is stored in your phone's internal memory
- This data persists even after the originating app is uninstalled
- Law enforcement with physical access to your device can potentially recover this data
- The encryption that protects messages in transit doesn't protect notification previews
The irony is almost painful. Signal built an entire reputation on being the gold standard for secure messaging. Journalists, activists, whistleblowers — people whose lives literally depend on secure communications — flock to Signal precisely because of its encryption. But the weakest link isn't the encryption algorithm. It's the convenience feature that shows you who texted and what they said without unlocking your phone.
How to Actually Protect Yourself
Fix This Right Now
Open Signal → Settings → Notifications → Change to 'No Name or Content'. This prevents message previews from appearing in notifications and being cached by your phone's operating system.
The good news is that Signal gives you control over this. The bad news is that almost nobody uses these settings because, well, convenience. We've all become conditioned to glance at our lock screens to see who messaged us without picking up the phone. That convenience has a cost.
- Open Signal on your phone
- Tap Settings (gear icon)
- Select Notifications
- Change the notification setting to 'Name Only' (shows who messaged, not what) or 'No Name or Content' (maximum privacy)
- Consider doing this for other sensitive apps like banking, email, and health apps
But here's the thing — this isn't just a Signal problem. Every single app that sends push notifications with content previews potentially has this issue. Your banking app showing "Your balance is...", your email showing subject lines, your dating apps showing matches. All of it gets cached.
Understanding broader data vulnerabilities helps contextualize why even 'secure' apps can leak information
Meanwhile, Iran Hits a Dark Milestone
While Americans worry about push notification surveillance, tens of millions of Iranians are dealing with something far more severe: a complete internet blackout that has now exceeded 1,000 hours. That's over 41 days of digital darkness.
The shutdown began on February 28th, coinciding with the outbreak of the US-Israel conflict with Iran. According to internet monitoring group NetBlocks, this has become the longest internet shutdown in Iranian history and one of the longest worldwide. Ordinary citizens can't access accurate news about the war, can't contact family members, and are watching their economy crumble further.
Perhaps most chillingly, the Iranian regime has labeled anti-censorship tools as "malicious" and claims to have arrested people using Starlink satellite connections to bypass the block. The US-based Iranian digital rights project Filter Watch has been documenting these developments, painting a picture of a government determined to control the information landscape even while under military pressure.
Anthropic's Controversial New AI
In other security news that's raising eyebrows across the tech world, Anthropic announced Claude Mythos Preview this week — and the rollout strategy is... unusual. Instead of the typical public beta or gradual release, Anthropic is limiting access to a select group of a few dozen major tech and financial organizations including Apple, Microsoft, Google, and the Linux Foundation.
The reason? Mythos Preview apparently has advanced hacking and cybersecurity capabilities that Anthropic believes need careful handling. The consortium, called Project Glasswing, will explore these capabilities and figure out how to improve defenses before similar abilities inevitably spread to other AI models and end up in attackers' hands.
“While it may not be a dramatic catastrophe, it is important for defenders to come together and use their early access to make changes in how software is developed and how organizations around the world invest in patching.”
— Security experts speaking to WIRED

The announcement sparked immediate controversy. Is Anthropic being responsible by limiting access? Or is this security theater that won't actually prevent these capabilities from spreading? The jury's still out, but the fact that we're having this conversation shows how far AI has come — and how worried the industry is about where it's going.
Deep dive into why organizations consistently underestimate digital threats until it's too late
The Bigger Picture: We're All Vulnerable
This week's security roundup paints a consistent picture: the systems we trust to protect us often have holes we never considered. Encrypted messaging apps leak through push notifications. Governments can flip a switch and cut off millions from the internet. AI systems designed to help might also be capable of significant harm.
- US political candidates are spending record amounts on personal security, including bulletproof vests
- Syria's government account hijacks exposed fundamental cybersecurity weaknesses
- Telegram groups are being used to share nonconsensual images and purchase spyware
- China is selectively enforcing against Southeast Asian scam syndicates, causing criminals to shift focus
The cryptocurrency scam situation deserves its own mention — Americans lost record amounts to crypto scams this year, though the source article was cut off before the full figures. What we do know is that industrial-scale scamming originating from Southeast Asia has become such a problem that governments worldwide are scrambling to address it.
What You Should Do Right Now
Your Security Checklist
1) Change push notification settings on sensitive apps to hide content. 2) Review which apps have notification access on your phone. 3) Consider which apps really need to show previews on your lock screen. 4) Remember that convenience and security are often opposing forces.
The push notification vulnerability is a perfect example of how security fails in practice. The engineers at Signal built an incredibly secure messaging protocol. The encryption is mathematically sound. But humans are humans, and we want to see our messages without unlocking our phones. That tiny convenience created a hole that law enforcement happily drove a truck through.
Every security decision is a tradeoff. The question isn't whether you're willing to be slightly less convenient for slightly more security — it's whether you understand what you're trading away when you choose convenience. Now you know. The rest is up to you.
Frequently Asked Questions
Does this affect Android phones too?
Yes. While the specific case involved an iPhone, Android phones also cache push notification content. The same vulnerability exists across both platforms.
If I delete messages in Signal, are they still in push notifications?
Potentially yes. Deleting messages in the app doesn't delete cached notification data from your phone's system memory.
Are other encrypted apps like WhatsApp affected?
Any app that shows message content in push notifications is potentially affected. This includes WhatsApp, Telegram, and others unless you disable content previews.
Can I remove the cached notification data?
It's complicated. Factory resetting your phone would clear it, but there's no easy way to selectively delete cached notification data on most devices.
Final Thoughts
Security isn't just about the big dramatic hacks. It's about the quiet vulnerabilities hiding in features we use every day without thinking. Push notifications are convenient. They're also potential evidence sitting in your phone's memory, waiting to be discovered. The FBI knows this. Now you do too.
Sources & Credits
Originally reported by Feed: Artificial Intelligence Latest — Matt Burgess
Manaal Khan
Tech & Innovation Writer
Related Articles
Browse allX Just Launched a Standalone Messaging App and It's Actually Got Some Wild Features
Epic's $1.5 Billion Disney Bet Just Got Way More Interesting (And Risky)
You Can Now Legally Make Moonshine at Home and the Government Can't Stop You

Your Gaming PC Can Now Generate Entire 3D Worlds in Real-Time, and It's Kind of Insane
Also Read

Tesla Full Self-Driving Approved in Netherlands: Europe's First FSD Country and What It Means for EU Expansion
