Top
Best
New

Posted by 01-_- 12 hours ago

FBI used iPhone notification data to retrieve deleted Signal messages(9to5mac.com)
534 points | 275 commentspage 3
shalmanese 10 hours ago|
I thought Signal didn’t show message previews by default and you had to go in and enable it? I’ve never had message previews in my Signal and I don’t remember changing anything. Maybe when they introduced the feature, you could pick but they strongly suggested it not showing?
foooorsyth 10 hours ago|
The opposite, actually. Signal endlessly nags you to turn on notifications, and when you turn them on, previews and content are shown by default. You cannot opt out of the nags.
commandersaki 8 hours ago||
According to my setting screen the Show Previews setting is "When Unlocked (Default)".

Screenshot of notification settings page: https://files.catbox.moe/3gwjoy.png

seydor 8 hours ago||
We are running out of Murphy's laws for digital communications. People will go back to physical messaging
coldtea 7 hours ago|
Younger people have largely abandonded even physical contact and talk, they ain't going back nowhere.
b8 7 hours ago||
Sounds like an intentional government feature. Just speculation though. I'm glad I have a Pixel, but I'm on the default OS and need to switch to GrapiousOS (secure version). Just haven't due to lack of nice Google features.
seethishat 8 hours ago||
A lot of dumb criminals seem to carry smart phones. The irony.
scarecrowbob 7 hours ago|
Probably, but these are people who are being charged for political "crimes" brought mostly because the government doesn't think people have a right to protest. While it's unsurprising that the citizen who discharged their weapon was tried for this, most of the other folks were just doing run-of-the-mill protest stuff.

I also get that in Texas they are fine "criminalizing" protesting, but that's just part of its hyper-authoritarian "charm", and a lot of us don't think that protesting in itself should be criminal.

snatekay 3 hours ago|||
The person whose Signal notifications were extracted, Lynette Sharp, was not the one who shot a cop in the neck, no. The reason she pleaded guilty to “providing material support to terrorists” is that she helped the shooter get away afterward and gave him a disguise; he remained on the lam for ten days.
inemesitaffia 4 hours ago|||
They are part of a larger direct action group.
kevincloudsec 9 hours ago||
everyone's arguing about whether apple or the government is to blame. the actual problem is the verification methods themselves. credit card, drivers license, or a pass card. three options that each create a centralized database linking your real identity to your device. age verification is just identity verification with a friendlier name.

the verification accepts other people's credit cards and IDs. so the 'age gate' doesn't even verify the person using the device, just that someone with a credit card touched it once. it's all the privacy cost of an identity check with none of the supposed child safety benefit

loeg 8 hours ago||
I think you're on the wrong thread?
xvector 5 hours ago||
It's an LLM.
dav 8 hours ago||
iOS Data Protection — The Four Classes

Data Protection is implemented by constructing and managing a hierarchy of keys, building on the hardware encryption technologies built into Apple devices. It's controlled on a per-file basis by assigning each file to a class; accessibility is determined by whether the class keys have been unlocked.

The four protection classes, from strongest to weakest:

NSFileProtectionComplete — Files are only accessible when the device is unlocked.

NSFileProtectionCompleteUnlessOpen — A file can only be opened when the device is unlocked, but is not closed when the device is locked — it's encrypted when the last open handle is closed. Suitable for data being uploaded in the background.

NSFileProtectionCompleteUntilFirstUserAuthentication — The resource cannot be accessed until after the device has booted. After the user unlocks the device for the first time, the app can access the resource and continue to do so even if the user subsequently locks the device. Fortify This is commonly called AFU (After First Unlock). This is the default class for all third-party app data not otherwise assigned to a Data Protection class.

NSFileProtectionNone — The resource has no special protections. It can be read or written at any time. The encryption only uses a key derived from the device's UID.

The BFU/AFU Distinction — The Heart of the Signal Issue

Apple's iOS devices operate in two key security states that directly impact data accessibility: Before First Unlock (BFU) and After First Unlock (AFU).

When an iPhone is in the BFU state, it has been powered on or rebooted but not yet unlocked with a passcode. In this state, the Secure Enclave does not release the decryption keys needed to access most user data.

Once you've unlocked once (AFU), files protected with NSFileProtectionCompleteUntilFirstUserAuthentication become accessible, the Keychain is available, and background processes and apps can access encrypted content as needed.

The Signal notification content issue connects here because notification data (including previews) stored in the default CompleteUntilFirstUserAuthentication class remains decryptable by any process — including OS-level forensic tools — as long as the phone has been unlocked at least once since the last reboot.

mnls 11 hours ago||
People who NEED to hide their notifications from iOS have this already disabled.

They rest who "evaluate their threat models" can practice Spy-life-gymnastics by disabling it from Signal.

phyzome 10 hours ago||
What a goofy comment.

The article you're commenting on is about people who obviously would have wanted this disabled, but didn't have it disabled, presumably because they didn't know about this issue.

xandrius 11 hours ago||
Victim blaming?
walmas 9 hours ago||
People also got charges in the same case for removing people from a Signal chat
nottorp 9 hours ago||
... and I thought I'm turning off notifications for all apps just so I don't get spammed. Looks like the setting is more useful than that.
jsdevtom 8 hours ago|
If I have access to the UI, I don't need to break your encryption.
More comments...