{"id":882,"date":"2026-04-23T12:01:45","date_gmt":"2026-04-23T12:01:45","guid":{"rendered":"https:\/\/www.gonetech.net\/blog\/?p=882"},"modified":"2026-04-23T12:20:01","modified_gmt":"2026-04-23T12:20:01","slug":"ios-26-4-2-fbi-signal-deleted-messages-fix","status":"publish","type":"post","link":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/","title":{"rendered":"iOS 26.4.2 FBI Signal Fix: Does It Really Protect Your Deleted Messages? (CVE-2026-28950 Fully Explained)"},"content":{"rendered":"<p><strong>Published: April 23, 2026 \u00a0|\u00a0 Last Updated: April 23, 2026<\/strong><\/p>\n<p>So you heard the headline: <strong>the FBI recovered deleted Signal messages from an iPhone<\/strong> \u2014 even after the app was completely deleted. Then Apple rushed out iOS 26.4.2 two weeks later. Now you&#8217;re wondering: is my iPhone actually safe now, or is this just another tech company saying &#8220;trust us&#8221;?<\/p>\n<p>We dug into the Apple security bulletin, the original court testimony, the 404 Media report that broke the story, and Signal&#8217;s own public response. Here is a clear, no-nonsense breakdown of <strong>what the bug actually was, how the FBI used it, what Apple&#8217;s patch really does, and \u2014 most importantly \u2014 what you still need to do yourself<\/strong> even after updating.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Quick_Answer_What_Does_iOS_2642_Actually_Fix\" >Quick Answer: What Does iOS 26.4.2 Actually Fix?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#iOS_2641_vs_iOS_2642_Security_Comparison_at_a_Glance\" >iOS 26.4.1 vs iOS 26.4.2: Security Comparison at a Glance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#The_Real_Story_How_the_FBI_Actually_Read_Deleted_Signal_Messages\" >The Real Story: How the FBI Actually Read Deleted Signal Messages<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#What_Was_CVE-2026-28950_Exactly_Explained_Simply\" >What Was CVE-2026-28950 Exactly? (Explained Simply)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#What_iOS_2642_Actually_Changes_Under_the_Hood\" >What iOS 26.4.2 Actually Changes Under the Hood<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#What_You_Still_Need_to_Do_After_Updating_to_iOS_2642\" >What You Still Need to Do After Updating to iOS 26.4.2<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Step_1_Confirm_You_Are_on_iOS_2642\" >Step 1: Confirm You Are on iOS 26.4.2<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Step_2_Turn_Off_Signal_Notification_Previews\" >Step 2: Turn Off Signal Notification Previews<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Step_3_Understand_What_Signals_Disappearing_Messages_Do_and_Do_NOT_Do\" >Step 3: Understand What Signal&#8217;s Disappearing Messages Do and Do NOT Do<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Step_4_For_High-Risk_Users_%E2%80%94_The_Nuclear_Option\" >Step 4: For High-Risk Users \u2014 The Nuclear Option<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Which_iPhones_and_iPads_Get_the_iOS_2642_Patch\" >Which iPhones and iPads Get the iOS 26.4.2 Patch?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Is_Signal_Still_Secure_After_All_This\" >Is Signal Still Secure After All This?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#The_Gap_Nobody_Is_Clearly_Explaining_%E2%80%9CBefore_First_Unlock%E2%80%9D_vs_%E2%80%9CAfter_First_Unlock%E2%80%9D\" >The Gap Nobody Is Clearly Explaining: &#8220;Before First Unlock&#8221; vs &#8220;After First Unlock&#8221;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Does_This_Affect_WhatsApp_Telegram_and_Other_Messaging_Apps_Too\" >Does This Affect WhatsApp, Telegram, and Other Messaging Apps Too?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Can_the_FBI_still_recover_deleted_Signal_messages_after_iOS_2642\" >Can the FBI still recover deleted Signal messages after iOS 26.4.2?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Does_iOS_2642_fix_the_problem_for_iPhone_10_or_older\" >Does iOS 26.4.2 fix the problem for iPhone 10 or older?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Did_Signal_do_anything_wrong_here\" >Did Signal do anything wrong here?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Does_this_mean_my_iMessages_and_regular_texts_were_also_stored_this_way\" >Does this mean my iMessages and regular texts were also stored this way?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#What_is_the_%E2%80%9CShow_Previews_Never%E2%80%9D_setting_actually_doing\" >What is the &#8220;Show Previews: Never&#8221; setting actually doing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Should_I_use_Signals_%E2%80%9CNote_to_Self%E2%80%9D_feature_to_clear_old_messages\" >Should I use Signal&#8217;s &#8220;Note to Self&#8221; feature to clear old messages?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Will_iOS_2643_do_anything_more_about_this\" >Will iOS 26.4.3 do anything more about this?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Watch_iOS_2642_FBI_Notification_Bug_Explained\" >Watch: iOS 26.4.2 FBI Notification Bug Explained<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#Your_Complete_Action_Checklist_Right_Now\" >Your Complete Action Checklist Right Now<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#References_and_Sources\" >References and Sources<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Quick_Answer_What_Does_iOS_2642_Actually_Fix\"><\/span>Quick Answer: What Does iOS 26.4.2 Actually Fix?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>iOS 26.4.2, released April 22, 2026, patches CVE-2026-28950.<\/strong> This was a flaw where deleted notifications \u2014 including Signal message previews \u2014 were silently staying saved inside a hidden system database on your iPhone, even after you deleted the app. Apple&#8217;s fix adds improved data redaction so that when a notification is marked for deletion, the content is actually, permanently erased from that database. <strong>The fix applies to iPhone 11 and later.<\/strong> If you are still on iOS 26.4.1 or earlier, your deleted notification previews are still recoverable by anyone with physical access to your phone and the right forensic tools.<\/p>\n<p><!-- SECURITY STATUS TABLE --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"iOS_2641_vs_iOS_2642_Security_Comparison_at_a_Glance\"><\/span>iOS 26.4.1 vs iOS 26.4.2: Security Comparison at a Glance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"8\">\n<thead>\n<tr>\n<th>Feature<\/th>\n<th>iOS 26.4.1 (Vulnerable)<\/th>\n<th>iOS 26.4.2 (Patched)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Notification data deleted properly<\/td>\n<td>No \u2014 data silently retained<\/td>\n<td>Yes \u2014 improved data redaction<\/td>\n<\/tr>\n<tr>\n<td>Signal message previews recoverable<\/td>\n<td>Yes \u2014 via forensic tools<\/td>\n<td>No \u2014 erased at logging level<\/td>\n<\/tr>\n<tr>\n<td>FBI \/ Cellebrite forensic extraction<\/td>\n<td>Possible with physical device access<\/td>\n<td>Blocked for future notifications<\/td>\n<\/tr>\n<tr>\n<td>Signal end-to-end encryption<\/td>\n<td>Unaffected (working fine)<\/td>\n<td>Unaffected (still working fine)<\/td>\n<\/tr>\n<tr>\n<td>Old cached notifications (pre-patch)<\/td>\n<td>Recoverable<\/td>\n<td>Still present until overwritten by iOS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>One important thing nobody else is clearly saying:<\/strong> iOS 26.4.2 protects you going forward. But if your phone had the bug before you updated, old cached notification previews already stored in the database do not vanish the moment you install the patch. They persist until iOS gradually overwrites them over time. We will explain how to deal with that below.<\/p>\n<p><!-- WHAT ACTUALLY HAPPENED --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Real_Story_How_the_FBI_Actually_Read_Deleted_Signal_Messages\"><\/span>The Real Story: How the FBI Actually Read Deleted Signal Messages<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This whole situation came to light through courtroom testimony. Not a hack. Not a government leak. <strong>An FBI agent stood up in a federal trial and described exactly how they did it.<\/strong><\/p>\n<p>The case involved a defendant named Lynette Sharp, who was connected to an alleged attack on the ICE Prairieland Detention Facility in Alvarado, Texas. <strong>She had deleted Signal from her iPhone.<\/strong> She presumably thought that was the end of it. It was not.<\/p>\n<p>FBI Special Agent Clark Wiethorn testified that investigators were able to forensically extract copies of incoming Signal messages from the defendant&#8217;s iPhone, even after the app had been deleted, because copies of the content had been saved in the device&#8217;s push notification database.<\/p>\n<p>Here is the technical pipeline that made this possible, explained simply:<\/p>\n<ol>\n<li><strong>You receive a Signal message.<\/strong> It arrives encrypted. Signal decrypts it on your device. So far, the encryption is doing its job perfectly.<\/li>\n<li><strong>Signal creates a notification.<\/strong> If you have message previews turned on (which is the default setting most people never change), Signal hands the actual message text to iOS to show on your lock screen.<\/li>\n<li><strong>iOS stores the notification preview.<\/strong> The messages were sitting in the iPhone&#8217;s BulletinBoard framework \u2014 the system iOS uses to manage notifications \u2014 completely independent of the Signal app itself. This folder lives at <code>\/private\/var\/mobile\/Library\/BulletinBoard\/<\/code> on the device.<\/li>\n<li><strong>You delete Signal.<\/strong> The app is gone. But those database entries in BulletinBoard? Still there.<\/li>\n<li><strong>Forensic tools pull the data.<\/strong> Forensic experts used tools such as Cellebrite to pull the data from the device&#8217;s push notification cache, where iOS stores content from messaging apps for lock screen previews. The database can retain this information for weeks, independent of Signal&#8217;s end-to-end encryption or self-destructing message timers.<\/li>\n<\/ol>\n<p>This is the part that trips everyone up: <strong>Signal&#8217;s encryption was never broken.<\/strong> The FBI did not crack Signal. What they found was the decrypted text that had already been handled over to Apple&#8217;s own notification system. Once iOS had that text, it was Apple&#8217;s system storing it \u2014 and Apple&#8217;s system had a bug where it was not deleting it properly.<\/p>\n<p>This means every messaging app with content previews is affected \u2014 WhatsApp, Telegram, iMessage, even email apps. Signal just got the headlines because it is the app people use specifically because they want privacy.<\/p>\n<p><!-- THE BUG --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_Was_CVE-2026-28950_Exactly_Explained_Simply\"><\/span>What Was CVE-2026-28950 Exactly? (Explained Simply)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The vulnerability, tracked as CVE-2026-28950, was found in Apple&#8217;s Notification Services framework. This component displays message previews when users receive notifications. Normally, when a notification is dismissed, the system is expected to delete any associated data immediately. However, due to a logging error, dismissed notifications were not fully erased. Instead, fragments of message content remained stored in local system logs. Over time, this created a hidden archive of previously received notifications, including potentially sensitive information from encrypted messaging platforms.<\/p>\n<p>Think of it like this. Imagine you write a secret note on a whiteboard, take a photo of it, erase the whiteboard, and then throw away the original note. You think it is gone. But the photo is still sitting in a folder on the computer connected to the projector. That folder is the notification database. Deleting Signal is like erasing the whiteboard \u2014 it does not touch the photo.<\/p>\n<p><strong>Apple&#8217;s own description of the bug<\/strong>, from the official security bulletin, reads: &#8220;Notifications marked for deletion could be unexpectedly retained on the device.&#8221; Apple said the fix came through improved data redaction.<\/p>\n<p><!-- THE FIX --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_iOS_2642_Actually_Changes_Under_the_Hood\"><\/span>What iOS 26.4.2 Actually Changes Under the Hood<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Apple addressed the root cause through improved data redaction in its logging framework. In plain English: when a notification is now marked for deletion in iOS 26.4.2, the system properly scrubs the content from its logs before the entry is written to the database. It does not just mark it as deleted and leave the data sitting there \u2014 the actual text gets wiped at the moment of redaction.<\/p>\n<p>Improved data redaction is now applied at the logging level, preventing sensitive content from persisting in the first place.<\/p>\n<p>This is a meaningful fix. It means future notifications will not accumulate in that hidden database. However \u2014 and this is the gap most coverage is skipping past \u2014 <strong>it does not retroactively erase notifications that were already stored before you updated.<\/strong><\/p>\n<p>If you have been running Signal with default notification settings, your notification database already contains cached message content. Changing the setting only prevents future messages from being stored. Old artifacts persist until they are overwritten by the system \u2014which iOS does eventually, but there is no way to force it using standard settings. However, you can follow our technical guide on <b data-path-to-node=\"5,1,1,0\" data-index-in-node=\"135\"><a class=\"ng-star-inserted\" href=\"https:\/\/www.gonetech.net\/blog\/prevent-signal-notification-storage-iphone-fbi\/\" target=\"_blank\" rel=\"noopener\" data-hveid=\"0\" data-ved=\"0CAAQ_4QMahgKEwjrlNus94OUAxUAAAAAHQAAAAAQhwE\">how to wipe iPhone notification databases<\/a><\/b> to manually clear the KnowledgeC.db files.<\/p>\n<p><!-- WHAT YOU STILL NEED TO DO --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_You_Still_Need_to_Do_After_Updating_to_iOS_2642\"><\/span>What You Still Need to Do After Updating to iOS 26.4.2<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Updating is step one. But if privacy is genuinely important to you, here is what our team recommends as the full checklist. In our testing on iOS 26 devices, we found that simply updating does not change your Signal notification settings \u2014 you have to do that part manually.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Step_1_Confirm_You_Are_on_iOS_2642\"><\/span>Step 1: Confirm You Are on iOS 26.4.2<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Go to <strong>Settings \u2192 General \u2192 About<\/strong>. Check the iOS Version. It must say 26.4.2. If it says anything earlier, go to <strong>Settings \u2192 General \u2192 Software Update<\/strong> and install it now. The update is around 670\u2013770 MB according to Apple.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Step_2_Turn_Off_Signal_Notification_Previews\"><\/span>Step 2: Turn Off Signal Notification Previews<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To reduce exposure, users can disable message previews: In iOS Settings \u2192 Notifications \u2192 Show Previews, select &#8220;Never&#8221; for a global change or per app. Within Signal, go to Settings \u2192 Notifications and set &#8220;Notification Content&#8221; to &#8220;No Name or Content.&#8221;<\/p>\n<p>Experts recommend both steps, as disabling previews at the system level prevents iOS from caching the content. One alone is not enough in all situations.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Step_3_Understand_What_Signals_Disappearing_Messages_Do_and_Do_NOT_Do\"><\/span>Step 3: Understand What Signal&#8217;s Disappearing Messages Do and Do NOT Do<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This is something most guides miss completely. Signal&#8217;s disappearing messages delete content after a set time on the device and for recipients, but they do not erase cached notification previews if those were displayed before deletion. So even if you have disappearing messages turned on, if you had previews enabled, those previews are already in the BulletinBoard database and disappearing messages do nothing about them.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Step_4_For_High-Risk_Users_%E2%80%94_The_Nuclear_Option\"><\/span>Step 4: For High-Risk Users \u2014 The Nuclear Option<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For high-risk individuals: a full device wipe and restore \u2014 not from backup, which may include the notification database \u2014 is the nuclear option. Most people do not need to go that far. Just change the setting and move forward.<\/p>\n<p>That said, if you have reason to believe you may be subject to investigation, or you handle professionally sensitive communications, wiping and setting up your device as new (not restoring from a backup) is the only guaranteed way to clear the existing notification cache.<\/p>\n<p><!-- COMPATIBLE DEVICES --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Which_iPhones_and_iPads_Get_the_iOS_2642_Patch\"><\/span>Which iPhones and iPads Get the iOS 26.4.2 Patch?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The fix applies to: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later.<\/p>\n<p>If you are on an older device that cannot run iOS 26, Apple has also released <strong>iOS 18.7.8<\/strong> with the same CVE-2026-28950 fix. The iOS 26.4.2, iPadOS 26.4.2, iOS 18.7.8, and iPadOS 18.7.8 updates that Apple released on April 22 all address the same security vulnerability. So if you are still on iOS 18 for any reason, go to <strong>Settings \u2192 General \u2192 Software Update<\/strong> and look for iOS 18.7.8.<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"8\">\n<thead>\n<tr>\n<th>Device<\/th>\n<th>Fix Available In<\/th>\n<th>Action<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>iPhone 16, 16 Plus, 16 Pro, 16 Pro Max<\/td>\n<td>iOS 26.4.2<\/td>\n<td>Update now<\/td>\n<\/tr>\n<tr>\n<td>iPhone 15, 15 Plus, 15 Pro, 15 Pro Max<\/td>\n<td>iOS 26.4.2<\/td>\n<td>Update now<\/td>\n<\/tr>\n<tr>\n<td>iPhone 14 series<\/td>\n<td>iOS 26.4.2<\/td>\n<td>Update now<\/td>\n<\/tr>\n<tr>\n<td>iPhone 13 series<\/td>\n<td>iOS 26.4.2<\/td>\n<td>Update now<\/td>\n<\/tr>\n<tr>\n<td>iPhone 12 series<\/td>\n<td>iOS 26.4.2<\/td>\n<td>Update now<\/td>\n<\/tr>\n<tr>\n<td>iPhone 11 series<\/td>\n<td>iOS 26.4.2<\/td>\n<td>Update now<\/td>\n<\/tr>\n<tr>\n<td>Older devices on iOS 18<\/td>\n<td>iOS 18.7.8<\/td>\n<td>Update now<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- IS SIGNAL STILL SECURE --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Is_Signal_Still_Secure_After_All_This\"><\/span>Is Signal Still Secure After All This?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Yes. And it is really important to understand why.<\/p>\n<p>Signal&#8217;s end-to-end encryption was never the problem. Not once in this entire story was Signal&#8217;s protocol compromised, cracked, or even challenged. <strong>The FBI never broke Signal&#8217;s encryption.<\/strong> What they exploited was an Apple operating system bug that stored notification previews in an unprotected part of the filesystem.<\/p>\n<p>Signal actually responded publicly and praised Apple for the quick response. Signal said in an X post: &#8220;We&#8217;re grateful to Apple for the quick action here, and for understanding and acting on the stakes of this kind of issue. It takes an ecosystem to preserve the fundamental human right to private communication.&#8221;<\/p>\n<p>Signal&#8217;s settings include an option that prevents the actual message content from being previewed in notifications. The defendant in the Texas case did not appear to have had that setting enabled, which seemingly allowed the system to store the content in the database.<\/p>\n<p>So the combination of <strong>iOS 26.4.2 + Signal with &#8220;No Name or Content&#8221; notifications enabled<\/strong> gives you the strongest protection possible right now. Signal CEO Meredith Whitaker had actually flagged this publicly even before Apple&#8217;s patch, pointing out that notifications for deleted messages should not remain in any OS notification database.<\/p>\n<p><!-- THE GAP NOBODY IS COVERING --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Gap_Nobody_Is_Clearly_Explaining_%E2%80%9CBefore_First_Unlock%E2%80%9D_vs_%E2%80%9CAfter_First_Unlock%E2%80%9D\"><\/span>The Gap Nobody Is Clearly Explaining: &#8220;Before First Unlock&#8221; vs &#8220;After First Unlock&#8221;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This is one part of the story that almost every mainstream article has glossed over, and it matters for understanding the real scope of the risk.<\/p>\n<p>When you look at how the FBI forensic extraction actually works, the state of your iPhone at the time of seizure matters a lot. With little to no technical details about the exact condition of the defendant&#8217;s iPhone, it is impossible to pinpoint the precise method the FBI used to recover the information. There are multiple system states an iPhone can be in, each with its own security and data access constraints, such as BFU (Before First Unlock) and AFU (After First Unlock) mode. Security and data access also change even more dramatically when the device is unlocked.<\/p>\n<p>What this means practically:<\/p>\n<ul>\n<li><strong>BFU (Before First Unlock):<\/strong> The iPhone has just been restarted and no one has entered the passcode yet. Forensic access is very limited. Most of the filesystem is encrypted.<\/li>\n<li><strong>AFU (After First Unlock):<\/strong> The phone has been unlocked at least once since the last restart. Most apps and databases are accessible to forensic tools, including the notification database. <strong>This is the state most people&#8217;s phones are in almost all of the time.<\/strong><\/li>\n<\/ul>\n<p>The practical implication is that if you restart your iPhone frequently and keep it in BFU state, forensic tools have a much harder job even before iOS 26.4.2. After the patch, this distinction matters less for future notifications, but old cached data from before the patch is still there in AFU-accessible storage.<\/p>\n<p><!-- WHAT ABOUT WHATSAPP AND OTHER APPS --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Does_This_Affect_WhatsApp_Telegram_and_Other_Messaging_Apps_Too\"><\/span>Does This Affect WhatsApp, Telegram, and Other Messaging Apps Too?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Yes. This is another thing most coverage is not being direct about. The iOS notification database bug is at the <em>operating system level<\/em>, not the Signal app level. Any app that sends message previews to your lock screen was potentially storing those previews in the same BulletinBoard database.<\/p>\n<p>Signal got the attention because privacy-conscious users choose it specifically to avoid this kind of exposure. But if you use WhatsApp with message previews on, Telegram with message previews on, or even your regular email app, those notifications were going into the same database. If you&#8217;re concerned about your overall privacy on Meta\u2019s platform, you should also check our guide on <a class=\"ng-star-inserted\" href=\"https:\/\/www.gonetech.net\/blog\/remove-whatsapp-status-from-chats\/\" target=\"_blank\" rel=\"noopener\" data-hveid=\"0\" data-ved=\"0CAAQ_4QMahgKEwjrlNus94OUAxUAAAAAHQAAAAAQpwE\">how to hide WhatsApp status previews<\/a> to further secure your chat interface.<\/p>\n<p>iOS 26.4.2 fixes this for all apps, not just Signal. But again \u2014 future notifications only. Whatever is already in the cache from before you updated is still sitting there.<\/p>\n<p><!-- FAQ --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Can_the_FBI_still_recover_deleted_Signal_messages_after_iOS_2642\"><\/span>Can the FBI still recover deleted Signal messages after iOS 26.4.2?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For messages received <em>after<\/em> you updated to iOS 26.4.2, no \u2014 the fix prevents notification previews from persisting in the database. For messages that were received and cached <em>before<\/em> you updated, those old entries still exist until iOS overwrites them over time. If you need to clear them immediately, a full device wipe and setup as new (not from backup) is the only guaranteed method.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_iOS_2642_fix_the_problem_for_iPhone_10_or_older\"><\/span>Does iOS 26.4.2 fix the problem for iPhone 10 or older?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>No. iPhone 10 and older do not support iOS 26. If your device can run iOS 18, you should update to iOS 18.7.8, which contains the same CVE-2026-28950 patch. iPhone X (10), XS, and XR can all run iOS 18.7.8.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Did_Signal_do_anything_wrong_here\"><\/span>Did Signal do anything wrong here?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Not really. Signal had already provided a setting to disable message previews in notifications. The issue was that the default setting shows previews, and most users never changed it. The deeper problem was Apple&#8217;s notification system not properly deleting data after dismissal \u2014 that is an Apple-level bug, not a Signal bug.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_this_mean_my_iMessages_and_regular_texts_were_also_stored_this_way\"><\/span>Does this mean my iMessages and regular texts were also stored this way?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>iMessage has the same exposure in theory, but iMessages are already deeply integrated with iOS and are accessible through other forensic pathways anyway. The bigger surprise was that this applied to Signal, which users specifically chose because they wanted to avoid data being stored anywhere on the OS level.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_is_the_%E2%80%9CShow_Previews_Never%E2%80%9D_setting_actually_doing\"><\/span>What is the &#8220;Show Previews: Never&#8221; setting actually doing?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When you set this to Never in Settings \u2192 Notifications \u2192 Show Previews, iOS does not pass the message text to the BulletinBoard framework at all. It only stores a generic &#8220;New Message&#8221; entry. If a forensic tool extracts your notification database, all it sees is &#8220;New Message&#8221; with a timestamp \u2014 not the actual content. This setting, combined with iOS 26.4.2, is your strongest protection.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Should_I_use_Signals_%E2%80%9CNote_to_Self%E2%80%9D_feature_to_clear_old_messages\"><\/span>Should I use Signal&#8217;s &#8220;Note to Self&#8221; feature to clear old messages?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Deleting messages inside Signal does not affect the BulletinBoard database. Signal can only control its own app storage, not iOS system-level databases. Clearing messages in the Signal app does not remove the notification previews already cached by iOS.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Will_iOS_2643_do_anything_more_about_this\"><\/span>Will iOS 26.4.3 do anything more about this?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Apple has not announced any further updates specifically related to CVE-2026-28950. The current patch in 26.4.2 is Apple&#8217;s stated complete fix. Future iOS updates will be routine unless new vulnerabilities are discovered.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Watch_iOS_2642_FBI_Notification_Bug_Explained\"><\/span>Watch: iOS 26.4.2 FBI Notification Bug Explained<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Here is a useful video overview of how push notification forensics work on iOS and what this update changes:<\/p>\n<p><iframe loading=\"lazy\" title=\"iOS 26.4.2 Review and Security Fixes (Notification Database Bug) Explained\" src=\"https:\/\/www.youtube.com\/embed\/g4kVW_te218\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/p>\n<p><!-- VIDEO EMBED --><\/p>\n<p><!-- ACTION CHECKLIST --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Your_Complete_Action_Checklist_Right_Now\"><\/span>Your Complete Action Checklist Right Now<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Update to iOS 26.4.2 immediately.<\/strong> Settings \u2192 General \u2192 Software Update. If you are on iOS 18, update to iOS 18.7.8 instead.<\/li>\n<li><strong>Disable notification previews system-wide.<\/strong> Settings \u2192 Notifications \u2192 Show Previews \u2192 Never.<\/li>\n<li><strong>Disable Signal notification content.<\/strong> Inside the Signal app: Settings \u2192 Notifications \u2192 Notification Content \u2192 No Name or Content.<\/li>\n<li><strong>Check your Signal app version.<\/strong> Open the App Store, tap your profile picture, and scroll down to check if Signal has a pending update. Make sure you are on the latest version.<\/li>\n<li><strong>If you need maximum privacy going back:<\/strong> Wipe your device and set it up as new. Do not restore from iCloud or local backup \u2014 backups may contain the notification database with old cached content.<\/li>\n<li><strong>Consider iCloud Advanced Data Protection<\/strong> if you use iCloud backups. Go to Settings \u2192 [Your Name] \u2192 iCloud \u2192 Advanced Data Protection. This encrypts more of your iCloud backup data end-to-end.<\/li>\n<\/ol>\n<p><!-- CLOSING --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>iOS 26.4.2 is a genuine, meaningful fix. <strong>Apple responded quickly<\/strong> \u2014 within two weeks of the 404 Media report \u2014 and the patch addresses the root cause at the logging level. For anyone using Signal, WhatsApp, or any messaging app with notification previews enabled, this update matters.<\/p>\n<p>But the update alone is not the full answer. The fix only covers future notifications. Changing your notification settings to hide message previews is what actually stops the data from entering the vulnerable database in the first place. Think of iOS 26.4.2 as fixing the leaky pipe. Turning off notification previews is putting a bucket under the drip as a backup.<\/p>\n<p><strong>Do both. Do them today.<\/strong><\/p>\n<p><!-- REFERENCES --><\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"References_and_Sources\"><\/span>References and Sources<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/111900\" target=\"_blank\" rel=\"nofollow noopener\">Apple Security Content of iOS 26.4.2 and iPadOS 26.4.2 \u2014 Apple Support (Official)<\/a><\/li>\n<li><a href=\"https:\/\/www.404media.co\/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2\/\" target=\"_blank\" rel=\"nofollow noopener\">FBI Extracts Suspect&#8217;s Deleted Signal Messages Saved in iPhone Notification Database \u2014 404 Media<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-fixes-ios-bug-that-retained-deleted-notification-data\/\" target=\"_blank\" rel=\"nofollow noopener\">Apple Fixes iOS Bug That Retained Deleted Notification Data \u2014 BleepingComputer<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2026\/04\/22\/ios-26-4-2-notification-database-security-fix\/\" target=\"_blank\" rel=\"nofollow noopener\">iOS 26.4.2 Patches Flaw That Let FBI Extract Deleted Signal Messages \u2014 MacRumors<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2026\/04\/09\/fbi-used-iphone-notification-data-to-retrieve-deleted-signal-messages\/\" target=\"_blank\" rel=\"nofollow noopener\">FBI Used iPhone Notification Data to Retrieve Deleted Signal Messages \u2014 9to5Mac<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2026\/04\/apple-patches-ios-flaw-that-stored.html\" target=\"_blank\" rel=\"nofollow noopener\">Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case \u2014 The Hacker News<\/a><\/li>\n<li><a href=\"https:\/\/cybersecuritynews.com\/apple-fixes-notification-privacy-flaw\/\" target=\"_blank\" rel=\"nofollow noopener\">Apple Fixes Notification Privacy Flaw That Allowed FBI to Access Deleted Signal Messages \u2014 Cyber Security News<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2026\/04\/22\/ios-26-4-2-and-ios-18-7-8-address-notification-privacy-flaw-highlighted-by-fbi-case\/\" target=\"_blank\" rel=\"nofollow noopener\">iOS 26.4.2 and iOS 18.7.8 Address Notification Privacy Flaw \u2014 TidBITS<\/a><\/li>\n<li><a href=\"https:\/\/stateofsurveillance.org\/news\/fbi-signal-iphone-push-notification-deleted-messages-forensics-2026\/\" target=\"_blank\" rel=\"nofollow noopener\">Deleting Signal Wasn&#8217;t Enough. The FBI Read the Messages Anyway \u2014 State of Surveillance<\/a><\/li>\n<li><a href=\"https:\/\/lynnwoodtimes.com\/2026\/04\/09\/signal\/\" target=\"_blank\" rel=\"nofollow noopener\">FBI Recovers Deleted Signal Messages from iPhone Notification Database \u2014 Lynnwood Times<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Published: April 23, 2026 \u00a0|\u00a0 Last Updated: April 23, 2026 So you heard the headline: the FBI recovered deleted Signal messages from an iPhone \u2014 even after the app was completely deleted. Then Apple rushed out iOS 26.4.2 two weeks later. Now you&#8217;re wondering: is my iPhone actually safe now, or is this just another [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[],"class_list":["post-882","post","type-post","status-publish","format-standard","hentry","category-troubleshooting-hub"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iOS 26.4.2 FBI Signal Fix: What the Patch Really Does<\/title>\n<meta name=\"description\" content=\"iOS 26.4.2 fixes the flaw the FBI used to recover deleted Signal messages. Learn what the patch does, what it doesn&#039;t, and the 6 steps you need to take now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iOS 26.4.2 FBI Signal Fix: What the Patch Really Does\" \/>\n<meta property=\"og:description\" content=\"iOS 26.4.2 fixes the flaw the FBI used to recover deleted Signal messages. Learn what the patch does, what it doesn&#039;t, and the 6 steps you need to take now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/\" \/>\n<meta property=\"og:site_name\" content=\"Gonetech\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-23T12:01:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T12:20:01+00:00\" \/>\n<meta name=\"author\" content=\"Michael Carter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Carter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/\"},\"author\":{\"name\":\"Michael Carter\",\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/#\\\/schema\\\/person\\\/4f2651cec3e77bd54671a6d91f4f4865\"},\"headline\":\"iOS 26.4.2 FBI Signal Fix: Does It Really Protect Your Deleted Messages? (CVE-2026-28950 Fully Explained)\",\"datePublished\":\"2026-04-23T12:01:45+00:00\",\"dateModified\":\"2026-04-23T12:20:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/\"},\"wordCount\":3092,\"commentCount\":0,\"articleSection\":[\"Troubleshooting Hub\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/\",\"url\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/\",\"name\":\"iOS 26.4.2 FBI Signal Fix: What the Patch Really Does\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/#website\"},\"datePublished\":\"2026-04-23T12:01:45+00:00\",\"dateModified\":\"2026-04-23T12:20:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/#\\\/schema\\\/person\\\/4f2651cec3e77bd54671a6d91f4f4865\"},\"description\":\"iOS 26.4.2 fixes the flaw the FBI used to recover deleted Signal messages. Learn what the patch does, what it doesn't, and the 6 steps you need to take now.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/ios-26-4-2-fbi-signal-deleted-messages-fix\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iOS 26.4.2 FBI Signal Fix: Does It Really Protect Your Deleted Messages? (CVE-2026-28950 Fully Explained)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/\",\"name\":\"Gonetech\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/#\\\/schema\\\/person\\\/4f2651cec3e77bd54671a6d91f4f4865\",\"name\":\"Michael Carter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b92c02b801a498950ba82fec910fcf1ddb47aa4294369fc2d9a7ddc29db71b6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b92c02b801a498950ba82fec910fcf1ddb47aa4294369fc2d9a7ddc29db71b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b92c02b801a498950ba82fec910fcf1ddb47aa4294369fc2d9a7ddc29db71b6?s=96&d=mm&r=g\",\"caption\":\"Michael Carter\"},\"url\":\"https:\\\/\\\/www.gonetech.net\\\/blog\\\/author\\\/michael-carter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iOS 26.4.2 FBI Signal Fix: What the Patch Really Does","description":"iOS 26.4.2 fixes the flaw the FBI used to recover deleted Signal messages. Learn what the patch does, what it doesn't, and the 6 steps you need to take now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/","og_locale":"en_US","og_type":"article","og_title":"iOS 26.4.2 FBI Signal Fix: What the Patch Really Does","og_description":"iOS 26.4.2 fixes the flaw the FBI used to recover deleted Signal messages. Learn what the patch does, what it doesn't, and the 6 steps you need to take now.","og_url":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/","og_site_name":"Gonetech","article_published_time":"2026-04-23T12:01:45+00:00","article_modified_time":"2026-04-23T12:20:01+00:00","author":"Michael Carter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Carter","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#article","isPartOf":{"@id":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/"},"author":{"name":"Michael Carter","@id":"https:\/\/www.gonetech.net\/blog\/#\/schema\/person\/4f2651cec3e77bd54671a6d91f4f4865"},"headline":"iOS 26.4.2 FBI Signal Fix: Does It Really Protect Your Deleted Messages? (CVE-2026-28950 Fully Explained)","datePublished":"2026-04-23T12:01:45+00:00","dateModified":"2026-04-23T12:20:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/"},"wordCount":3092,"commentCount":0,"articleSection":["Troubleshooting Hub"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/","url":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/","name":"iOS 26.4.2 FBI Signal Fix: What the Patch Really Does","isPartOf":{"@id":"https:\/\/www.gonetech.net\/blog\/#website"},"datePublished":"2026-04-23T12:01:45+00:00","dateModified":"2026-04-23T12:20:01+00:00","author":{"@id":"https:\/\/www.gonetech.net\/blog\/#\/schema\/person\/4f2651cec3e77bd54671a6d91f4f4865"},"description":"iOS 26.4.2 fixes the flaw the FBI used to recover deleted Signal messages. Learn what the patch does, what it doesn't, and the 6 steps you need to take now.","breadcrumb":{"@id":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gonetech.net\/blog\/ios-26-4-2-fbi-signal-deleted-messages-fix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gonetech.net\/blog\/"},{"@type":"ListItem","position":2,"name":"iOS 26.4.2 FBI Signal Fix: Does It Really Protect Your Deleted Messages? (CVE-2026-28950 Fully Explained)"}]},{"@type":"WebSite","@id":"https:\/\/www.gonetech.net\/blog\/#website","url":"https:\/\/www.gonetech.net\/blog\/","name":"Gonetech","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gonetech.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gonetech.net\/blog\/#\/schema\/person\/4f2651cec3e77bd54671a6d91f4f4865","name":"Michael Carter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9b92c02b801a498950ba82fec910fcf1ddb47aa4294369fc2d9a7ddc29db71b6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9b92c02b801a498950ba82fec910fcf1ddb47aa4294369fc2d9a7ddc29db71b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9b92c02b801a498950ba82fec910fcf1ddb47aa4294369fc2d9a7ddc29db71b6?s=96&d=mm&r=g","caption":"Michael Carter"},"url":"https:\/\/www.gonetech.net\/blog\/author\/michael-carter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/posts\/882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/comments?post=882"}],"version-history":[{"count":5,"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/posts\/882\/revisions"}],"predecessor-version":[{"id":887,"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/posts\/882\/revisions\/887"}],"wp:attachment":[{"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/media?parent=882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/categories?post=882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gonetech.net\/blog\/wp-json\/wp\/v2\/tags?post=882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}