APPLE FIXES BUG THAT LET POLICE ACCESS DELETED SIGNAL CHATS
INDUSTRY DESK■ 2 MIN READ
THU, APR 23, 2026■ AI-SUMMARIZED FROM 1 SOURCE BELOW
Apple has patched a vulnerability that retained Signal message data even after users deleted the app, potentially allowing law enforcement to access private communications. Signal confirmed the fix resolves the security issue.
Apple discovered and fixed a bug in iOS that cached Signal chat data in a way that persisted after users uninstalled the messaging app. The cached files could theoretically be accessed by authorities during device searches, creating an unexpected privacy vulnerability for Signal users.
Signal, the encrypted messaging platform favored by privacy advocates and journalists, expressed satisfaction with Apple's remediation. The open-source messaging app relies on end-to-end encryption to prevent interception of communications, but the iOS caching issue created a backdoor of sorts—not through Signal's encryption, but through Apple's operating system.
The bug affected how iOS managed temporary data and cache files associated with third-party applications. When Signal was deleted, fragments of chat data remained on the device in locations accessible to forensic tools commonly used by law enforcement and intelligence agencies.
Apple did not publicly disclose the vulnerability before patching it, which is standard practice for security fixes. The company typically addresses such issues silently through regular iOS updates to avoid alerting bad actors to exploitable gaps.
The incident highlights the complex intersection of app security and operating system design. Even when application developers implement strong encryption—as Signal does—the underlying platform can inadvertently undermine those protections through caching, temporary files, or other system-level functions.
Signal has long positioned itself as a privacy-first alternative to mainstream messaging apps. The platform has gained particular traction among activists, lawyers, and security professionals who require strong guarantees that their conversations cannot be intercepted or accessed by third parties.
For typical Signal users, the patch requires updating to the latest iOS version. No evidence has emerged suggesting the vulnerability was exploited in the wild before being fixed.
■ MORE FROM THE SECURITY DESK
Half a million confidential health records from UK Biobank participants were advertised for sale on Chinese e-commerce site Alibaba last week. The UK government has confirmed the listings and says the data has been removed with no evidence of sales.
1H AGO— Industry Desk
The Trump administration says it has evidence of large-scale industrial distillation campaigns by Chinese actors targeting American AI models. The government is now moving to counter the threat.
1H AGO— AI Desk
Attackers compromised Bitwarden's command-line interface as part of an ongoing campaign targeting Checkmarx users. The malicious code was injected into the package repository, affecting developers using the tool.
3H AGO— AI Desk
Health records from half a million British research participants have been compromised and listed for sale on an Alibaba marketplace. The data belongs to individuals enrolled in UK studies on aging and disease.
3H AGO— Security Desk