647
FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database
(www.404media.co)
This is a most excellent place for technology news and articles.
End-to-end encryption is the one of the most basic requirements for a communication system to be secure. Endpoint authentication is another. Message authentication is the third. After those 3 are fulfilled, further requirements can vary from system to system.
It's like electrical or building code. Just because it's compliant doesn't mean it's safe, but if it's not compliant it's almost certainly not safe. Necessary, not sufficient!
Exactly!
Is your keyboard app secure (yes seriously)? Does you device store notification details? Can your notifications be viewed without unlocking the device?
Those are all little concerns that need to be considered.