{"id":2512,"date":"2026-04-15T12:50:19","date_gmt":"2026-04-15T12:50:19","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/"},"modified":"2026-04-15T12:50:19","modified_gmt":"2026-04-15T12:50:19","slug":"podcast-how-the-fbi-extracted-deleted-signal-messages","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/","title":{"rendered":"Podcast: How the FBI Extracted Deleted Signal Messages"},"content":{"rendered":"<p>We start this week with Joseph\u2019s story on the inherent friction between secure chat apps like Signal and the phone they\u2019re running on. Incoming message content can be stored in a phone\u2019s internal notification database. After the break, Matthew tells us the latest about the data center pushback. Then in the subscribers\u2019 only section, Emanuel tells us all about Marathon and its player numbers.<\/p>\n<p>Listen to the weekly podcast on\u00a0Apple Podcasts,\u00a0Spotify, or\u00a0YouTube. Become a paid subscriber for access to this episode&#8217;s bonus content and to power our journalism.\u00a0If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player. \u2060FBI Extracts Suspect\u2019s Deleted Signal Messages Saved in iPhone Notification Database\u206026:01 &#8211;\u00a0\u2060Maine Is Close to Passing a Moratorium on New Datacenters\u206033:21 &#8211;\u00a0\u2060Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight\u2060Subscriber&#8217;s Story:\u00a0\u2060I Wish I Didn\u2019t Care About &#8216;Marathon&#8217; Player Numbers, But I Do<\/p>\n","protected":false},"excerpt":{"rendered":"<div>How a phone&#8217;s notification database can store messages deleted elsewhere; the continued data center pushback; and Marathon, Marathon, Marathon.<\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[1,14],"tags":[3],"class_list":["post-2512","post","type-post","status-publish","format-standard","hentry","category-ai-and-ml","category-podcast","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Podcast: How the FBI Extracted Deleted Signal Messages - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Podcast: How the FBI Extracted Deleted Signal Messages - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"How a phone&#039;s notification database can store messages deleted elsewhere; the continued data center pushback; and Marathon, Marathon, Marathon.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T12:50:19+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Podcast: How the FBI Extracted Deleted Signal Messages\",\"datePublished\":\"2026-04-15T12:50:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\"},\"wordCount\":228,\"keywords\":[\"AI\"],\"articleSection\":[\"AI and ML\",\"Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\",\"name\":\"Podcast: How the FBI Extracted Deleted Signal Messages - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-04-15T12:50:19+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Podcast: How the FBI Extracted Deleted Signal Messages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Podcast: How the FBI Extracted Deleted Signal Messages - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/","og_locale":"en_US","og_type":"article","og_title":"Podcast: How the FBI Extracted Deleted Signal Messages - Imperative Business Ventures Limited","og_description":"How a phone's notification database can store messages deleted elsewhere; the continued data center pushback; and Marathon, Marathon, Marathon.","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-04-15T12:50:19+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Podcast: How the FBI Extracted Deleted Signal Messages","datePublished":"2026-04-15T12:50:19+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/"},"wordCount":228,"keywords":["AI"],"articleSection":["AI and ML","Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/","name":"Podcast: How the FBI Extracted Deleted Signal Messages - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-04-15T12:50:19+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/15\/podcast-how-the-fbi-extracted-deleted-signal-messages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Podcast: How the FBI Extracted Deleted Signal Messages"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2512"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2512\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}