Recent FBI surveillance methods targeting Signal users through push notification metadata have exposed critical privacy gaps that most users don't know exist. This tutorial will secure your Signal notifications in under 15 minutes, protecting your communication patterns from government surveillance and data brokers.
What You Will Learn
- How to disable Signal's push notification metadata that the FBI can access
- Advanced privacy settings that hide message previews and sender information
- How to enable sealed sender technology for maximum anonymity
What You'll Need
- Signal app version 6.0 or later (free download from official app stores)
- iPhone iOS 14+ or Android 8.0+
- 5-10 minutes for initial setup
- A trusted contact to test your settings with
Time estimate: 10-15 minutes | Difficulty: Beginner
These settings work on both iPhone and Android, though menu locations vary slightly. As we reported in our analysis of the FBI Signal surveillance method, push notifications create a data trail that bypasses Signal's end-to-end encryption. This tutorial closes that vulnerability.
Step-by-Step Instructions
Step 1: Open Signal App Settings
Launch the Signal app and tap your profile photo in the top-left corner (iPhone) or tap the three-dot menu in the top-right corner (Android). Select "Settings" from the dropdown menu.
This opens Signal's main configuration panel where all privacy controls live. Signal buries many critical privacy features deep in submenus, which is why most users never find them. The settings we're targeting aren't enabled by default because they reduce convenience for better security.
Step 2: Navigate to Privacy & Security Section
In the Settings menu, scroll down and tap "Privacy". On older Signal versions, this may be labeled "Privacy & Security" or simply "Security".
The Privacy section contains Signal's most powerful anti-surveillance tools. Many of these settings directly counter the metadata collection techniques that government agencies use to track communication patterns without breaking encryption.
Step 3: Disable Push Notification Metadata
Look for the section labeled "Notifications" or "Push Notifications". You'll see several toggle switches:
- Turn OFF "Show sender name"
- Turn OFF "Show message text"
- Turn OFF "Show message reactions"
This step eliminates the metadata vulnerability that the FBI exploited. When these settings are disabled, push notifications only show that you received a message, not who sent it or any content preview. Apple and Google's push notification systems can no longer collect identifying information about your Signal conversations.
Step 4: Configure Advanced Notification Privacy
Still in the Privacy settings, locate "Advanced" or "Advanced Privacy". Enable these critical settings:
- Turn ON "Always relay calls"
- Turn ON "Sealed sender"
- Turn OFF "Link previews"
Pro tip: The "Always relay calls" setting routes your voice calls through Signal's servers instead of directly connecting to the recipient. This prevents your real IP address from being exposed during calls, which metadata analysis tools can track.
Step 5: Enable Disappearing Messages by Default
Navigate back to the main Settings menu and select "Chats and media" or "Chats". Find the setting labeled "Default timer for new chats" and set it to 1 week or 1 day depending on your needs.
This ensures that all new conversations automatically delete messages after your chosen time period. Even if someone gains access to your device, they won't find a complete message history. The shorter the timer, the better your operational security.
Step 6: Configure Sealed Sender Settings
Return to Privacy settings and look for "Sealed Sender". You should see two options:
- "Allow from anyone" - Recommended for maximum privacy
- "Allow from contacts only" - More restrictive but still secure
Select "Allow from anyone" unless you frequently receive spam. Sealed sender technology hides your identity from Signal's servers when you send messages, making traffic analysis nearly impossible.
This feature represents Signal's most advanced anti-surveillance technology. According to Signal's technical documentation, sealed sender prevents even Signal's own servers from knowing who sent a particular message.
Step 7: Disable Read Receipts and Typing Indicators
In the Privacy settings, find these behavioral indicators and turn them OFF:
- "Read receipts" - Prevents others from knowing when you read their messages
- "Typing indicators" - Hides when you're composing a response
These seemingly innocent features create behavioral metadata that surveillance tools can analyze to determine your activity patterns, sleep schedule, and response habits. Disabling them breaks this surveillance vector.
Step 8: Test Your Configuration
Send a message to a trusted contact and ask them to send you one back. Check that your lock screen notifications now show only "Signal" and "New message" without revealing sender names or message content.
Have your contact confirm that they cannot see read receipts when you open their messages. This verification step ensures your privacy settings are working correctly across different device types and Signal versions.
Troubleshooting
Problem: Push notifications stopped working entirely after changing settings. Solution: Go to your device's main Settings app, find Signal in the app list, and ensure "Allow Notifications" is still enabled. Signal's internal privacy settings only control what information appears in notifications, not whether you receive them.
Problem: Sealed sender option is grayed out or missing. Solution: Update Signal to version 6.0 or later. Older versions don't support sealed sender technology. Delete and reinstall Signal if the update doesn't resolve the issue.
Problem: Messages are disappearing too quickly. Solution: You can adjust disappearing message timers for individual conversations. Open any chat, tap the contact's name at the top, select "Disappearing messages," and choose a longer duration for that specific conversation.
Expert Tips
- Battery impact: These privacy settings may slightly increase battery usage due to sealed sender encryption. The trade-off is worth it for high-value targets of surveillance.
- Backup considerations: Signal's local backups don't include messages set to disappear. Use Signal's built-in transfer tool when switching devices to preserve important conversations.
- Contact verification: Enable "Show safety numbers" in Privacy settings and periodically verify key contacts' safety numbers to detect potential man-in-the-middle attacks.
- Network analysis protection: Consider using Signal over a VPN connection to further obscure your traffic patterns from internet service providers.
What to Do Next
Now that your Signal notifications are secured, consider implementing broader mobile privacy measures. Learn about iOS and Android system-level privacy controls that complement Signal's protections. Many users also benefit from understanding how government surveillance programs like the one targeting Signal operate, so they can recognize similar threats to other communication apps.
The next logical step is auditing your other messaging apps for similar metadata vulnerabilities. Most popular messengers lack Signal's advanced privacy features, making them much easier targets for the surveillance techniques we've just protected against.