Skip to main content

Apple appears to be storing a log of the numbers you enter into iMessages

apple ios developer academy logo
Image used with permission by copyright holder
Apple has said it doesn’t store the contents of messages sent via its iMessage texting service. Indeed, it contends that such record keeping would be useless since the contents of such messages are encrypted on the devices from which they’re sent — the iPhone maker said it can’t “scan … communications” or “comply with a wiretap order” even if it wanted to.

But those same protections, it turns out, don’t necessarily extend to SMS messages. According to The Intercept, receipts of SMS texts sent via the Messaging app on iOS are routinely copied to Apple’s servers.

This is the result of a worrisome — and perhaps inherent — quirk in the way iMessage differentiates between messages sent via SMS, a cellular carrier standard known as Short Messaging Service, and iMessage, Apple’s internet-based alternative. According to internal documents obtained by The Intercept from the Florida Department of Law Enforcement’s Electronic Surveillance Support Team, an agency that coordinates the state’s electronic policies, every text sent via the iOS Messaging app triggers a query of Apple’s servers.

The servers determine whether to route the text over a carrier’s SMS network or Apple’s platform — practically speaking, whether the message appears in a green bubble (SMS) or a blue bubble (an iMessage) — and record the results of the resulting transaction. A typical log includes the sender and recipient’s phone numbers, the date and time, and the IP address of the sending device, according to The Intercept.

It paints a stark picture. Additional material obtained by The Intercept suggests that Apple maintains a running log of phone numbers users have entered into the Messages app; that numbers entered into other iOS apps, like the Contacts app, may find their way into said logs; and that the company may collect new metadata as frequently as “[every time] you open a new chat window and select a contact or number with whom to communicate.”

Apple said that it stores the information, known as “metadata,” for a period of 30 days, but The Intercept notes that a court order could extend that retention period by an additional 30 days. The limit, then, is essentially an arbitrary one — there’s nothing preventing law enforcement from filing subsequent extensions, potentially prolonging storage for months on end. “A series of … log snapshots from Apple could be strung together by police to create a longer list of whose numbers someone has been entering.

Worse still, under laws governing the use of surveillance devices known as “pen register” and “trap and trace,” Apple is compelled to turn over data “relevant to an ongoing criminal investigation.”

“When law enforcement presents us with a valid subpoena or court order, we provide the requested information if it is in our possession,” an Apple spokesperson told The Intercept. “In some cases, we are able to provide data from server logs that are generated from customers accessing certain apps on their devices. We work closely with law enforcement to help them understand what we can provide and make clear these query logs don’t contain the contents of conversations or prove that any communication actually took place.”

For privacy-conscious  users, there is some light in the gloom. Apple’s records don’t appear to differentiate between iMessage conversations and numbers entered but never contacted — law enforcement would be unable to tell, for example, whether or not you contacted a known drug dealer or just dialed the number by mistake. But as The Intercept notes, a list of assumed associates can be at the very least sensitive, and at the very worst compromising.

And Apple’s iMessage metadata policies appear to conflict with the company’s messaging: that its users’ data remains private, secure, and for the most part tucked away from prying eyes. “Your iMessages and FaceTime calls are your business, not ours,” an FAQ response on the company’s website reads. “Because iMessage is encrypted end-to-end, we do not have access to the contents of those communications.”

It’s a reiteration of a statement made by the Cupertino, California-based company following revelations regarding the U.S. National Security Administration’s domestic surveillance efforts. After it was revealed that Apple was among the tech companies implicated in a program known as PRISM, which provided the agency nearly unfettered access to nine of the country’s leading internet companies, Apple reaffirmed its commitment to “customer privacy,” insisting that it “[could] not decrypt” iMessage … [data]” and that it “did not store data related to customers’ location … in any identifiable form.”

It’s hardly the first controversy over the degree to which messaging services disclose — or don’t disclose — information regarding communications. Just last week, privacy advocates, among them CIA and NSA whistleblower Edward Snowden, criticized search giant Google’s new messaging platform, Allo, for failing to encrypt messages by default and storing chat logs indefinitely. Facebook-owned texting platform WhatsApp has been repeatedly blocked in countries such as Brazil as a result of the service’s end-to-end encryption model. And a report in Motherboard revealed that the Royal Canadian Mounted Police, a branch of Canadian law enforcement, possessed the master encryption key necessary to decrypt over one million messages sent via BlackBerry’s BBM service between 2010 and 2012.

Apple has yet to respond more substantively to The Intercept’s accusations, but time will tell whether the company, which fiercely combated the FBI’s recent efforts to implement a backdoor in iOS, considers it a fight worth waging.

Editors' Recommendations

Kyle Wiggers
Former Digital Trends Contributor
Kyle Wiggers is a writer, Web designer, and podcaster with an acute interest in all things tech. When not reviewing gadgets…
Sunbird — the sketchy iMessage for Android app — just shut down
Sunbird messages app for Android

What was supposed to be an iMessage redeemer for Android smartphone users has quickly been consumed in a chaos of security and utter negligence. Merely days after the Nothing Chats app was removed from the Play Store, the tech at its foundation provided by Sunbird is also taking an unspecified leave, intensifying suspicions of something being seriously wrong.

Sunbird appeared on our radar late last year, promising blue bubbles for Android-to-iPhone messages. It also promised to bundle all messaging apps into a single cluster, somewhat like Beeper. Nothing adopted the Sunbird tech, bundled it into its own app for the Nothing Phone 2, and launched it with an ambitious video. “Sorry, Tim.” That’s the message Nothing CEO Carl Pei sent.

Read more
Why RCS for the iPhone is Apple’s biggest announcement of 2023
A person holding the Apple iPhone 15 Plus.

Hell has frozen over. On November 16, 2023, Apple made the very unexpected announcement that it was bringing support for RCS on the iPhone in 2024.

In 2022, Tim Cook himself said that he’d rather sell you an iPhone instead of ever bringing RCS support to the iPhone because he thought customer demand for RCS wasn’t there. Google has made numerous attempts to shame Apple over its pushback of RCS over the years.

Read more
Nothing’s iMessage for Android app is unbelievably bad
The Nothing Chats splash page in the app.

Earlier this week, Nothing did the unexpected and launched the "Nothing Chats" app for the Nothing Phone 2. The premise? Let anyone with a Nothing Phone 2 send and receive texts via iMessage. Nothing partnered with Sunbird to make Nothing Chats work, with Nothing essentially using Sunbird's own messaging tech to bring iMessage to Android.

It was a bold idea ... but one that was short-lived. That's because Nothing Chats is already dead (for the time being) due to a shocking number of security vulnerabilities that were discovered almost immediately. And by security vulnerabilities, we don't mean minor oversights that could have been easy to overlook. We're talking about major, game-breaking design flaws that massively compromise the personal information of anyone who used Nothing Chats.
The problem with Nothing Chats
iMessage on an iPhone 15 Pro Max (left) and Nothing Chats on a Nothing Phone 2 Andy Boxall / Digital Trends

Read more