We get emails about this every week. Someone's parent died. Their partner. A sibling. The phone is off, the account is inaccessible, but there's an old laptop in a drawer that used to sync with an iPhone, and somewhere inside it is a voicemail — a three-second "hi honey, call me when you can" — that is now the only recording of that voice in the world.
It's almost always still there. This post explains where.
Voicemails survive in more places than you'd think
Unlike messages or photos, voicemails on iPhone are small, standalone audio files. That makes them extraordinarily durable. They're copied to your computer whenever a backup runs, which happens automatically any time you plug the phone into a computer it's been paired with — and for most people, that's happened dozens or hundreds of times over the life of the phone.
So the places to look, in order:
- The person's own Mac or PC. The laptop they plugged their phone into. Check
~/Library/Application Support/MobileSync/Backup/on a Mac, or%AppData%\Apple Computer\MobileSync\Backup\on Windows. - A partner's or family member's computer. If they ever plugged their phone in to charge, to do an initial setup, to grab photos — there's a backup on that machine.
- An external drive. Some people moved backups off their main drive. Look for folders named
Backupwith UUID-named subfolders.
You don't need the phone. You don't need iCloud. You don't need the Apple ID password. You need the backup folder.
Where voicemails actually live inside a backup
Apple stores voicemails in a specific domain of the iPhone filesystem called HomeDomain, under the path Library/Voicemail/. Inside that folder:
Library/Voicemail/
├── voicemail.db # SQLite index: who, when, how long
├── 1.amr # older iOS — narrowband audio
├── 2.m4a # newer iOS — AAC audio
├── 17.m4a
└── ...
The voicemail.db SQLite database has one row per voicemail with the timestamp, sender's phone number, duration in seconds, and a transcription if iOS was able to make one. The audio file is named by the voicemail's row ID — 1.m4a for row 1, etc.
In the backup, these files are renamed to hex-encoded SHA-1 hashes (every file is — that's how iPhone backups work). Manifest.db maps the hex names back to their original paths. The query that finds voicemail audio looks like:
SELECT fileID, relativePath
FROM Files
WHERE domain = 'HomeDomain'
AND relativePath LIKE 'Library/Voicemail/%'
OpenExtract does this automatically. You don't see any of it unless you want to.
What gets saved alongside the audio
When OpenExtract exports voicemails, it pairs each .m4a or .amr file with a CSV of metadata — who left it, when, how long it was, and whatever iOS transcribed. That CSV matters. Years from now you won't remember whose number that was in 2017, but the CSV will.
For each voicemail you'll get:
- The audio file —
.m4aon any remotely modern iOS, playable in any music app, browser, or phone. - The timestamp — down to the second, in your local time zone.
- The caller's number and name — if they were in contacts.
- iOS's transcription — useful when the audio is a message you can't bring yourself to play yet.
Encrypted backups and this particular case
If the backup was encrypted and you don't have the password, voicemails are one of the few things you can still get. The voicemail audio files and index live in HomeDomain, which is encrypted per-file — so you'd still need the password to decrypt them. But metadata like call history is elsewhere and may be partially accessible.
If the password is unknown and the laptop belongs to someone who has passed, the practical step is to look for written passwords (a notebook, a keychain file, a sticky note). Apple has no backdoor and neither do we.
What to do with them
Something that has helped people we've heard from: back them up in three places. An external drive, a cloud archive you control (not iCloud — a plain folder in Google Drive or Dropbox), and a copy given to another family member. Voice memos deteriorate the way paper does, but more silently. The audio file itself doesn't degrade, but the places you store it do — drives fail, accounts close, phones get replaced.
Then you don't have to play them. You just have to know they exist.
One more thing
If you'd like a longer, more personal piece on what it feels like to hold this kind of data — years of messages, photos, voicemails — reconstructed from a backup, this is a piece we wrote on Medium. Not a how-to. A reflection.
If we can help with a specific case, open an issue and we'll write back. We mean it.
— OpenExtract