← Blog
Stories 2025-03-15 · 5 min read

Recovering voicemails
from people who have passed.

A voice is different from a photo. It catches a breath, a laugh, the particular way someone said your name. This is a quiet guide for anyone who needs to keep one.

We get emails about this every week. Someone's parent died. Their partner. A sibling. The phone is off, the account is inaccessible, but there's an old laptop in a drawer that used to sync with an iPhone, and somewhere inside it is a voicemail — a three-second "hi honey, call me when you can" — that is now the only recording of that voice in the world.

It's almost always still there. This post explains where.

Voicemails survive in more places than you'd think

Unlike messages or photos, voicemails on iPhone are small, standalone audio files. That makes them extraordinarily durable. They're copied to your computer whenever a backup runs, which happens automatically any time you plug the phone into a computer it's been paired with — and for most people, that's happened dozens or hundreds of times over the life of the phone.

So the places to look, in order:

You don't need the phone. You don't need iCloud. You don't need the Apple ID password. You need the backup folder.

Where voicemails actually live inside a backup

Apple stores voicemails in a specific domain of the iPhone filesystem called HomeDomain, under the path Library/Voicemail/. Inside that folder:

Library/Voicemail/
├── voicemail.db          # SQLite index: who, when, how long
├── 1.amr                 # older iOS — narrowband audio
├── 2.m4a                 # newer iOS — AAC audio
├── 17.m4a
└── ...

The voicemail.db SQLite database has one row per voicemail with the timestamp, sender's phone number, duration in seconds, and a transcription if iOS was able to make one. The audio file is named by the voicemail's row ID — 1.m4a for row 1, etc.

In the backup, these files are renamed to hex-encoded SHA-1 hashes (every file is — that's how iPhone backups work). Manifest.db maps the hex names back to their original paths. The query that finds voicemail audio looks like:

SELECT fileID, relativePath
FROM Files
WHERE domain = 'HomeDomain'
  AND relativePath LIKE 'Library/Voicemail/%'

OpenExtract does this automatically. You don't see any of it unless you want to.

What gets saved alongside the audio

When OpenExtract exports voicemails, it pairs each .m4a or .amr file with a CSV of metadata — who left it, when, how long it was, and whatever iOS transcribed. That CSV matters. Years from now you won't remember whose number that was in 2017, but the CSV will.

For each voicemail you'll get:

Encrypted backups and this particular case

If the backup was encrypted and you don't have the password, voicemails are one of the few things you can still get. The voicemail audio files and index live in HomeDomain, which is encrypted per-file — so you'd still need the password to decrypt them. But metadata like call history is elsewhere and may be partially accessible.

If the password is unknown and the laptop belongs to someone who has passed, the practical step is to look for written passwords (a notebook, a keychain file, a sticky note). Apple has no backdoor and neither do we.

What to do with them

Something that has helped people we've heard from: back them up in three places. An external drive, a cloud archive you control (not iCloud — a plain folder in Google Drive or Dropbox), and a copy given to another family member. Voice memos deteriorate the way paper does, but more silently. The audio file itself doesn't degrade, but the places you store it do — drives fail, accounts close, phones get replaced.

Then you don't have to play them. You just have to know they exist.

One more thing

If you'd like a longer, more personal piece on what it feels like to hold this kind of data — years of messages, photos, voicemails — reconstructed from a backup, this is a piece we wrote on Medium. Not a how-to. A reflection.

If we can help with a specific case, open an issue and we'll write back. We mean it.

— OpenExtract

Keep reading
What's actually in an iPhone backup → Encrypted backups are better, actually →
Ready to get your data?
Free, open source, nothing uploaded. Mac · Windows · Linux.
Download OpenExtract →