The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "TaiG"
m (it's either "thai jee" (how you think), but a Google Translate on the Chinese announcement message outputs "taiji" and "tai chi") |
|||
Line 22: | Line 22: | ||
}} |
}} |
||
− | '''TaiG''' ('''Taiji''') is an [[untethered jailbreak]] for all devices on iOS 8.0-8.1.2, except the [[Apple TV]]. It was initially released on November 29, 2014. Its website claims the exploits work on iOS 8.2 beta, but support is disabled in the public builds. |
+ | '''TaiG''' ('''Taiji''' in Chinese) (<span class="ipa">[[wikipedia:Help:IPA for English|/taɪ dʒi/]]</span> or <span class="ipa">/taɪ tʃi/</span>) is an [[untethered jailbreak]] for all devices on iOS 8.0-8.1.2, except the [[Apple TV]]. It was initially released on November 29, 2014. Its website claims the exploits work on iOS 8.2 beta, but support is disabled in the public builds. |
== Supported Devices == |
== Supported Devices == |
||
Line 29: | Line 29: | ||
=== iOS 8.2 Beta === |
=== iOS 8.2 Beta === |
||
<!-- should be reworded to mention that it was possibly there since the first day; the "signature" on the announcement is dated 2 Dec 2014 --> |
<!-- should be reworded to mention that it was possibly there since the first day; the "signature" on the announcement is dated 2 Dec 2014 --> |
||
− | TaiG's website originally claimed as early as [http://web.archive.org/web/20141204221416/http://taig.com/en/ 4 December 2014] that "support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release." This claim remained through [http://web.archive.org/web/ |
+ | TaiG's website originally claimed as early as [http://web.archive.org/web/20141204221416/http://taig.com/en/ 4 December 2014] that "support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release." This claim remained through [http://web.archive.org/web/20141231032106/http://www.taig.com/ 31 December 2014], but was removed sometime before [http://web.archive.org/web/20150104165652/http://taig.com/en/ 4 January 2015]. |
== Download == |
== Download == |
Revision as of 16:41, 5 January 2015
This page is about untethered jailbreak for iOS 8.0-8.1.2. For untethered jailbreak for iOS 8.0-8.1, see Pangu8.
Original author(s) | TaiG |
---|---|
Developer(s) | TaiG |
Initial release | 29 Nov 2014 |
Stable release | 1.2.0 / 10 December 2014 |
Development status | Active |
Written in | ? |
Operating system | Windows |
Platform | Windows |
Available in | Chinese / English |
Type | Jailbreaking |
License | Freeware |
Website |
taig.com/en (English) taig.com (Chinese) |
TaiG (Taiji in Chinese) (/taɪ dʒi/ or /taɪ tʃi/) is an untethered jailbreak for all devices on iOS 8.0-8.1.2, except the Apple TV. It was initially released on November 29, 2014. Its website claims the exploits work on iOS 8.2 beta, but support is disabled in the public builds.
Supported Devices
All devices capable of running iOS 8.0-8.1.2 except the Apple TV family, are supported.
iOS 8.2 Beta
TaiG's website originally claimed as early as 4 December 2014 that "support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release." This claim remained through 31 December 2014, but was removed sometime before 4 January 2015.
Download
Version | Language | Download | SHA-1 | Changes |
---|---|---|---|---|
1.0.0 | English | TaiG | 2538d85d3b42a2a65ec33aec86245c39047449d3
|
First version of TaiG which supports all devices with iOS 8.0 - 8.1.1 except Apple TV's. |
1.0.1 | TaiG | 7346849bb3ff3dd1e21530ae1bb7ee27f02f453a
|
| |
1.0.2 | TaiG | 4edab617f9b951419eca4c32ddc6a5f8a2e94226
|
| |
1.1.0 | Chinese | TaiG | 2181179badac74cced2eb9ad5639b0f57be66f95
|
|
English | TaiG | d3b40bbbd6f9cf652ece4476b96dafae858f1bb0
| ||
1.2.0 | Chinese | TaiG | 42848662a637234ef14d67448e4cf8e427906b52
|
|
English | TaiG | 5c6e2939359e36622ca2b4ca71d0def628dbbaf3
|
Exploit
As of 4 January 2015, the exploits used have not been disclosed by the developers and no (public) reverse analysis is available.
Installed Packages
- APR (/usr/lib) (1.3.3-2;
apr-lib
) - APT 0.7 (apt-key) (0.7.25.3-3;
apt7-key
) - APT 0.7 Strict (lib) (0.7.25.3-13;
apt7-lib
) - Base Structure (1-4;
base
) - Big Boss Icon Set (1.0;
org.thebigboss.repo.icons
) - Bourne-Again SHell (4.0.44-15;
bash
) - bzip2 (1.0.5-7;
bzip2
) - Core Utilities (/bin) (8.12-7p;
coreutils-bin
) - Cydia Installer (1.1.16;
cydia
) - Cydia Translations (1.1.12;
cydia-lproj
) - Darwin Tools (1-4;
darwintools
) - Debian Packager (1.14.25-9;
dpkg
) - Debian Utilities (3.3.3ubuntu1-1p;
debianutils
) - Diff Utilities (2.8.1-6;
diffutils
) - Find Utilities (4.2.33-6;
findutils
) - GNU Privacy Guard (1.4.8-4;
gnupg
) - grep (2.5.4-3;
grep
) - gzip (1.6-7;
gzip
) - LZMA Utils (4.32.7-4;
lzma
) - New Curses (5.7-13;
ncurses
) - PAM (Apple) (32.1-3;
pam
) - PAM Modules (36.1-4;
pam-modules
) - pcre (8.30-5p;
pcre
) - Profile Directory (0-2;
profile.d
) - readline (6.0-7;
readline
) - sed (4.1.5-7;
sed
) - shell-cmds (118-6;
shell-cmds
) - system-cmds (433.4-12;
system-cmds
) - TaiG 8.0-8.1.X Untether (1.1 (using 1.2.0);
taiguntether
) - TaiG AFC2 (0.1;
taigafc2
) - Tape Archive (1.19-8;
tar
) - UI Kit Tools (1.1.9;
uikittools
)