The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
TaiG
This page is about untethered jailbreak for iOS 8.0-8.1.2. For untethered jailbreak for iOS 8.0-8.1, see Pangu8.
Original author(s) | TaiG |
---|---|
Developer(s) | TaiG |
Initial release | 29 Nov 2014 |
Stable release | 1.2.0 / 10 December 2014 |
Development status | Active |
Written in | ? |
Operating system | Windows |
Platform | Windows |
Available in | Chinese / English |
Type | Jailbreaking |
License | Freeware |
Website |
taig.com/en (English) taig.com (Chinese) |
TaiG (Taiji) is an untethered jailbreak for all devices on iOS 8.0-8.1.2, except the Apple TV. It was initially released on November 29, 2014. Its website claims the exploits work on iOS 8.2 beta, but support is disabled in the public builds.
Supported Devices
All devices capable of running iOS 8.0-8.1.2 except the Apple TV family, are supported.
iOS 8.2 Beta
TaiG's website originally claimed as early as 4 December 2014 that "support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release." This claim remained through 13 December 2014, but was removed sometime before 4 January 2015. It is believed that the third beta of iOS 8.2 (released 18 December 2014) patched the exploits used.
Download
Version | Language | Download | SHA-1 | Changes |
---|---|---|---|---|
1.0.0 | English | TaiG | 2538d85d3b42a2a65ec33aec86245c39047449d3
|
First version of TaiG which supports all devices with iOS 8.0 - 8.1.1 except Apple TV's. |
1.0.1 | TaiG | 7346849bb3ff3dd1e21530ae1bb7ee27f02f453a
|
| |
1.0.2 | TaiG | 4edab617f9b951419eca4c32ddc6a5f8a2e94226
|
| |
1.1.0 | Chinese | TaiG | 2181179badac74cced2eb9ad5639b0f57be66f95
|
|
English | TaiG | d3b40bbbd6f9cf652ece4476b96dafae858f1bb0
| ||
1.2.0 | Chinese | TaiG | 42848662a637234ef14d67448e4cf8e427906b52
|
|
English | TaiG | 5c6e2939359e36622ca2b4ca71d0def628dbbaf3
|
Exploit
As of 4 January 2015, the exploits used have not been disclosed by the developers and no (public) reverse analysis is available.