iOS 8.1.3 patches several vulnerabilities used by TaiG jailbreak

0

TaiG-Jailbreak-english

iOS 8.1.3 update resolves thirty security vulnerabilities with patches for most exploits needed to jailbreak Pangu8, Taïg and PP.

As often after even a minor update, the hacker MuscleNerd (known to belong to the evad3rs team) advises Jailbreakers to stay away from iOS 8.1.3. It must be said that this recommendation seems justified to reading the thirty security fixes accompanying iOS 8.1.3.

These fixes, reference is made repeatedly patches for vulnerabilities discovered by Taig team, not to mention a vulnerability in the iOS kernel and identified by the team and Stefan Esser Pangu is otherwise known by his pseudonym hacker i0n1c.

Suffice to say that it portends the firm at the apple has been heavy handed and massively ended exploits used in untethered jailbreak tools, whether Pangu8, Taïg even the recent jailbreak PP. Via the Chinese microblogging site Weibo, a member of the team Taig confirms that Jailbreakers should not go to iOS 8.1.3.

Recall that the team Pangu offers Pangu8 tool (Windows and OS X) for the jailbreak iOS 8.0 through 8.1.0. To mod iOS 8.1.1 and 8.1.2, the Taig team offers a dedicated tool available in a Windows version. The jailbreak PP (for iOS 8.0 to 8.1.2) it is available in a version for OS X.

Via Twitter, i0n1c emphasizes fix to Apple vulnerabilities he had disclosed at the end of 2013. It also training points to the discovery of a flaw in the kernel attributed to Taig team but would also find its own already used by Pangu team in June 2014.

i0n1c considers the Bug Bounty program is the only way to motivate the hackers to find security bugs. A thinly veiled messages in Apple’s management to consider compensation for such discoverers …

For Jailbreakers who ceded rushed to iOS 8.1.3 and now regret, restore to iOS 8.1.2 is still possible as this version is signed by Apple. But this will not last forever.

Follow us on Twitter, subscribe to our Facebook Page, find us on LinkedIn, circle us on Google+