Apple Credits Team Pangu for Discovering iOS 8.1 Exploits

All good things must come to an end and that goes for jailbreak utilities as well. With their release of iOS 8.1.1. Apple has ended the Pangu iOS 8 jailbreak by patching some of the exploits that the team used.

Image : Apple Credits Pangu Jailbreak Team

pangu jailbreak team

Alongside the release, Apple also put up a support page explaining the security details in the iOS 8.1.1. In their release, they credited Pangu with finding no less than three exploits:

  • Dyld – allows users, i.e., jailbreakers, to execute unsigned code
  • Sandbox – could allow malicious applications access by allowing them to “launch arbitrary binaries” on trusted devices
  • Kernel – could allow malicious apps to “execute arbitrary code with system privileges”

This isn’t the first time that Apple has given a jailbreak team credit for finding security flaws. Earlier this year, when they released iOS 7.1, they gave that same credit to team Evad3rs for the exploits they used in the Evasi0n jailbreak. Before that, other jailbreak developers have been acknowledged for finding flaws and this is the only time that the Cupertino Company will ever publicly acknowledge the jailbreak utility and the people behind it.

Image : Pangu Team Gets Credit  [Download Pangu Links]

pangu jailbreak ios 8

The Pangu jailbreak was released unexpectedly on October 22nd, just two days after Apple released iOS 8.1. Although the initial release was not quite the jailbreak we’ve all come to expect, a bundle of updates soon made it into a stable utility.

If you want to jailbreak using Pangu, you must either update to or stay on iOS 8.1. Apple will stop signing iOS 8.1 in the very near future and you will lose your opportunity:

Let us know if you intend to update or keep your jailbreak for now.

Source : Apple

Follow us on Twitter, Facebook and Subscribe to our newsletter for the latest information direct to your inbox.

PREVIOUS POST

NEXT POST

Leave a Reply

Your email address will not be published. Required fields are marked *