MediaWiki API result
This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.
Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.
See the complete documentation, or the API help for more information.
{
"batchcomplete": "",
"continue": {
"lecontinue": "20251016234853|341",
"continue": "-||"
},
"query": {
"logevents": [
{
"logid": 351,
"ns": 0,
"title": "WatchOS",
"pageid": 206,
"logpage": 206,
"revid": 509,
"params": {},
"type": "create",
"action": "create",
"user": "Nat649",
"timestamp": "2025-10-17T22:45:19Z",
"comment": "Created page with \"[[File:Apple-WWDC23-watchOS-10-5up-230605.jpg.landing-big 2x.jpg|thumb|image de la WWDC 2023 sur watchOS 10]] watchOS est le syst\u00e8me d'exploitation mobile d\u00e9velopp\u00e9 par Apple Inc. pour l'Apple Watch. Il est bas\u00e9 sur iOS, le syst\u00e8me d'exploitation utilis\u00e9 par l'iPhone, et partage de nombreuses fonctionnalit\u00e9s similaires. Lanc\u00e9 le 24 avril 2015, watchOS inclut une API appel\u00e9e WatchKit destin\u00e9e aux d\u00e9veloppeurs tiers. Il s'agit d'un syst\u00e8me de type Unix avec un...\""
},
{
"logid": 350,
"ns": 6,
"title": "File:WatchOS-10-Smart-Stack.jpg",
"pageid": 205,
"logpage": 205,
"revid": 508,
"params": {},
"type": "create",
"action": "create",
"user": "Nat649",
"timestamp": "2025-10-17T22:44:40Z",
"comment": ""
},
{
"logid": 349,
"ns": 6,
"title": "File:WatchOS-10-Smart-Stack.jpg",
"pageid": 205,
"logpage": 205,
"revid": 508,
"params": {
"img_sha1": "ppp1c9hngrusryjkhsa23d68wei3tq0",
"img_timestamp": "2025-10-17T22:44:40Z"
},
"type": "upload",
"action": "upload",
"user": "Nat649",
"timestamp": "2025-10-17T22:44:40Z",
"comment": ""
},
{
"logid": 348,
"ns": 0,
"title": "C1",
"pageid": 204,
"logpage": 204,
"revid": 507,
"params": {},
"type": "create",
"action": "create",
"user": "31.38.66.100",
"anon": "",
"timestamp": "2025-10-17T22:44:37Z",
"comment": "Created page with \"= C4000 = Le '''C4000''' est le nom interne des premiers chipsets de bande de base con\u00e7us par Apple. Le '''C1''' est utilis\u00e9 dans l'<nowiki/>'''iPhone 16e''', tandis que le '''C1X''' est int\u00e9gr\u00e9 dans l'<nowiki/>'''iPhone Air''', l'<nowiki/>'''iPad Pro 11 pouces (M5)''' et l''''iPad Pro 13 pouces (M5)'''. Ces chipsets sont \u00e9galement connus sous la r\u00e9f\u00e9rence '''C4000''' dans les firmwares. * '''Num\u00e9ro de pi\u00e8ce''' : APL1114 * '''Identifiant BasebandGoldCert''' : 4...\""
},
{
"logid": 347,
"ns": 6,
"title": "File:Apple-WWDC23-watchOS-10-5up-230605.jpg.landing-big 2x.jpg",
"pageid": 203,
"logpage": 203,
"revid": 506,
"params": {},
"type": "create",
"action": "create",
"user": "Nat649",
"timestamp": "2025-10-17T22:44:03Z",
"comment": ""
},
{
"logid": 346,
"ns": 6,
"title": "File:Apple-WWDC23-watchOS-10-5up-230605.jpg.landing-big 2x.jpg",
"pageid": 203,
"logpage": 203,
"revid": 506,
"params": {
"img_sha1": "1w1nz6j21oklyedykz7svwqj4qwszpv",
"img_timestamp": "2025-10-17T22:44:02Z"
},
"type": "upload",
"action": "upload",
"user": "Nat649",
"timestamp": "2025-10-17T22:44:02Z",
"comment": ""
},
{
"logid": 345,
"ns": 0,
"title": "Cydia impactor",
"pageid": 202,
"logpage": 202,
"revid": 505,
"params": {},
"type": "create",
"action": "create",
"user": "31.38.66.100",
"anon": "",
"timestamp": "2025-10-17T22:42:27Z",
"comment": "Created page with \"{| class=\"wikitable\" !'''Auteur(s) original(aux)''' !Jay Freeman (saurik) |- |'''D\u00e9veloppeur(s)''' |Jay Freeman (saurik) |- |'''Derni\u00e8re version''' |0.9.56 / 14 f\u00e9vrier 2022 |- |'''Syst\u00e8me d'exploitation''' |Windows, Mac, Linux |- |'''Disponible en''' |Anglais |- |'''Type''' |Sideloading |- |'''Licence''' |Freeware |- |'''Site web''' |cydiaimpactor.com |} '''Cydia Impactor''' est un outil multifonctionnel disponible pour Windows, Mac et Linux, cr\u00e9\u00e9 par '''Jay Freem...\""
},
{
"logid": 344,
"ns": 0,
"title": "Blackbird",
"pageid": 201,
"logpage": 201,
"revid": 504,
"params": {},
"type": "create",
"action": "create",
"user": "31.38.66.100",
"anon": "",
"timestamp": "2025-10-17T22:39:37Z",
"comment": "Created page with \" = Exploit Blackbird = {| class=\"wikitable\" !'''Vuln\u00e9rabilit\u00e9 dans''' !SEPROM |- |'''Vuln\u00e9rable sur''' |A8, A9, A10, s\u00e9rie T2, et potentiellement S3 |- |'''Divulgu\u00e9''' |6 ao\u00fbt 2020 [1] |- |'''D\u00e9couvert par''' |windknown et littlelailo (ind\u00e9pendamment) [2] |} L'exploit '''Blackbird''' est une vuln\u00e9rabilit\u00e9 du '''SEPROM''' (Secure Enclave Processor Read-Only Memory) permettant l'ex\u00e9cution de code non sign\u00e9 sur les '''SEP''' (Secure Enclave Processor) des appare...\""
},
{
"logid": 343,
"ns": 0,
"title": "Recovery",
"pageid": 200,
"logpage": 200,
"revid": 501,
"params": {},
"type": "create",
"action": "create",
"user": "31.38.66.100",
"anon": "",
"timestamp": "2025-10-17T05:31:24Z",
"comment": "Created page with \" = Mode de r\u00e9cup\u00e9ration = Le '''Mode de r\u00e9cup\u00e9ration''' est une fonctionnalit\u00e9 de secours dans '''iBoot''', utilis\u00e9e pour restaurer un appareil avec un nouveau syst\u00e8me d'exploitation, que le syst\u00e8me actuel soit endommag\u00e9 ou que l'appareil soit en cours de mise \u00e0 jour via '''iTunes''', '''Finder''' (macOS uniquement), '''Apple Configurator''' (macOS uniquement), '''Apple Devices''' (Windows uniquement) ou, dans le cas de la restauration d'un '''Studio Display'''...\""
},
{
"logid": 342,
"ns": 0,
"title": "IBoot",
"pageid": 199,
"logpage": 199,
"revid": 500,
"params": {},
"type": "create",
"action": "create",
"user": "31.38.66.100",
"anon": "",
"timestamp": "2025-10-17T05:26:27Z",
"comment": "Created page with \"= iBoot (Bootloader) = '''iBoot''', \u00e9galement appel\u00e9 \u00ab iBoot second-stage loader \u00bb dans le code source, est le bootloader de stade 2 d'Apple pour tous les appareils. Il ex\u00e9cute ce qui est connu sous le nom de Recovery Mode. Il dispose d'une interface interactive qui peut \u00eatre utilis\u00e9e via USB ou s\u00e9rie. == Extraction et d\u00e9sassemblage == Pour extraire le bootloader et le d\u00e9sassembler avec IDA : # Obtenez le bootloader \u00e0 partir de l'IPSW. Ce fichier se trouve d...\""
}
]
}
}