Update 3.5.0 reintroduces the sock_puppet and sock_port exploits for iOS 12.4, both for A8-11 devices and A7-A7X devices respectively. Initially, these exploits were only compatible with iOS 12.2 and below, and were eventually patched as of iOS 12.3, however a slip-up in 12.4 has seemingly made it possible again to utilize these same exploits. Oops.
Keep in mind that if you are on iOS versions 12.3, 12.3.1, or any of the iOS 13 betas, you will need to swiftly update/downgrade to 12.4 as soon as possible before Apple releases the next iOS version and stops signing version 12.4, as Pwn20wnd has stressed that the exploits are unsupported on those versions.
It's also highly recommended to save your SHSH2 blobs for each of your devices, so that you will be able to manually update to 12.4 from a lower iOS version in the future, using futurerestore (even when Apple stops signing it).
Also be wary that, as usual, A12/A12X devices aren't supported by this particular jailbreak still, though if you do happen to have an A12/A12X iDevice on iOS 11.0-12.1.2 right now, you can use Coolstar's Chimera jailbreak instead.
Download the Unc0ver IPA from Github
[UPDATE 1] - iOS 12.4.1 has just been released by Apple, with the sole purpose of re-patching the exploit for good. If you are planning on jailbreaking do not update to this new minor version. If you update after iOS 12.4 has finally stopped being signed, you'll have to wait an undefined amount of time for a new exploit.
Last edited by , , Reason: iOS 12.4.1 update