iOS 13.6.1, iPhone 11 Pro Max, using custom built kernel read/write primitives, completely got rid of the tfp0 method. I’ll make it public when it’s appropriate. #JAILBREAK
As the iPhone Wiki notes, "task_for_pid is a function that allows a (privileged) process to get the task port of another process on the same host, except the kernel task (process ID 0). A tfp0 patch (or task_for_pid(0) patch) removes this restriction, allowing any executable running as root to call task_for_pid for pid 0 (hence the name) and then use vm_read and vm_write to modify the kernel VM region."
08Tc3wBB says the exploit will be made public but it's unclear when this will happen. Perhaps once iOS 14 is finalized.
Take a look at the video below and please download the iClarified app or follow iClarified on Twitter, Facebook, YouTube, and RSS for updates.