Serious Discussion "Fixing" Manifest V3

oldschool

Level 81
Thread author
Verified
Top Poster
Well-known
Mar 29, 2018
7,099

Wed 07 February 2024
In the previous post of this series, What is Manifest v3 and how it affects JShelter, we've stressed the limitations of the new WebExtensions APIs, along with the challenges and the threats it poses to privacy and security extensions such as JShelter.
As part of our strategy to mitigate these problems, we mentioned "actively participating in the ongoing /browser extensions API design work/ of the Web Extensions Community Group (WECG), to steer the MV3 specification in the most favorable direction for security and privacy use cases".
Here, we want to provide some updates about these design participation activities, and pointers to follow their progress.
Specifically, we prompted the W3C's WECG to resume the discussion of the two main issues "blocking" JShelter, which we had originally opened more than 2 years ago:
  1. Scripting API minimum requirements to enable the reliable and pervasive script injection needed to enforce JShelter's JavaScript Shield wrappers
  2. LAN-aware Declarative Net Request filters, required for the Network Boundary Shield to operate in Chromium-derived browsers and Safari on MV3
See public notes of the meetings of the WECG for more details on the working of the group.
This time, the response has been unanimously positive on #1, and generally positive on #2, with Google expressing a neutral position motivated by Chromium developers unsure if the Network Boundary Shield use case would be better served by a built-in browser UI around their (not ready for prime time yet and planned for quite a long time now) Private Network Access.
The discussion continues on the specific follow-up proposals we've created afterwards, covering all our JavaScript Shield requirements:
  1. Proposal: RegisteredContentScript.func and RegisteredContentScript.args (similar to ScriptInjection)
  2. Proposal: RegisteredContentScript.workers property to inject WorkerScope(s)
  3. Proposal: Proposal: RegisteredContentScript.tabIds and RegisteredContentScript.excludeTabIds properties to filter injection
Furthermore MAIN world support in Firefox would greatly simplify our cross-browser story, allowing us to drop a complex and fragile compatibility layer working around Firefox's XRay vision approach to "safe" DOM / JavaScript environment manipulation that we currently employ in Jshelter for Firefox.
Browser vendors now signalling adequate understanding of our requirements and their will to implement our API proposals or equivalent alternatives before MV2 sunset can finally induce some cautious optimism about a reasonably better MV3 for privacy and security extensions.
This post is part 2 of the "Manifest v3" series:

  1. What is Manifest v3 and how it affects JShelter
  2. "Fixing" Manifest V3
 

Virtuoso

Level 2
Feb 21, 2022
97
MV3 has seen massive improvements in the last six months and they continue to add more features by listening to the developers. By the time June 2024 deadline comes most of the extensions will have become compatible with MV3. Amongst the Adblocking extensions, Adguard will be the best option for chromium derived browsers.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top