Nevermind, I made an ad-hoc page to reproduce. Spinning off a new bug to track the fix, thanks.
Could you please provide also the main URL of the page where you can see this happening?
Why do you use
about:blankwhendata:text/plain;base64is available?
Because data: wouldn't work (illegal URL): https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/tabs/create#url
And why "local" instead of "session"
Because it wouldn't work either: storage.session data can't survive browser.runtime.reload(), otherwise I would obviously be glad of skipping this whole encrypted "lifeboat" dance.
Lgtm, thanks.
tor-browser - !fixups to tor-browser-specific commits, new features, security backportsbase-browser and mullvad-browser - !fixups to base-browser-specific commits, new features to be shared with mullvad-browser, and security backports
base-browser-specific commits which need to be cherry-picked to the base-browser and mullvad-browser branches here/request_review all the relevant reviewersCherry-picked upstream's 7a8cc12b + a2fa7105 to enable it.
Not tested, inspected that the cherry-pick looks good.
tor-browser - !fixups to tor-browser-specific commits, new features, security backportsbase-browser and mullvad-browser - !fixups to base-browser-specific commits, new features to be shared with mullvad-browser, and security backports
base-browser-specific commits which need to be cherry-picked to the base-browser and mullvad-browser branches here/request_review all the relevant reviewersSkip the efficient randomization.
Use the normal one instead.
Canvases still seem spoofed?
lgtm, thank you!
mullvad-browser - !fixups to mullvad-browser-specific commits, new features, security backportsbase-browser and tor-browser - !fixups to base-browser-specific commits or new features to be shared with tor-browser
base-browser-specific commits which need to be cherry-picked to the base-browser and tor-browser branches here/request_review all the relevant reviewersUsual rebase
Fixed in NoScript 13.6.7.906 by https://github.com/hackademix/noscript/commit/58b9f7db32fbee5282703ffb647007b9ef5623ab
Closing as NoScript 13.6.8.1984 is deployed and ready for inclusion in Tor Browser 15.0.8.
lgtm, thank you!
tor-browser - !fixups to tor-browser-specific commits, new features, security backportsbase-browser and mullvad-browser - !fixups to base-browser-specific commits, new features to be shared with mullvad-browser, and security backports
base-browser-specific commits which need to be cherry-picked to the base-browser and mullvad-browser branches here/request_review all the relevant reviewersUsual rebase.
Fixed in 13.6.7.708 (13.6.8 on stable) by https://github.com/hackademix/noscript/commit/a0ab15c75a3e1ba7fda1eeab8a1f96461f26b7c0
This seems to be expected, because (not sure why, probably for fingerprinting purposes) the site require WASM not to hide the content (which, ironically, is shown if you disable JavaScript outright).
The issue, if any, is the since all the errors due to WASM being disabled are caught by the web scripts, NoScript cannot give feedback about the WASM access attempt.
Keeping open to see if we can do better about this.
Confirmed, investigating.