Manifest V3 changes are now available in Microsoft Edge

%3CLINGO-SUB%20id%3D%22lingo-sub-1780254%22%20slang%3D%22en-US%22%3EManifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1780254%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EGreetings%20Insiders%2C%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%20continuation%20of%20our%20%3CA%20href%3D%22https%3A%2F%2Fblogs.windows.com%2Fwindowsexperience%2F2018%2F12%2F06%2Fmicrosoft-edge-making-the-web-better-through-more-open-source-collaboration%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ecommitment%3C%2FA%3E%20to%20reduce%20fragmentation%20of%20the%20web%20for%20all%20developers%20and%20create%20better%20web%20compatibility%20for%20our%20customers%2C%20we%20plan%20to%20support%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Ethe%20Declarative%20Net%20Request%20API%20and%20other%20changes%20proposed%20as%20part%20of%20Manifest%20V3.%20%3C%2FSPAN%3E%3CSPAN%3EThe%20decision%20to%20embrace%20Manifest%20V3%20changes%20is%20based%20on%20our%20dedication%20%3C%2FSPAN%3E%3CSPAN%3Eto%20enhancing%20privacy%2C%20security%20%26amp%3B%20performance%26nbsp%3Bfor%20the%20benefit%20of%20our%20end-users%20as%20well%20as%26nbsp%3Bto%20allow%20developers%20to%20extend%20%26amp%3B%20provide%20rich%20experiences%26nbsp%3Bin%20Microsoft%20Edge.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThese%20changes%20are%20available%20for%20testing%3C%2FSPAN%3E%3CSPAN%3E%20in%20the%20Beta%20and%20Stable%20channels.%20To%20read%20the%20official%20announcement%2C%20check%20out%20%3CA%20title%3D%22https%3A%2F%2Fblogs.windows.com%2Fmsedgedev%2F2020%2F10%2F14%2Fextension-manifest-chromium-edge%2F%22%20href%3D%22https%3A%2F%2Fblogs.windows.com%2Fmsedgedev%2F2020%2F10%2F14%2Fextension-manifest-chromium-edge%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eour%20blog%20post%3C%2FA%3E%2C%20and%20for%20more%20technical%20details%20please%20refer%20to%20%3CA%20title%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-edge%2Fextensions-chromium%2Fdeveloper-guide%2Fmigrate-your-extension-from-manifest-v2-to-v3%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-edge%2Fextensions-chromium%2Fdeveloper-guide%2Fmigrate-your-extension-from-manifest-v2-to-v3%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ethis%20document%3C%2FA%3E.%20We're%20eager%20to%20hear%20your%20feedback%2C%20so%20feel%20free%20to%20share%20your%20thoughts%20in%20the%20comments%20below!%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-%20The%20Microsoft%20Edge%20Product%20Team%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1783165%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1783165%22%20slang%3D%22en-US%22%3Ethe%20web%20speech%20api%20is%20support%3F%3CBR%20%2F%3E%3CBR%20%2F%3Eyour%20replied%20said%20next%20week....%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fdiscussions%2Fweb-speech-api-support%2Fm-p%2F1740172%23M35940%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fdiscussions%2Fweb-speech-api-support%2Fm-p%2F1740172%23M35940%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1783558%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1783558%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EManifest%20V3%20introduces%20new%20security%20concepts%20that%20improve%20user%20privacy%20and%20security.%3CSTRONG%3E%20Extensions%20may%20no%20longer%20use%20remotely%20hosted%20code%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%2C%20%3CSTRONG%3Econtrols%20are%20introduced%20to%20allow%20or%20restrict%20extension%20access%20to%20websites%20at%20runtime%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%2C%20and%20extensions%20will%20have%20the%20same%20permissions%20as%20the%20page%20they%20are%20injected%20into.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3Ethese%20are%20great%20security%20improvements%20being%20added.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3Eand%20honestly%2C%20we%20can%20afford%20to%20see%203rd%20party%20adblockers'%20abilities%20being%20limited%20after%20this%2C%20Microsoft%20Edge%20has%20built%20in%20tracking%20prevention%20that%20is%20on%20par%20with%20some%20of%20the%20great%20blocker%20extensions.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1784216%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1784216%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F484598%22%20target%3D%22_blank%22%3E%40fawkes%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EEven%20if%20browser%20provides%20great%20level%20of%20security%20and%20privacy%20%2C%20in%20many%20cases%20due%20to%20privacy%20and%20security%20issues%20with%20extensions%20%2C%20users%20would%20be%20at%20risk.%3C%2FP%3E%3CP%3ETherefore%2C%20such%20feature%20is%20very%20valuable.%3C%2FP%3E%3CP%3EIt%20also%20blocks%20great%20deal%20of%20attacks%20and%20malicious%20actors.%3C%2FP%3E%3CP%3ESome%20developers%20might%20complain%20and%20not%20happy%20with%20these%20improvements%2C%20but%20user's%20privacy%20and%20security%20are%20higher%20priority.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1784411%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1784411%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F13441%22%20target%3D%22_blank%22%3E%40Reza%20Ameri%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20same%20potential%20developers%20that%20might%20complain%20themselves%20create%20extensions%20that%20protect%20user%20privacy%20and%20security%20from%203rd%20party%20websites.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1786399%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1786399%22%20slang%3D%22en-US%22%3EWell%2C%20that's%20disappointing.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1788638%22%20slang%3D%22pt-BR%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1788638%22%20slang%3D%22pt-BR%22%3E%3CP%3EHello%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F310193%22%20target%3D%22_blank%22%3E%40HotCakeX%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20is%20despair%20on%20reddit%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.reddit.com%2Fr%2FMicrosoftEdge%2Fcomments%2Fjbrffh%2Fmanifest_v3_changes_are_now_available_to_test_in%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.reddit.com%2Fr%2FMicrosoftEdge%2Fcomments%2Fjbrffh%2Fmanifest_v3_changes_are_now_available_to_test_in%2F%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1788843%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1788843%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F316864%22%20target%3D%22_blank%22%3E%40eguif%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELol%20let%20people%20talk%2C%20they%20don't%20have%20enough%20information%20neither%20do%20they%20know%20the%20full%20story%2C%20judging%20from%20the%20comments%2C%20it's%20just%20the%20ordinary%20typical%20whining%20and%20resistance%20against%20a%20new%20technology.%3C%2FP%3E%3CP%3Esome%20say%20%22switch%20to%20Firefox%22%20again%20makes%20me%20laugh.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Epeople%20on%20Edge%20don't%20have%20to%20worry%20about%20anything.%20use%20ublock%20origin%20which%20is%20the%20best%20adblocker%2Fanti-malware%20extension%20out%20there%20in%20combination%20with%20Tracking%20prevention%2C%20that's%20enough.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EManifest%20V3's%20benefits%20outweigh%20its%20disadvantages%2C%20greatly.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1788954%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1788954%22%20slang%3D%22en-US%22%3ERightfully.%20A%20lot%20of%20people%20switched%20from%20chrome%20for%20this%20reason.%20To%20also%20explicitly%20use%20Ublock%20Origin.%20Given%20Raymond%20Hill's%20assurance%20that%20he%20would%20not%20compromise%20on%20functionality%20to%20bow%20down%20to%20these%20changes%2C%20I%20am%20curious%20as%20to%20what%20he%20thinks%20of%20this.%20If%20he%20will%20not%20compromise%2C%20then%20the%20only%20way%20would%20be%20to%20move%20on%20to%20another%20browser%20for%20UBO%20users%20or%20find%20something%20else%20to%20replace%20UBO.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1789113%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1789113%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F322326%22%20target%3D%22_blank%22%3E%40Alexei_Drekker%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eublock%20origin's%20developer%20has%20good%20intentions%20sure%2C%20it's%20a%20great%20extension%20and%20I've%20been%20using%20it%20non-stop%20in%20the%20past%20few%20years.%20but%20we%20are%20not%20dealing%20with%20only%201%20developer%20here.%20there%20are%20thousands%20of%20developers%20and%20many%20of%20them%20have%20malicious%20thoughts%20and%20intentions.%20these%20adjustments%20will%20ensure%20user's%20safety%20against%20all%203rd%20party%20developers.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFirefox%2C%20for%20now%2C%20lets%20ublock%20origin%20slide%20but%20they%20are%20not%20that%20stupid%2C%20they%20perfectly%20know%20that%20there%20are%20extension%20developers%20out%20there%20that%20will%20target%20Firefox%20extensions%20once%20Chromium%20curbs%20their%20abilities.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eplus%2C%20Edge%20users%20don't%20have%20anything%20to%20worry%20about%2C%20Edge's%20tracking%20prevention%2C%20specially%20on%20Strict%20level%2C%20along%20with%20exceptions%20list%20and%20domain%20wildcarding%2C%20is%20a%20really%20great%20companion%20to%20offset%20any%20possible%20loss%20of%20functionality%20from%20ublock%20origin.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1792561%22%20slang%3D%22en-US%22%3ERe%3A%20Manifest%20V3%20changes%20are%20now%20available%20in%20Microsoft%20Edge%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1792561%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20why%20manifest%20V3%20to%20tighten%20the%20security%20is%20a%20must%20have.%20there%20are%20devious%20extension%20developers%20out%20there%2C%20even%20when%20the%20extension%20is%20open%20source%2C%20they%20can%20do%20malicious%20stuff.%3CBR%20%2F%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.ghacks.net%2F2020%2F10%2F16%2Ftime-to-remove-nano-adblocker-and-defender-from-your-browsers-except-firefox%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fwww.ghacks.net%2F2020%2F10%2F16%2Ftime-to-remove-nano-adblocker-and-defender-from-your-browsers-except-firefox%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CBLOCKQUOTE%3E%3CP%3EThe%20developer%20of%20the%20extension%20revealed%20on%20the%20official%20GitHub%20that%20he%20decided%20to%20sell%20the%20extension%20twelve%20days%20ago%20to%20two%20Turkish%20developers.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20new%20owners%20uploaded%20a%20new%20version%20to%20the%20Chrome%20store%2C%20and%20careful%20analysis%20of%20the%20code%20of%20the%20extension%20revealed%20that%20it%20contained%20a%20new%20connect.js%20file%20that%20did%20not%20come%20from%20the%20project's%20GitHub%20page.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHill%20provided%20an%20analysis%20of%20the%20code%20and%20discovered%20that%20the%20new%20code%20allowed%20the%20developers%20to%20submit%20user%20activity%20and%20data%20to%20remote%20servers.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20extension%20is%20now%20designed%20to%20lookup%20specific%20information%20from%20your%20outgoing%20network%20requests%20according%20to%20an%20externally%20configurable%20heuristics%20and%20send%20it%20to%20%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdef.dev-nano%5Bdot%5Dcom%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fdef.dev-nano%5Bdot%5Dcom%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHill%20suggested%20that%20users%20uninstall%20Nano%20Defender%20%2F%20Nano%20Adblocker%20immediately%20to%20block%20data%20from%20being%20submitted%20to%20the%20new%20owners.%3C%2FP%3E%3C%2FBLOCKQUOTE%3E%3CP%3E%3CBR%20%2F%3EI%20don't%20think%20anyone%20should%20100%25%20trust%20any%203rd%20party%20extension%20developer%20or%20complain%20for%20additional%20securities%20such%20as%20the%20ones%20outlined%20in%20manifest%20V3%20that%20protects%20users.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Deleted
Not applicable

Greetings Insiders,

 

In continuation of our commitment to reduce fragmentation of the web for all developers and create better web compatibility for our customers, we plan to support the Declarative Net Request API and other changes proposed as part of Manifest V3. The decision to embrace Manifest V3 changes is based on our dedication to enhancing privacy, security & performance for the benefit of our end-users as well as to allow developers to extend & provide rich experiences in Microsoft Edge.

 

These changes are available for testing in the Beta and Stable channels. To read the official announcement, check out our blog post, and for more technical details please refer to this document. We're eager to hear your feedback, so feel free to share your thoughts in the comments below!

 

- The Microsoft Edge Product Team

15 Replies

 

Manifest V3 introduces new security concepts that improve user privacy and security. Extensions may no longer use remotely hosted code, controls are introduced to allow or restrict extension access to websites at runtime, and extensions will have the same permissions as the page they are injected into. 

 

these are great security improvements being added.

 

and honestly, we can afford to see 3rd party adblockers' abilities being limited after this, Microsoft Edge has built in tracking prevention that is on par with some of the great blocker extensions.

 

@Deleted 

Even if browser provides great level of security and privacy , in many cases due to privacy and security issues with extensions , users would be at risk.

Therefore, such feature is very valuable.

It also blocks great deal of attacks and malicious actors.

Some developers might complain and not happy with these improvements, but user's privacy and security are higher priority.

@Reza_Ameri-Archived 

The same potential developers that might complain themselves create extensions that protect user privacy and security from 3rd party websites.

Well, that's disappointing.

@eguif 

Lol let people talk, they don't have enough information neither do they know the full story, judging from the comments, it's just the ordinary typical whining and resistance against a new technology.

some say "switch to Firefox" again makes me laugh.

 

people on Edge don't have to worry about anything. use ublock origin which is the best adblocker/anti-malware extension out there in combination with Tracking prevention, that's enough.

 

Manifest V3's benefits outweigh its disadvantages, greatly.

Rightfully. A lot of people switched from chrome for this reason. To also explicitly use Ublock Origin. Given Raymond Hill's assurance that he would not compromise on functionality to bow down to these changes, I am curious as to what he thinks of this. If he will not compromise, then the only way would be to move on to another browser for UBO users or find something else to replace UBO.

@Alexei_Drekker 

ublock origin's developer has good intentions sure, it's a great extension and I've been using it non-stop in the past few years. but we are not dealing with only 1 developer here. there are thousands of developers and many of them have malicious thoughts and intentions. these adjustments will ensure user's safety against all 3rd party developers.

 

Firefox, for now, lets ublock origin slide but they are not that stupid, they perfectly know that there are extension developers out there that will target Firefox extensions once Chromium curbs their abilities.

 

plus, Edge users don't have anything to worry about, Edge's tracking prevention, specially on Strict level, along with exceptions list and domain wildcarding, is a really great companion to offset any possible loss of functionality from ublock origin.

This is why manifest V3 to tighten the security is a must have. there are devious extension developers out there, even when the extension is open source, they can do malicious stuff.

https://www.ghacks.net/2020/10/16/time-to-remove-nano-adblocker-and-defender-from-your-browsers-exce...

 

The developer of the extension revealed on the official GitHub that he decided to sell the extension twelve days ago to two Turkish developers.

 

The new owners uploaded a new version to the Chrome store, and careful analysis of the code of the extension revealed that it contained a new connect.js file that did not come from the project's GitHub page.

 

Hill provided an analysis of the code and discovered that the new code allowed the developers to submit user activity and data to remote servers.

 

The extension is now designed to lookup specific information from your outgoing network requests according to an externally configurable heuristics and send it to  

https://def.dev-nano[dot]com

 

Hill suggested that users uninstall Nano Defender / Nano Adblocker immediately to block data from being submitted to the new owners.


I don't think anyone should 100% trust any 3rd party extension developer or complain for additional securities such as the ones outlined in manifest V3 that protects users.

Yes exactly my config (with Ublock is under the limit of rules (since it intercept only ads) tracker are blocked by internet tracker-blocker), i still secretly hope to see an AdBlock directly in edge like in the mobile version soon.

@Pirolla 

honestly, just bunch of fake claims and propaganda, with some made up charts.

ghostery advertising for ghostery on their own ghostery's website. it's very obvious how biased that article is.

 

ulbock origin is the best, Free and Open source, in terms of performance it's also the best. ghostery just want to sell their paid services to people, that's all.

ublock origin doesn't need advertisement :)

When will the "Edge Add-ons" store support uploading and listing of MV3 extensions? They are currently supported by the latest versions of Edge itself after recent Chromium updates but the store is currently not allowing the upload of these extensions.

 

> "Package acceptance validation error: Only manifest version 2 is supported. Error code: manifest_version: 3 Line: 5 Column: 25"

 

As there are new APIs only being developed for MV3 which Edge is supporting currently it would be great to be able to list these extensions showing off those new APIs and features specifically for Edge.