Closed RubenVerg closed 3 years ago
Same thing happened to me, but it seems like if you are quick enough, you can still download the score by clicking the button before it disappears.
They just switched to "Please, disable TamperMonkey to access the website." lol Any alternative recommended?
I used violentmonkey so far no blocks from musescore. But the script doesnt seem to work anymore? Idk, It's stuck on processing after clicking on Individual parts
They just detect the script and refuse to show the page, it is impossible to detect the userscript managers themselves. They could patch the API, but I suspect they haven't done that. Is there some way to "click" the buttons using the console?
They just switched to "Please, disable TamperMonkey to access the website." lol Any alternative recommended?
The thing has nothing to do with TamperMonkey. It actually detects the script. Don't trust Musescore.
Hi there! Same issue here using Firefox on Windows (downloaded the latest XPI)
Hi there! Same issue here using Firefox on Windows (downloaded the latest XPI)
Oh. I forgot to release the XPI of the latest version
Is there some way to "click" the buttons using the console?
It will expose a global variable which is very easy to be detected
Just curious, how does it detect the script itself?
Get Outlook for Androidhttps://aka.ms/ghei36
From: Xmader notifications@github.com Sent: Friday, November 20, 2020 6:02:18 PM To: Xmader/musescore-downloader musescore-downloader@noreply.github.com Cc: Ruben Vergani RubenVerg@outlook.com; Author author@noreply.github.com Subject: Re: [Xmader/musescore-downloader] (Funny) new way MuseScore is blocking us (#64)
Is there some way to "click" the buttons using the console?
It will expose a global variable which is very easy to be detected
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHubhttps://eur06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FXmader%2Fmusescore-downloader%2Fissues%2F64%23issuecomment-731287189&data=04%7C01%7C%7C91a860753b144f02ba1d08d88d760a28%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C637414885392299894%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=GRIqM460wLdLSamKd6CKIAjdRD%2ByVxG0By0BjVYKt28%3D&reserved=0, or unsubscribehttps://eur06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fnotifications%2Funsubscribe-auth%2FAMRJI3EWW7UIBTNAESWGUUTSQ2OJVANCNFSM4T4YPUGQ&data=04%7C01%7C%7C91a860753b144f02ba1d08d88d760a28%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C637414885392299894%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=ewwCALBuwUlZS3JHpbxdX4STcFJJ98B%2FDHLaf%2Bvxt%2B8%3D&reserved=0.
Just curious, how does it detect the script itself?
The script loads unused webpack modules on the webpage.
If I expose a global variable, it can look for the existence of the global variable.
They just switched to "Please, disable TamperMonkey to access the website." lol Any alternative recommended?